Skip to content

Commit

Permalink
generated content from 2024-08-23
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 23, 2024
1 parent 51cba79 commit b55cd68
Show file tree
Hide file tree
Showing 132 changed files with 3,013 additions and 0 deletions.
131 changes: 131 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -247227,3 +247227,134 @@ vulnerability,CVE-2023-52913,vulnerability--89741f0d-d7ab-45a3-ba03-722f137a638c
vulnerability,CVE-2023-52894,vulnerability--41720441-19b9-44d2-ad52-c2f0cf81ec5b
vulnerability,CVE-2023-22576,vulnerability--271303b0-0890-48e2-b12f-45295d638f92
vulnerability,CVE-2023-49198,vulnerability--7d4a68a2-fcbf-4511-a2ff-a1f72a271c43
vulnerability,CVE-2022-48919,vulnerability--52eda593-9c76-4a87-8e30-48b08dd21d78
vulnerability,CVE-2022-48930,vulnerability--e1f16696-65bd-40df-a00e-def731e574d9
vulnerability,CVE-2022-48936,vulnerability--156733b8-dcfa-4cff-b98c-dda97d3ddaf7
vulnerability,CVE-2022-48939,vulnerability--0b02302d-a98e-46d9-8b1b-9c4b15416ae6
vulnerability,CVE-2022-48923,vulnerability--be153ac3-5bb9-465f-b93c-16e833048160
vulnerability,CVE-2022-48926,vulnerability--46154e26-b7ca-4875-95ae-a2fd2e5b4252
vulnerability,CVE-2022-48941,vulnerability--0e35c507-475d-46ad-be49-04df09eb429d
vulnerability,CVE-2022-48904,vulnerability--278e8531-8c26-45a0-a437-8c97a00d59f1
vulnerability,CVE-2022-48927,vulnerability--f48ea6f6-b5a5-4b6f-9849-fdc3da2c379b
vulnerability,CVE-2022-48921,vulnerability--53006157-d4bc-40f8-987e-6dc2e6ded5aa
vulnerability,CVE-2022-48901,vulnerability--5a4c2498-0d3c-4870-98bc-5468c6385bbf
vulnerability,CVE-2022-48933,vulnerability--3abf3760-165f-4f94-84a9-dff80a178c1d
vulnerability,CVE-2022-48917,vulnerability--cd7e5653-5e8e-43b9-853a-60140dc86b4e
vulnerability,CVE-2022-48908,vulnerability--d1aefbd4-6810-477d-bd6e-98b05fd1d0c2
vulnerability,CVE-2022-48925,vulnerability--d5fe5564-e56e-4c37-aa3c-8e599b6df59c
vulnerability,CVE-2022-48907,vulnerability--8b8abc33-830a-442e-b520-85673ff49513
vulnerability,CVE-2022-48920,vulnerability--4a8cb57d-7842-43de-bab5-55afa4f838aa
vulnerability,CVE-2022-48912,vulnerability--3b6364c8-4407-40a9-8e23-108ca7c20a68
vulnerability,CVE-2022-48937,vulnerability--55b8140d-a7b5-455c-b97c-f1e40b743f33
vulnerability,CVE-2022-48938,vulnerability--27729b34-5223-4206-8ca0-8a4dd9b59ecc
vulnerability,CVE-2022-48909,vulnerability--e043c330-90b7-47ca-a2d2-22b76d86b11e
vulnerability,CVE-2022-48928,vulnerability--57c362a7-f7b7-47ae-8242-44d194902454
vulnerability,CVE-2022-48914,vulnerability--6f394d1e-a87e-4b9b-a5e0-ff6b9a22fd78
vulnerability,CVE-2022-48922,vulnerability--2097f48b-532c-4024-87a6-4a5dc7c5d81e
vulnerability,CVE-2022-48913,vulnerability--81347644-7cc6-438c-aa07-2aa4b3bdb6d1
vulnerability,CVE-2022-48905,vulnerability--8d8358a7-1dff-4179-92e7-2d74cddcb8f4
vulnerability,CVE-2022-48918,vulnerability--2fd26090-8337-453a-b7e7-dc23b2fc153c
vulnerability,CVE-2022-48915,vulnerability--13c5b5a0-00ca-436c-98dd-d95d7ae6d404
vulnerability,CVE-2022-48935,vulnerability--8c6d7e53-6f06-4403-b8c1-489a07c3d978
vulnerability,CVE-2022-48943,vulnerability--e9377a72-1787-4ca3-aa8a-1f5168d5f71f
vulnerability,CVE-2022-48940,vulnerability--8a371200-14e1-42c0-9d2f-274f97968db3
vulnerability,CVE-2022-48934,vulnerability--346dc62d-5db4-47e2-a624-995bc9b9dda1
vulnerability,CVE-2022-48942,vulnerability--194dafce-a8d6-4212-9a5c-a9e751d43c0a
vulnerability,CVE-2022-48910,vulnerability--098f9d7c-1a0b-4ab2-babb-bbcffa9659a9
