Skip to content

Commit

Permalink
generated content from 2024-08-31
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 31, 2024
1 parent 838d275 commit daf0b6e
Show file tree
Hide file tree
Showing 63 changed files with 1,426 additions and 0 deletions.
62 changes: 62 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -247909,3 +247909,65 @@ vulnerability,CVE-2024-6672,vulnerability--63aa2838-6c7e-4153-981b-5696c17060a4
vulnerability,CVE-2024-6671,vulnerability--09b0d7c6-30ba-4697-ae58-4dbf214ff3ef
vulnerability,CVE-2024-35118,vulnerability--216adadb-f9b9-45d6-9eb3-433d4e519e8b
vulnerability,CVE-2024-35133,vulnerability--2f67c5b0-b070-459d-9bbb-e4a85d64a525
vulnerability,CVE-2022-48944,vulnerability--840186d9-d28e-47aa-9460-c56038ff33ca
vulnerability,CVE-2024-44916,vulnerability--41ad692d-3db0-41f0-8d22-893d34a35d49
vulnerability,CVE-2024-44683,vulnerability--bea095a9-845d-4c46-8556-8910699a5af3
vulnerability,CVE-2024-44918,vulnerability--3fb8d3f1-cf63-4107-a793-08c6ce409676
vulnerability,CVE-2024-44684,vulnerability--19052056-8bfc-4985-9d7c-2c6df24ef46e
vulnerability,CVE-2024-44944,vulnerability--4ef1c767-1971-46fd-8276-a68c1c9051d8
vulnerability,CVE-2024-44682,vulnerability--2bf38061-5ade-400e-a348-0ba6debd728e
vulnerability,CVE-2024-34577,vulnerability--28552071-ad50-4dd4-9e96-b0b8a6aeb180
vulnerability,CVE-2024-2694,vulnerability--a9e529f0-4047-4cec-aff5-f11513813d7d
vulnerability,CVE-2024-42412,vulnerability--15aee1c6-24c9-4286-8a00-d6cb1ad9121d
vulnerability,CVE-2024-38868,vulnerability--1994ce87-63d6-44de-b67d-82d27c09fbb7
vulnerability,CVE-2024-7122,vulnerability--31d0a008-dfc9-4b5b-ba38-6088cc1f743c
vulnerability,CVE-2024-7858,vulnerability--1ca6b75c-a476-4584-b7bd-76dce51bb6f8
vulnerability,CVE-2024-39300,vulnerability--45bf86ef-e7ec-4c89-958b-35a92d97534e
vulnerability,CVE-2024-5061,vulnerability--4b79afb3-9d0c-44c5-9895-d66d9404c350
vulnerability,CVE-2024-5024,vulnerability--57c526ee-7673-4700-ae4b-be951f105bca
vulnerability,CVE-2024-5879,vulnerability--a2984885-ee3b-475f-99c8-25f0e233968f
vulnerability,CVE-2024-5784,vulnerability--703e8d32-bc69-464f-b30d-3186a61169f8
vulnerability,CVE-2024-21658,vulnerability--07c4aab1-a418-48a7-8898-dbfb5cb41920
vulnerability,CVE-2024-4401,vulnerability--016903f3-df45-464f-b5f8-e9104b9c1968
vulnerability,CVE-2024-8319,vulnerability--a617276b-b9af-4e95-a232-8dc9c600e891
vulnerability,CVE-2024-8330,vulnerability--23897315-08a9-428b-b4e7-4ac3bacb3e50
vulnerability,CVE-2024-8347,vulnerability--2494adcc-fbaa-460e-9f2a-4f5a9f5f6476
vulnerability,CVE-2024-8328,vulnerability--26871db3-9062-49ce-8260-d12a7e12c484
vulnerability,CVE-2024-8334,vulnerability--a3417e69-9531-4ecb-8727-bc0a4b55ccc7
vulnerability,CVE-2024-8340,vulnerability--128bdb2f-c568-4e84-87a8-950578394902
vulnerability,CVE-2024-8331,vulnerability--880a1359-21a5-448a-ab9f-19b716c3cad8
vulnerability,CVE-2024-8346,vulnerability--66bb8385-4fdb-453a-a90c-648c7aaf441d
vulnerability,CVE-2024-8345,vulnerability--f3583055-669c-40e6-93d0-fb84579473be
vulnerability,CVE-2024-8339,vulnerability--df481a05-1097-44fa-932a-084045cf1002
vulnerability,CVE-2024-8342,vulnerability--5cbc4583-e5b7-4752-b9bc-03e32c279148
vulnerability,CVE-2024-8343,vulnerability--568a9e1d-61a0-42c7-ac8f-002ae7c6196e
vulnerability,CVE-2024-8329,vulnerability--6dc864e0-d35d-4f06-876d-6390e185c87a
vulnerability,CVE-2024-8016,vulnerability--da926a17-7a7d-44ef-abec-038e8eca38fa
vulnerability,CVE-2024-8336,vulnerability--86ddf85d-52b7-45d3-86aa-023a52e8cc41
vulnerability,CVE-2024-8332,vulnerability--70701b79-47e5-45c4-ae95-6cf56c4fd5a2
vulnerability,CVE-2024-8338,vulnerability--ecbcec98-86cb-4bcc-9b02-2c51c4940202
vulnerability,CVE-2024-8341,vulnerability--6755826a-b169-4968-83a6-c264c50a2538
vulnerability,CVE-2024-8327,vulnerability--62dbfd15-4a3d-472a-b59c-706995aa2f1a
vulnerability,CVE-2024-8348,vulnerability--ab71845d-667e-4e0f-abfa-1befbe8a364b
vulnerability,CVE-2024-8006,vulnerability--826112b5-80a7-4e8b-9c8a-bdd2caaa62f9
vulnerability,CVE-2024-8235,vulnerability--01c6f1e7-5678-4f40-858c-0a6d86428672
vulnerability,CVE-2024-8335,vulnerability--a9eb61e6-4236-43b6-b19b-d68c951ea96b
vulnerability,CVE-2024-8344,vulnerability--65d73fda-500d-4854-8227-3ab016c48239
vulnerability,CVE-2024-8252,vulnerability--e25bb2c9-fc48-48b5-adaa-1ac342b25bda
vulnerability,CVE-2024-8285,vulnerability--39da29d7-b9a0-4e0f-99b1-752ac80429e6
