Skip to content

Commit

Permalink
generated content from 2024-10-20
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 20, 2024
1 parent a3fe28b commit c9ab3c2
Show file tree
Hide file tree
Showing 25 changed files with 552 additions and 0 deletions.
24 changes: 24 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -252515,3 +252515,27 @@ vulnerability,CVE-2023-6058,vulnerability--7f307ae8-4bfa-4cc8-a0ce-e04027aceb83
vulnerability,CVE-2023-6080,vulnerability--280802f1-5e1d-4576-b5bc-5760713b3a9d
vulnerability,CVE-2023-6056,vulnerability--516787b0-203f-4608-868b-855579b58f40
vulnerability,CVE-2023-6055,vulnerability--7b202bc5-074f-4566-8347-50e5fb123fe3
vulnerability,CVE-2024-10155,vulnerability--ed39f684-2876-4c7b-ad91-e93716cd83db
vulnerability,CVE-2024-10135,vulnerability--8e75a650-c3b8-4359-b7e2-27f4d9382b81
vulnerability,CVE-2024-10157,vulnerability--4fd0c482-02c2-446d-a911-f326ada5a47c
vulnerability,CVE-2024-10140,vulnerability--e8f733ce-3f55-493d-9dd5-1012caa4207d
vulnerability,CVE-2024-10159,vulnerability--a51da581-f1fb-4fc2-8815-7599605a2324
vulnerability,CVE-2024-10158,vulnerability--a3ddc20e-8e65-486f-9e50-4df6309efb49
vulnerability,CVE-2024-10136,vulnerability--9447376d-6c81-400a-a4c4-3378acb55a46
vulnerability,CVE-2024-10138,vulnerability--f2441301-62b1-4e7f-bc69-21078c854d11
vulnerability,CVE-2024-10154,vulnerability--38e8519b-f3ae-4e1a-b1e2-32c87058e50e
vulnerability,CVE-2024-10142,vulnerability--90519449-ba8a-4782-8ed3-26d8d0a92f49
vulnerability,CVE-2024-10133,vulnerability--037bef8a-5bc1-44cd-b3f2-57fb506d1fbb
vulnerability,CVE-2024-10137,vulnerability--01ab8844-a180-4000-aaf8-3242a802b8e9
vulnerability,CVE-2024-10134,vulnerability--2820138c-4c5a-48eb-8017-6ca96a4e5216
vulnerability,CVE-2024-10156,vulnerability--256548a7-da77-4d71-9b1e-e95ef6a8c16b
vulnerability,CVE-2024-10139,vulnerability--1c9f4769-ecd6-4911-ae35-33d125866023
vulnerability,CVE-2024-10131,vulnerability--1422891a-566d-4fba-b0c5-2b1b147d6459
vulnerability,CVE-2024-10141,vulnerability--d7111c00-0336-4622-93b1-1a81bcffa8ba
vulnerability,CVE-2024-10153,vulnerability--fd47ce34-5468-41c5-9f4b-4819f5ce2dc6
vulnerability,CVE-2024-9889,vulnerability--b34b227d-7064-49a6-9c42-a45db648e699
vulnerability,CVE-2024-9219,vulnerability--c0f8d8c2-40e4-4e1c-9107-3936e3266a62
vulnerability,CVE-2024-9897,vulnerability--0b52753a-910f-412c-b8f5-52928bd98c79
vulnerability,CVE-2024-21536,vulnerability--ede08127-fdda-48be-a1c9-ce8fb6e9e556
vulnerability,CVE-2019-25218,vulnerability--d457265c-e166-47f6-b3f4-399204c5fcab
vulnerability,CVE-2023-6243,vulnerability--d1942d12-06ca-4c14-9db4-23f1edd98e81
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0329a46d-df8e-44a8-8c9f-9539319e682a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01ab8844-a180-4000-aaf8-3242a802b8e9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.739052Z",
"modified": "2024-10-20T00:22:47.739052Z",
"name": "CVE-2024-10137",
"description": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /manage_medicine.php?action=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10137"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--261c341e-1f78-4806-ac29-d605d39df824",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--037bef8a-5bc1-44cd-b3f2-57fb506d1fbb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.737735Z",
"modified": "2024-10-20T00:22:47.737735Z",
"name": "CVE-2024-10133",
"description": "A vulnerability has been found in ESAFENET CDG 5 and classified as critical. Affected by this vulnerability is the function updateNetSecPolicyPriority of the file /com/esafenet/servlet/ajax/NetSecPolicyAjax.java. The manipulation of the argument id/frontId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10133"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6fa1e9ff-a35a-4976-b093-c79a3800e961",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b52753a-910f-412c-b8f5-52928bd98c79",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.777007Z",
"modified": "2024-10-20T00:22:47.777007Z",
"name": "CVE-2024-9897",
"description": "The StreamWeasels Twitch Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sw-twitch-embed shortcode in all versions up to, and including, 1.8.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9897"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a359a45a-e1d4-40cf-a1f6-7663b22f7929",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1422891a-566d-4fba-b0c5-2b1b147d6459",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.74397Z",
"modified": "2024-10-20T00:22:47.74397Z",
"name": "CVE-2024-10131",
"description": "The `add_llm` function in `llm_app.py` in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input `req['llm_factory']` and `req['llm_name']` to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for 'llm_factory' that, when used as an index to these model dictionaries, results in the execution of arbitrary code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10131"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9f9bba22-4032-42c4-be3d-4c862582233b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c9f4769-ecd6-4911-ae35-33d125866023",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.743074Z",
"modified": "2024-10-20T00:22:47.743074Z",
"name": "CVE-2024-10139",
"description": "A vulnerability classified as critical was found in code-projects Pharmacy Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /add_new_supplier.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10139"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--71befcc7-17c0-4a11-8ce0-cfd8a3233307",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--256548a7-da77-4d71-9b1e-e95ef6a8c16b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.741468Z",