vulnerability,CVE-2022-48911,vulnerability--7ded9583-0d17-430c-8a96-9c3bdd11d917
vulnerability,CVE-2022-48929,vulnerability--32874e27-9c87-4529-abac-4e39078f382c
vulnerability,CVE-2022-48903,vulnerability--7952a05e-ff94-4396-9125-8ebaa73b9609
vulnerability,CVE-2022-48902,vulnerability--0c6284c1-fc58-451e-9b57-5c3c7b924e6f
vulnerability,CVE-2022-48932,vulnerability--8b579734-49e8-41d9-8c6e-5d885b8adb0c
vulnerability,CVE-2022-48916,vulnerability--18b15f03-2bbb-49f1-a33f-bc8108b93c98
vulnerability,CVE-2022-48906,vulnerability--58c4ea8b-70ee-46db-ab11-cf4634522c03
vulnerability,CVE-2022-48931,vulnerability--735e8ec1-b6ad-4442-829d-49fab6f61fbd
vulnerability,CVE-2022-48924,vulnerability--ed6a5881-e4db-48ab-a6e0-801f2eda6539
vulnerability,CVE-2021-4441,vulnerability--917ff001-170a-48cc-b2ab-80d8d4b7b51e
vulnerability,CVE-2024-40884,vulnerability--59b462b8-c083-4279-976f-08722d268f38
vulnerability,CVE-2024-40886,vulnerability--903c12bb-128a-4e4b-ab35-c69213a2f502
vulnerability,CVE-2024-42056,vulnerability--d08a29eb-bc1c-40fe-a7fb-e0adc05a087c
vulnerability,CVE-2024-42418,vulnerability--e8915762-5996-4e35-a6dc-6b6971099ebd
vulnerability,CVE-2024-42767,vulnerability--b4a900a8-cfc5-4274-9ef1-bc419e623eea
vulnerability,CVE-2024-42769,vulnerability--7af1b428-5566-4602-87a2-48d301f1a199
vulnerability,CVE-2024-42490,vulnerability--2f60afe3-4d9d-472b-b01a-9df40f2b965b
vulnerability,CVE-2024-42768,vulnerability--5488434d-dff0-4d85-801d-8527f0ef360c
vulnerability,CVE-2024-42772,vulnerability--d391b022-d892-4774-8ec7-df8d5abf29a6
vulnerability,CVE-2024-42599,vulnerability--9c6e462a-8125-4ef5-9447-a56f11ac0e41
vulnerability,CVE-2024-42411,vulnerability--e0bf2853-d977-4c16-978b-acf708e7949e
vulnerability,CVE-2024-42762,vulnerability--c9b3ac91-c31d-4fd2-b0e2-1f9f3314495d
vulnerability,CVE-2024-42775,vulnerability--fdf66df1-cd78-4228-b95d-248cacdacfbb
vulnerability,CVE-2024-42770,vulnerability--5f0ff48a-bb2a-4da5-8535-223326f72286
vulnerability,CVE-2024-42776,vulnerability--adc110f3-d5f7-4e9f-8da0-0b110a911a0c
vulnerability,CVE-2024-42773,vulnerability--5c90c528-128b-4b3b-b03a-dc221736066c
vulnerability,CVE-2024-42763,vulnerability--e8b7f343-73fe-446d-9345-2cf395d7388f
vulnerability,CVE-2024-42774,vulnerability--8eb05bec-e87f-4247-b348-d2a3faaf3542
vulnerability,CVE-2024-42771,vulnerability--f3dc84cf-493f-4d9e-990c-bb01a85be0fc
vulnerability,CVE-2024-42761,vulnerability--1c1c4ef9-6e88-42bb-b708-72bfc4a7f888
vulnerability,CVE-2024-42497,vulnerability--68e080fe-c461-4716-8301-622257d755c6
vulnerability,CVE-2024-38209,vulnerability--e6d37994-6cb9-4176-9a53-dec3a4a6ef60
vulnerability,CVE-2024-38210,vulnerability--8e4f89e6-aa88-47fe-96a9-2f033acdcbbb
vulnerability,CVE-2024-38208,vulnerability--a889e09c-4295-477e-81f8-d61622cbb6db
vulnerability,CVE-2024-36444,vulnerability--e1a3ed61-b949-4986-92d5-3b1bdce4d81f
vulnerability,CVE-2024-36445,vulnerability--b22084f2-c34b-4e02-ab4a-46a949843aae
vulnerability,CVE-2024-36439,vulnerability--60268af0-16bf-4cdd-9a98-61ba4553fc90
vulnerability,CVE-2024-36440,vulnerability--8fa1f79c-251a-4ce8-88cf-526dca65cb3e
vulnerability,CVE-2024-36443,vulnerability--374c260d-256c-4f9b-8765-3df5014b767f
vulnerability,CVE-2024-36442,vulnerability--46be382d-a438-47e8-ad48-5d785d687af8
vulnerability,CVE-2024-36441,vulnerability--6be096e2-f4ff-420c-97f4-857059956588
vulnerability,CVE-2024-7836,vulnerability--2ac03ed5-cc3b-4e79-a44e-81f064f07380