vulnerability,CVE-2024-8234,vulnerability--d067a6e4-acf7-4373-b975-c87ec744a362
vulnerability,CVE-2024-8337,vulnerability--d58bd510-91d9-4060-85d3-fe16e5fc4b64
vulnerability,CVE-2024-8274,vulnerability--408e2af4-5875-4b77-9eae-5095329463f6
vulnerability,CVE-2024-8260,vulnerability--52b7a877-4bf0-4d27-a2c0-7f7182ca090b
vulnerability,CVE-2024-3673,vulnerability--d71750d8-d437-468b-af3d-c9fe738ac283
vulnerability,CVE-2024-3998,vulnerability--21249973-c182-41bf-af8b-fcd24fcb78d8
vulnerability,CVE-2024-45491,vulnerability--46291480-c087-455d-9b66-998bf3052b7b
vulnerability,CVE-2024-45304,vulnerability--f7f5b8a5-be4a-49bd-a844-dfedf8079fe2
vulnerability,CVE-2024-45488,vulnerability--c0228721-f485-41b6-9072-61e3c2b08021
vulnerability,CVE-2024-45490,vulnerability--6c783cee-f8a2-4aa4-a945-83af392e8128
vulnerability,CVE-2024-45492,vulnerability--ef617e45-2767-4427-84ba-249a5036383f
vulnerability,CVE-2024-45047,vulnerability--26f230a3-d229-4158-bacc-010d50aa3719
vulnerability,CVE-2024-6585,vulnerability--fba5630b-985a-41c0-9b9a-02f08174f586
vulnerability,CVE-2024-6586,vulnerability--60ad1133-d36e-4dfa-948c-8349276a2ed8
vulnerability,CVE-2024-6204,vulnerability--3ec1e1d4-845d-4546-ac3a-97d6604c9890
vulnerability,CVE-2023-7256,vulnerability--1e106ff1-cd8f-42af-afe2-a6eb298462ab
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ae3f880f-32bd-45ba-9802-2d00f6ea3c6c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--016903f3-df45-464f-b5f8-e9104b9c1968",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.881256Z",
"modified": "2024-08-31T00:19:15.881256Z",
"name": "CVE-2024-4401",
"description": "The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ and 'eae_slider_animation' parameters in all versions up to, and including, 1.13.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-4401"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--15e6354e-b7e1-4446-9ebd-6ab2b979ae07",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01c6f1e7-5678-4f40-858c-0a6d86428672",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.950705Z",
"modified": "2024-08-31T00:19:15.950705Z",
"name": "CVE-2024-8235",
"description": "A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8235"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--28a17591-1da2-4301-9251-85816ea6b3f1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07c4aab1-a418-48a7-8898-dbfb5cb41920",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.754739Z",
"modified": "2024-08-31T00:19:15.754739Z",
"name": "CVE-2024-21658",
"description": "discourse-calendar is a discourse plugin which adds the ability to create a dynamic calendar in the first post of a topic. The limit on region value length is too generous. This allows a malicious actor to cause a Discourse instance to use excessive bandwidth and disk space. This issue has been patched in main the main branch. There are no workarounds for this vulnerability. Please upgrade as soon as possible.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21658"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2ac839e2-08ed-420e-a7aa-347521f1a5a0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--128bdb2f-c568-4e84-87a8-950578394902",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.928553Z",
"modified": "2024-08-31T00:19:15.928553Z",
"name": "CVE-2024-8340",
"description": "A vulnerability classified as critical has been found in SourceCodester Electric Billing Management System 1.0. This affects an unknown part of the file /Actions.php?a=login. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8340"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--66e9d9e9-46e0-4ab8-85ea-98336a466bef",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15aee1c6-24c9-4286-8a00-d6cb1ad9121d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:14.722707Z",
"modified": "2024-08-31T00:19:14.722707Z",
"name": "CVE-2024-42412",
"description": "Cross-site scripting vulnerability exists in WAB-I1750-PS and WAB-S1167-PS due to improper processing of input values in menu.cgi. If a user views a malicious web page while logged in to the product, an arbitrary script may be executed on the user's web browser.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42412"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--546fcf48-a2dc-4f0d-a7e9-966aa0c7d4d2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19052056-8bfc-4985-9d7c-2c6df24ef46e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:14.290954Z",
