Skip to content

Commit

Permalink
generated content from 2024-10-21
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 21, 2024
1 parent c9ab3c2 commit fb832c3
Show file tree
Hide file tree
Showing 69 changed files with 1,564 additions and 0 deletions.
68 changes: 68 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -252539,3 +252539,71 @@ vulnerability,CVE-2024-9897,vulnerability--0b52753a-910f-412c-b8f5-52928bd98c79
vulnerability,CVE-2024-21536,vulnerability--ede08127-fdda-48be-a1c9-ce8fb6e9e556
vulnerability,CVE-2019-25218,vulnerability--d457265c-e166-47f6-b3f4-399204c5fcab
vulnerability,CVE-2023-6243,vulnerability--d1942d12-06ca-4c14-9db4-23f1edd98e81
vulnerability,CVE-2024-48049,vulnerability--8c2bbafa-eaba-4df2-995c-88e74fa1937d
vulnerability,CVE-2024-10166,vulnerability--28ed4ed6-b50a-4831-ad21-c8e02df5b8b5
vulnerability,CVE-2024-10191,vulnerability--1adc1feb-28a9-4fba-bde9-fc9f25ac8cce
vulnerability,CVE-2024-10167,vulnerability--e6acdfd3-8809-4296-aa41-76c3bc0dba38
vulnerability,CVE-2024-10192,vulnerability--21d0e2b6-1770-49db-8845-a2cf31050a30
vulnerability,CVE-2024-10194,vulnerability--020f347a-ba13-467a-bc97-726f5bf6affc
vulnerability,CVE-2024-10173,vulnerability--083c7ef8-6056-4a63-a869-1f604f7cded9
vulnerability,CVE-2024-10169,vulnerability--bed399b0-af70-4495-9856-8e17911a26d6
vulnerability,CVE-2024-10195,vulnerability--f2e2f8a7-d346-4a95-a052-b77e3dfede70
vulnerability,CVE-2024-10171,vulnerability--973eef17-a4fe-476f-8cd1-5e7fc3b3e0cf
vulnerability,CVE-2024-10170,vulnerability--5c142fb8-629f-44b0-a367-661d2a7038bb
vulnerability,CVE-2024-10161,vulnerability--119afeb9-03ca-4a16-9c03-3c3169ae9159
vulnerability,CVE-2024-10160,vulnerability--023e8771-f307-4ada-a061-103ffdb5c03e
vulnerability,CVE-2024-10163,vulnerability--a8fc786e-0897-415b-bed5-390471f70fc5
vulnerability,CVE-2024-10162,vulnerability--6ca78fe9-8cfd-4322-a2bd-652309248dad
vulnerability,CVE-2024-10193,vulnerability--03b52b4f-4b7e-47c7-954e-b37bd660adcc
vulnerability,CVE-2024-10165,vulnerability--e9ac2392-8d84-476d-91fb-f47957bb6a4d
vulnerability,CVE-2024-47325,vulnerability--18df1059-89fe-4b48-a118-abda9be0ed99
vulnerability,CVE-2024-47634,vulnerability--a3ab1e6b-9612-47b5-8397-dd6dd3bc239c
vulnerability,CVE-2024-44061,vulnerability--35388701-bf63-4a58-90fb-56d3173c2037
vulnerability,CVE-2024-44000,vulnerability--fa2912bd-d05a-445b-911c-7ed4fd6c9452
vulnerability,CVE-2024-49274,vulnerability--97ae60c3-5df4-400a-8418-1bc6251fbb97
vulnerability,CVE-2024-49323,vulnerability--e8ac9fb5-82df-48b1-b332-b0804e12119e
vulnerability,CVE-2024-49617,vulnerability--83397c04-b3ee-4478-bda8-ef6af1cae3de
vulnerability,CVE-2024-49250,vulnerability--c8acddfc-80ec-43ff-a0e7-33af14ffafe1
vulnerability,CVE-2024-49624,vulnerability--cb46ca21-305b-4252-a44b-e986159d3c3d
vulnerability,CVE-2024-49623,vulnerability--2c938905-9946-45a9-99d9-f3cc7d208d63
vulnerability,CVE-2024-49608,vulnerability--2a631f4d-239f-415b-86ed-3ba57736e7eb
vulnerability,CVE-2024-49627,vulnerability--27b1ca2f-dc93-4d47-ad75-428f0c5373f1
vulnerability,CVE-2024-49328,vulnerability--81aa6cab-418c-45f1-9a97-803f7cf64701
vulnerability,CVE-2024-49606,vulnerability--fbd0ac82-1c3e-4e6d-a3bc-74575cecd890
vulnerability,CVE-2024-49615,vulnerability--62e03ad0-cee6-4630-b9b0-c231777e9502
vulnerability,CVE-2024-49327,vulnerability--2769c26f-54c1-42fc-b333-7cebc14d3aee
vulnerability,CVE-2024-49625,vulnerability--042a89b6-3ef1-4268-a204-cb5d3388e72c
vulnerability,CVE-2024-49609,vulnerability--72e5dda0-7f76-4e68-8e51-8de64379145b
vulnerability,CVE-2024-49612,vulnerability--6d0e8692-7745-43f4-a6e9-35607588e054
vulnerability,CVE-2024-49628,vulnerability--798c5255-bd3e-4df8-a24d-d5dfbac413cb
vulnerability,CVE-2024-49335,vulnerability--04aa34d0-18bf-4ff7-af4d-7ae5392643f3
vulnerability,CVE-2024-49290,vulnerability--2b85a6d6-1a54-4d55-90bd-9526e639072e
vulnerability,CVE-2024-49610,vulnerability--30b10581-0b5c-41c5-9251-70ab770e74bb
vulnerability,CVE-2024-49620,vulnerability--bf1f77c9-78d7-443e-9eb6-ca4b0f65ad35
vulnerability,CVE-2024-49332,vulnerability--cb0ccea7-7f46-4a38-9eab-543479ae524a
vulnerability,CVE-2024-49325,vulnerability--f491cc08-0c1c-4cd2-91c4-ad1666dff6b0
vulnerability,CVE-2024-49275,vulnerability--0f72516e-0670-4cdb-9406-603a7428b0bc
vulnerability,CVE-2024-49621,vulnerability--e544758c-1c40-476d-82c4-be1da106fb09
vulnerability,CVE-2024-49611,vulnerability--02731c34-97c1-4cae-88aa-737a1b79130c
vulnerability,CVE-2024-49286,vulnerability--235f5622-11ec-45f8-97a8-6368d99fa2a0