vulnerability,CVE-2024-7634,vulnerability--ab9d904e-b351-4ccc-83fa-f999a978c0e7
vulnerability,CVE-2024-7110,vulnerability--1d998ec4-a1d4-4999-a62c-90f840a9ac55
vulnerability,CVE-2024-7848,vulnerability--0664f910-385e-424f-b1b2-3d4426feb71a
vulnerability,CVE-2024-7778,vulnerability--06744872-dd45-4215-b11b-eea73b86186b
vulnerability,CVE-2024-7384,vulnerability--5210b489-856b-4734-9db4-5c8204c648c2
vulnerability,CVE-2024-39836,vulnerability--a5e9daef-8593-4df3-93e4-263bc6777535
vulnerability,CVE-2024-39576,vulnerability--3c6302f3-282a-4cc1-a55d-e53f0bb3f556
vulnerability,CVE-2024-39745,vulnerability--8e94a15f-a103-4659-a3dd-d75fbefc2685
vulnerability,CVE-2024-39810,vulnerability--55aee876-9af3-4222-8622-3e06ca42b536
vulnerability,CVE-2024-39744,vulnerability--ee0f4931-5113-46bd-98bb-3224a4c044aa
vulnerability,CVE-2024-39776,vulnerability--4f0f9b3d-34dd-44d0-9204-ff75e883efed
vulnerability,CVE-2024-39746,vulnerability--281032dd-fd68-4e69-a6b4-715eaf2930fc
vulnerability,CVE-2024-39717,vulnerability--44592313-df01-4a2a-b0b2-11cf26c60575
vulnerability,CVE-2024-43033,vulnerability--e8865892-9a50-4e4a-ad53-46e0bdd5d63e
vulnerability,CVE-2024-43398,vulnerability--c8bc9354-2eb7-4de5-b603-1914816f7b0a
vulnerability,CVE-2024-43790,vulnerability--04d9cf9c-e048-46c5-9732-7e6f8b7f2132
vulnerability,CVE-2024-43331,vulnerability--99730eb5-4968-443e-9bf8-93d436cf7c4e
vulnerability,CVE-2024-43780,vulnerability--5e76ad4c-0590-4699-9f76-ba4a1ad49b40
vulnerability,CVE-2024-43785,vulnerability--875b8b0e-2096-4b41-832e-94d8d2454b58
vulnerability,CVE-2024-43813,vulnerability--99fc773d-0557-4e02-9a15-cbd1ca4be4f4
vulnerability,CVE-2024-43787,vulnerability--e4c76dc9-6fa9-4594-84cf-9bdd88efd43b
vulnerability,CVE-2024-5583,vulnerability--691c48d8-9cd1-4386-8b6d-5113730317ba
vulnerability,CVE-2024-8072,vulnerability--e3b8511d-bbd1-44b1-938e-c7f42ceff138
vulnerability,CVE-2024-8071,vulnerability--fdae7072-5c1e-4cee-8f22-acd734acfda5
vulnerability,CVE-2024-8081,vulnerability--e99f706c-f2b5-4583-aef7-1b9ad4aa8bb3
vulnerability,CVE-2024-8075,vulnerability--c0e57f27-76e7-49b9-9166-ead06ca559fb
vulnerability,CVE-2024-8083,vulnerability--2060f577-a923-48b7-bc5a-ae517b68e05c
vulnerability,CVE-2024-8088,vulnerability--75fcaf04-0f08-4c5a-a7a1-cb28c48a1268
vulnerability,CVE-2024-8041,vulnerability--93ea1dae-be38-443f-8d45-b471d1adfa3a
vulnerability,CVE-2024-8078,vulnerability--655f887e-d379-4c61-85b3-217504de2ee4
vulnerability,CVE-2024-8086,vulnerability--0d6f01ff-aa11-412b-850e-d6a5e59ff780
vulnerability,CVE-2024-8080,vulnerability--81ecb962-58de-4369-a53c-5117561af26c
vulnerability,CVE-2024-8089,vulnerability--c1405b6e-ea21-4c08-975d-6582dd8e5b4d
vulnerability,CVE-2024-8079,vulnerability--cec4adfa-d5bf-4a3e-bc4f-0b81a8a14174
vulnerability,CVE-2024-8084,vulnerability--cf48250d-709b-4cac-8876-dbd569c8fba1
vulnerability,CVE-2024-8077,vulnerability--71fe0023-0b81-4dcc-9fe2-b6ce1bf2743b
vulnerability,CVE-2024-8076,vulnerability--e2e4511d-e048-45d3-b2a4-47be0a96bb2a
vulnerability,CVE-2024-8087,vulnerability--70829031-8bbc-4420-8f22-8fd2f4974711
vulnerability,CVE-2024-3127,vulnerability--3e5b9432-f515-438d-904a-97eb93d2a63a
vulnerability,CVE-2024-45168,vulnerability--c841e569-db73-49c0-95ed-71899f7c9abf
vulnerability,CVE-2024-45191,vulnerability--e9ebefcb-7aee-4905-9d61-3315f96fa3b8
vulnerability,CVE-2024-45167,vulnerability--9b1abf86-4327-4641-866a-17e0c6a9560c
vulnerability,CVE-2024-45201,vulnerability--e3b5239b-0b45-4a29-a850-7cd294db8ed6