"modified": "2024-08-31T00:19:14.290954Z",
"name": "CVE-2024-44684",
"description": "TpMeCMS 1.3.3.2 is vulnerable to Cross Site Scripting (XSS) in /h.php/page?ref=addtabs via the \"Title,\" \"Images,\" and \"Content\" fields.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44684"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--eb2f96f3-e993-4d40-91a8-548cc9fba2da",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1994ce87-63d6-44de-b67d-82d27c09fbb7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:14.843399Z",
"modified": "2024-08-31T00:19:14.843399Z",
"name": "CVE-2024-38868",
"description": "Zohocorp ManageEngine Endpoint Central affected by Incorrect authorization vulnerability while isolating the devices.This issue affects Endpoint Central: before 11.3.2406.08 and before 11.3.2400.15",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38868"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e25bee74-3942-4dc5-88d7-332a96cfec9c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ca6b75c-a476-4584-b7bd-76dce51bb6f8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.116961Z",
"modified": "2024-08-31T00:19:15.116961Z",
"name": "CVE-2024-7858",
"description": "The Media Library Folders plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several AJAX functions in the media-library-plus.php file in all versions up to, and including, 8.2.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform several actions related to managing media files and folder along with controlling settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7858"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d9f29d16-cb49-45d1-98f0-39efe3eebaed",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e106ff1-cd8f-42af-afe2-a6eb298462ab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:17.21439Z",
"modified": "2024-08-31T00:19:17.21439Z",
"name": "CVE-2023-7256",
"description": "In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-7256"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e0275665-ec0b-460e-8ec8-34f6d7d4242a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21249973-c182-41bf-af8b-fcd24fcb78d8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.985248Z",
"modified": "2024-08-31T00:19:15.985248Z",
"name": "CVE-2024-3998",
"description": "The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 27.5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-3998"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--01e6919a-0269-437f-b120-bcab9a80e308",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23897315-08a9-428b-b4e7-4ac3bacb3e50",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.918921Z",
"modified": "2024-08-31T00:19:15.918921Z",
"name": "CVE-2024-8330",
"description": "6SHR system from Gether Technology does not properly validate uploaded file types, allowing remote attackers with regular privileges to upload web shell scripts and use them to execute arbitrary system commands on the server.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8330"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9b34f468-4c1b-4989-ba54-6d577c3cc27c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2494adcc-fbaa-460e-9f2a-4f5a9f5f6476",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.920425Z",
"modified": "2024-08-31T00:19:15.920425Z",
"name": "CVE-2024-8347",
"description": "A vulnerability classified as critical was found in SourceCodester Computer Laboratory Management System 1.0. Affected by this vulnerability is the function delete_record of the file /classes/Master.php?f=delete_record. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8347"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cfae4aea-c299-4c3c-b92b-6baa40ccb119",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--26871db3-9062-49ce-8260-d12a7e12c484",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-08-31T00:19:15.923605Z",
"modified": "2024-08-31T00:19:15.923605Z",
"name": "CVE-2024-8328",
"description": "Easy test Online Learning and Testing Platform from HWA JIUH DIGITAL TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with regular privilege to inject arbitrary JavaScript code and perform Reflected Cross-site scripting attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8328"
}
]
}
]
}
Loading

0 comments on commit daf0b6e

Please sign in to comment.