vulnerability,CVE-2024-49329,vulnerability--2d7edf07-9233-4227-9f90-ba568bc667f6
vulnerability,CVE-2024-49618,vulnerability--d6552329-dee0-4c4a-ab0b-b105b3e79478
vulnerability,CVE-2024-49605,vulnerability--39f13a9e-4a67-4e27-9480-7401deb9ec09
vulnerability,CVE-2024-49330,vulnerability--b161df04-8d40-4a7c-8f16-3d219cdade32
vulnerability,CVE-2024-49630,vulnerability--a9599ae0-8a65-4f68-abbe-da98cec1f080
vulnerability,CVE-2024-49626,vulnerability--c439da7f-2e2d-43d9-9645-3e01a341840d
vulnerability,CVE-2024-49324,vulnerability--7c0405f0-23b3-4bb8-8944-0e3602262ca1
vulnerability,CVE-2024-49614,vulnerability--86f3869c-70e8-4710-92f4-f1c332f22e0f
vulnerability,CVE-2024-49604,vulnerability--60c0a60f-3f4c-43ae-9317-4263b86bd3f0
vulnerability,CVE-2024-49631,vulnerability--b68447dc-0cae-4128-9c03-bb8fe85bff70
vulnerability,CVE-2024-49334,vulnerability--d262a96e-ccc0-47ea-8623-a26d2c160356
vulnerability,CVE-2024-49619,vulnerability--0435f45f-5818-4d53-a814-eaaf824ec4cd
vulnerability,CVE-2024-49272,vulnerability--e7c991cb-6102-4320-81b9-cf506aabc7be
vulnerability,CVE-2024-49607,vulnerability--876a4dfb-2ea7-4383-801b-0ef6a7513bc2
vulnerability,CVE-2024-49306,vulnerability--97771110-b4e3-4471-b067-00a363652b65
vulnerability,CVE-2024-49331,vulnerability--0ac3230e-0bf7-4b4a-87fd-85cd5e178a31
vulnerability,CVE-2024-49326,vulnerability--ac64f250-e5cc-4da1-af2d-d3f6c8ed535f
vulnerability,CVE-2024-49629,vulnerability--f14a1d75-b90e-4e47-915b-43eb7f2587ef
vulnerability,CVE-2024-49616,vulnerability--0d45da94-8555-4740-98e4-6536e3c238e5
vulnerability,CVE-2024-49613,vulnerability--2096f920-df6d-4c02-b5ae-025c393ca53f
vulnerability,CVE-2024-49622,vulnerability--9b116cf8-e5f3-4c60-b724-b32a98a57001
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7edc0b08-a457-4198-b53f-e83b7e0266d9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--020f347a-ba13-467a-bc97-726f5bf6affc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:32.643725Z",
"modified": "2024-10-21T00:21:32.643725Z",
"name": "CVE-2024-10194",
"description": "A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10194"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bdca0ff5-0400-4de2-8498-64f39dbde3d0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--023e8771-f307-4ada-a061-103ffdb5c03e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:32.65356Z",
"modified": "2024-10-21T00:21:32.65356Z",
"name": "CVE-2024-10160",
"description": "A vulnerability, which was classified as critical, has been found in PHPGurukul Boat Booking System 1.0. Affected by this issue is some unknown functionality of the file /admin/bwdates-report-details.php of the component BW Dates Report Page. The manipulation of the argument fdate/tdate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter \"fdate\" to be affected. But it must be assumed \"tdate\" is affected as well.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10160"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--af7bf7cf-761d-4cb3-8e50-f00289aa1a63",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02731c34-97c1-4cae-88aa-737a1b79130c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:33.816059Z",
"modified": "2024-10-21T00:21:33.816059Z",
"name": "CVE-2024-49611",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Paxman Product Website Showcase allows Upload a Web Shell to a Web Server.This issue affects Product Website Showcase: from n/a through 1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49611"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a6be8707-dbea-4f90-a2d4-060d1eb579c7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03b52b4f-4b7e-47c7-954e-b37bd660adcc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:32.657552Z",
"modified": "2024-10-21T00:21:32.657552Z",
"name": "CVE-2024-10193",
"description": "A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028 and classified as critical. This issue affects the function ping_ddns of the file internet.cgi. The manipulation of the argument DDNS leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10193"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--46ac18af-bf52-4f3d-957b-4977032a2584",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--042a89b6-3ef1-4268-a204-cb5d3388e72c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:33.798996Z",
"modified": "2024-10-21T00:21:33.798996Z",
"name": "CVE-2024-49625",