"modified": "2024-10-20T00:22:47.741468Z",
"name": "CVE-2024-10156",
"description": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/index.php of the component Sign In Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10156"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--04fc218d-401f-40b8-815d-77a0467ab8d5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2820138c-4c5a-48eb-8017-6ca96a4e5216",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.740386Z",
"modified": "2024-10-20T00:22:47.740386Z",
"name": "CVE-2024-10134",
"description": "A vulnerability was found in ESAFENET CDG 5 and classified as critical. Affected by this issue is the function connectLogout of the file /com/esafenet/servlet/ajax/MultiServerAjax.java. The manipulation of the argument servername leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10134"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--554ae201-2490-4b1e-b47c-19f0807e6c3c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--38e8519b-f3ae-4e1a-b1e2-32c87058e50e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.733768Z",
"modified": "2024-10-20T00:22:47.733768Z",
"name": "CVE-2024-10154",
"description": "A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file status.php of the component Check Booking Status Page. The manipulation of the argument emailid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10154"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--38402c06-7d69-41cb-ab18-a58d98fbf2cb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4fd0c482-02c2-446d-a911-f326ada5a47c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.724336Z",
"modified": "2024-10-20T00:22:47.724336Z",
"name": "CVE-2024-10157",
"description": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10157"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8080fe82-619f-4908-bc99-69a451fe9a49",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--8e75a650-c3b8-4359-b7e2-27f4d9382b81",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.72016Z",
"modified": "2024-10-20T00:22:47.72016Z",
"name": "CVE-2024-10135",
"description": "A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. This affects the function actionDelNetSecConfig of the file /com/esafenet/servlet/netSec/NetSecConfigService.java. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10135"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--615fc5d6-7073-461a-b8dc-ba678078a4fd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--90519449-ba8a-4782-8ed3-26d8d0a92f49",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.735064Z",
"modified": "2024-10-20T00:22:47.735064Z",
"name": "CVE-2024-10142",
"description": "A vulnerability has been found in code-projects Blood Bank System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /viewrequest.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10142"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2a2fd029-a6e5-4845-a827-27292887bdf7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9447376d-6c81-400a-a4c4-3378acb55a46",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.730855Z",
"modified": "2024-10-20T00:22:47.730855Z",
"name": "CVE-2024-10136",
"description": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /manage_invoice.php. The manipulation of the argument invoice_number leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10136"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--22155f48-5d65-408c-8ba7-9ebb6fff53dd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a3ddc20e-8e65-486f-9e50-4df6309efb49",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.728355Z",
"modified": "2024-10-20T00:22:47.728355Z",
"name": "CVE-2024-10158",
"description": "A vulnerability classified as problematic has been found in PHPGurukul Boat Booking System 1.0. Affected is the function session_start. The manipulation leads to session fixiation. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10158"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--573a53d3-c8d9-43b5-b225-a67c4bbcaea9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a51da581-f1fb-4fc2-8815-7599605a2324",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.727163Z",
"modified": "2024-10-20T00:22:47.727163Z",
"name": "CVE-2024-10159",
"description": "A vulnerability classified as critical was found in PHPGurukul Boat Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/profile.php of the component My Profile Page. The manipulation of the argument sadminusername/fullname/emailid/mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"mobilenumber\" to be affected. But it must be assumed that other parameters are affected as well.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10159"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5d50bd83-eb18-487d-b6c2-7bc30d9337a6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b34b227d-7064-49a6-9c42-a45db648e699",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-20T00:22:47.753534Z",
"modified": "2024-10-20T00:22:47.753534Z",
"name": "CVE-2024-9889",
"description": "The ElementInvader Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.9 via the Page Loader widget. This makes it possible for authenticated attackers, with contributor-level access and above, to view private/draft/password protected posts, pages, and Elementor templates that they should not have access to.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9889"
}
]
}
]
}
Loading

0 comments on commit c9ab3c2

Please sign in to comment.