vulnerability,CVE-2024-45166,vulnerability--d0abe792-fd68-444b-aa11-e9fc2ab43d84
vulnerability,CVE-2024-45165,vulnerability--e282c348-7485-414b-aaf9-67df01c887ec
vulnerability,CVE-2024-45163,vulnerability--1e5513bb-16e5-40e5-a10a-8abd941e0643
vulnerability,CVE-2024-45193,vulnerability--4811e357-634a-4f36-a655-1805c1423fd4
vulnerability,CVE-2024-45192,vulnerability--f2ed860e-3195-47dc-aef0-a3bed5bc5028
vulnerability,CVE-2024-45169,vulnerability--ca4905b2-8713-4531-a66b-cdb7c4f3f9b0
vulnerability,CVE-2024-6870,vulnerability--6c28cc64-e841-4806-83d2-6e2f72cda97a
vulnerability,CVE-2024-6502,vulnerability--c630221d-7bdd-4cec-963a-7eef68f1ed21
vulnerability,CVE-2024-35151,vulnerability--b6ff0c13-9ca1-4cef-9092-09ce3ef86968
vulnerability,CVE-2024-32939,vulnerability--0de901fb-95ee-4120-b962-48e5367e0dd8
vulnerability,CVE-2023-7260,vulnerability--97b3c281-bd85-48df-a89e-e2161e658950
vulnerability,CVE-2023-6452,vulnerability--2ed10d2c-9280-407b-a500-61950e497a3c
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4a858081-c9fd-4c8b-9115-0b5c70e44a30",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04d9cf9c-e048-46c5-9732-7e6f8b7f2132",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-23T00:18:38.556601Z",
"modified": "2024-08-23T00:18:38.556601Z",
"name": "CVE-2024-43790",
"description": "Vim is an open source command line text editor. When performing a search and displaying the search-count message is disabled (:set shm+=S), the search pattern is displayed at the bottom of the screen in a buffer (msgbuf). When right-left mode (:set rl) is enabled, the search pattern is reversed. This happens by allocating a new buffer. If the search pattern contains some ASCII NUL characters, the buffer allocated will be smaller than the original allocated buffer (because for allocating the reversed buffer, the strlen() function is called, which only counts until it notices an ASCII NUL byte ) and thus the original length indicator is wrong. This causes an overflow when accessing characters inside the msgbuf by the previously (now wrong) length of the msgbuf. The issue has been fixed as of Vim patch v9.1.0689.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43790"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0d95ca34-49da-4580-9834-410cb67fec3f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0664f910-385e-424f-b1b2-3d4426feb71a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-23T00:18:38.292793Z",
"modified": "2024-08-23T00:18:38.292793Z",
"name": "CVE-2024-7848",
"description": "The User Private Files – WordPress File Sharing Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.0 via the 'dpk_upvf_update_doc' due to missing validation on the 'docid' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to gain access to other user's private files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7848"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8551c352-0fde-4e12-9899-6e72658eded9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06744872-dd45-4215-b11b-eea73b86186b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-23T00:18:38.294685Z",
"modified": "2024-08-23T00:18:38.294685Z",
"name": "CVE-2024-7778",
"description": "The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.10.36 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7778"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7e237219-f8b9-45db-b610-f59d88da2e7c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--098f9d7c-1a0b-4ab2-babb-bbcffa9659a9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-23T00:18:25.244372Z",