"description": "Deserialization of Untrusted Data vulnerability in Brandon Clark SiteBuilder Dynamic Components allows Object Injection.This issue affects SiteBuilder Dynamic Components: from n/a through 1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49625"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--58483d49-82a7-4deb-a954-46a6176c27f9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0435f45f-5818-4d53-a814-eaaf824ec4cd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:33.845575Z",
"modified": "2024-10-21T00:21:33.845575Z",
"name": "CVE-2024-49619",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Acespritech Solutions Pvt. Ltd. Social Link Groups allows Blind SQL Injection.This issue affects Social Link Groups: from n/a through 1.1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49619"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3683fe6c-7336-4da9-9b85-88c1be78e4e8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04aa34d0-18bf-4ff7-af4d-7ae5392643f3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:33.804644Z",
"modified": "2024-10-21T00:21:33.804644Z",
"name": "CVE-2024-49335",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Edush Maxim GoogleDrive folder list allows Stored XSS.This issue affects GoogleDrive folder list: from n/a through 2.2.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49335"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--64a269eb-4e3d-4862-b134-7ec577ec2f13",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--083c7ef8-6056-4a63-a869-1f604f7cded9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:32.644848Z",
"modified": "2024-10-21T00:21:32.644848Z",
"name": "CVE-2024-10173",
"description": "A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10173"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e6137c76-dab7-4e14-853c-c4c4ef892250",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ac3230e-0bf7-4b4a-87fd-85cd5e178a31",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:33.852953Z",
"modified": "2024-10-21T00:21:33.852953Z",
"name": "CVE-2024-49331",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Myriad Solutionz Property Lot Management System allows Upload a Web Shell to a Web Server.This issue affects Property Lot Management System: from n/a through 4.2.38.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49331"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4a7db5cd-3517-4f70-bbf5-dd3b9ec63382",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d45da94-8555-4740-98e4-6536e3c238e5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:33.856104Z",
"modified": "2024-10-21T00:21:33.856104Z",
"name": "CVE-2024-49616",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nyasro Rate Own Post allows Blind SQL Injection.This issue affects Rate Own Post: from n/a through 1.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49616"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b62d3310-1a08-464a-9f22-61a855366bc6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f72516e-0670-4cdb-9406-603a7428b0bc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:33.813132Z",
"modified": "2024-10-21T00:21:33.813132Z",
"name": "CVE-2024-49275",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Martin Gibson IdeaPush allows Cross Site Request Forgery.This issue affects IdeaPush: from n/a through 8.69.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49275"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3c374952-5682-448e-9b50-f4e194a3ee02",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--119afeb9-03ca-4a16-9c03-3c3169ae9159",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:32.651298Z",
"modified": "2024-10-21T00:21:32.651298Z",
"name": "CVE-2024-10161",
"description": "A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. This affects an unknown part of the file change-image.php of the component Update Boat Image Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10161"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d3092f26-7f9c-4b75-8879-ec1a772ba9f2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18df1059-89fe-4b48-a118-abda9be0ed99",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-21T00:21:32.793806Z",
"modified": "2024-10-21T00:21:32.793806Z",
"name": "CVE-2024-47325",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeisle Multiple Page Generator Plugin – MPG allows SQL Injection.This issue affects Multiple Page Generator Plugin – MPG: from n/a through 3.4.7.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47325"
}
]
}
]
}
Loading

0 comments on commit fb832c3

Please sign in to comment.