"modified": "2024-08-23T00:18:25.244372Z",
"name": "CVE-2022-48910",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ipv6: ensure we call ipv6_mc_down() at most once\n\nThere are two reasons for addrconf_notify() to be called with NETDEV_DOWN:\neither the network device is actually going down, or IPv6 was disabled\non the interface.\n\nIf either of them stays down while the other is toggled, we repeatedly\ncall the code for NETDEV_DOWN, including ipv6_mc_down(), while never\ncalling the corresponding ipv6_mc_up() in between. This will cause a\nnew entry in idev->mc_tomb to be allocated for each multicast group\nthe interface is subscribed to, which in turn leaks one struct ifmcaddr6\nper nontrivial multicast group the interface is subscribed to.\n\nThe following reproducer will leak at least $n objects:\n\nip addr add ff2e::4242/32 dev eth0 autojoin\nsysctl -w net.ipv6.conf.eth0.disable_ipv6=1\nfor i in $(seq 1 $n); do\n\tip link set up eth0; ip link set down eth0\ndone\n\nJoining groups with IPV6_ADD_MEMBERSHIP (unprivileged) or setting the\nsysctl net.ipv6.conf.eth0.forwarding to 1 (=> subscribing to ff02::2)\ncan also be used to create a nontrivial idev->mc_list, which will the\nleak objects with the right up-down-sequence.\n\nBased on both sources for NETDEV_DOWN events the interface IPv6 state\nshould be considered:\n\n - not ready if the network interface is not ready OR IPv6 is disabled\n for it\n - ready if the network interface is ready AND IPv6 is enabled for it\n\nThe functions ipv6_mc_up() and ipv6_down() should only be run when this\nstate changes.\n\nImplement this by remembering when the IPv6 state is ready, and only\nrun ipv6_mc_down() if it actually changed from ready to not ready.\n\nThe other direction (not ready -> ready) already works correctly, as:\n\n - the interface notification triggered codepath for NETDEV_UP /\n NETDEV_CHANGE returns early if ipv6 is disabled, and\n - the disable_ipv6=0 triggered codepath skips fully initializing the\n interface as long as addrconf_link_ready(dev) returns false\n - calling ipv6_mc_up() repeatedly does not leak anything",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-48910"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b812a688-6a0b-4d9f-b5de-d171b2394310",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b02302d-a98e-46d9-8b1b-9c4b15416ae6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-23T00:18:25.176054Z",
"modified": "2024-08-23T00:18:25.176054Z",
"name": "CVE-2022-48939",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Add schedule points in batch ops\n\nsyzbot reported various soft lockups caused by bpf batch operations.\n\n INFO: task kworker/1:1:27 blocked for more than 140 seconds.\n INFO: task hung in rcu_barrier\n\nNothing prevents batch ops to process huge amount of data,\nwe need to add schedule points in them.\n\nNote that maybe_wait_bpf_programs(map) calls from\ngeneric_map_delete_batch() can be factorized by moving\nthe call after the loop.\n\nThis will be done later in -next tree once we get this fix merged,\nunless there is strong opinion doing this optimization sooner.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-48939"
}
]
}
]
}
Loading

0 comments on commit b55cd68

Please sign in to comment.