Skip to content

Commit

Permalink
generated content from 2024-09-06
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 6, 2024
1 parent 10e277a commit fcdf3b6
Show file tree
Hide file tree
Showing 67 changed files with 1,518 additions and 0 deletions.
66 changes: 66 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -248321,3 +248321,69 @@ vulnerability,CVE-2024-45075,vulnerability--aac05c24-1b97-43ec-bccf-96802f013d86
vulnerability,CVE-2024-45442,vulnerability--6d148919-b744-4279-87de-a7477ca5b36f
vulnerability,CVE-2024-45000,vulnerability--308e7756-305b-4fc9-891c-aac0c97df13c
vulnerability,CVE-2024-45445,vulnerability--18bc1acc-188f-40d7-a09e-4522c09ff04c
vulnerability,CVE-2022-4529,vulnerability--871d4c13-389f-4e0f-a515-0f827d73ebc0
vulnerability,CVE-2022-3556,vulnerability--aff25504-0e3e-4069-80ab-79da9663cddd
vulnerability,CVE-2024-32668,vulnerability--d818f45e-d364-4a69-8dab-f3c749ffc1a0
vulnerability,CVE-2024-44727,vulnerability--b4c81e77-9361-4fe6-ae21-fbd6cca0b3cc
vulnerability,CVE-2024-44728,vulnerability--9b4a8e30-3308-4ce2-90a7-000ec0da0373
vulnerability,CVE-2024-44587,vulnerability--3b202641-9835-4b4a-80c8-2f8180fe5095
vulnerability,CVE-2024-6846,vulnerability--def89ab8-1f34-418a-8183-a3058e7cbebd
vulnerability,CVE-2024-6332,vulnerability--fa9fc879-f3db-4233-8e1e-f357b59e1265
vulnerability,CVE-2024-6894,vulnerability--96ef19e4-6590-45bb-b955-3633653a86ea
vulnerability,CVE-2024-6929,vulnerability--0070f632-b172-4996-be55-a8b694fc5e83
vulnerability,CVE-2024-6835,vulnerability--cdede777-d353-4349-8abc-2e7477b9002f
vulnerability,CVE-2024-42416,vulnerability--f3695e3d-8204-4784-8008-0b6938ca7dc3
vulnerability,CVE-2024-42495,vulnerability--7aa3a43a-770d-4b82-9974-f23f6c682e3c
vulnerability,CVE-2024-42885,vulnerability--6fa453de-80ee-4e2d-b56e-a7ee3dc3e351
vulnerability,CVE-2024-42491,vulnerability--c0654265-783e-4124-954f-a4582be7161a
vulnerability,CVE-2024-24759,vulnerability--12be7ef2-672e-497e-be92-5484ab0adbd2
vulnerability,CVE-2024-8465,vulnerability--79dd1f7d-44fb-4eb6-aade-491ca0666082
vulnerability,CVE-2024-8469,vulnerability--0d55ee6a-3bf2-4975-88e3-5895bee4134a
vulnerability,CVE-2024-8470,vulnerability--0d5776f6-00f4-4674-bfad-b1501b9b7538
vulnerability,CVE-2024-8467,vulnerability--d9e4867b-3918-4fbb-a09d-04ef9970296b
vulnerability,CVE-2024-8462,vulnerability--5d893c7c-e320-4e60-b1d6-12c3671db3cb
vulnerability,CVE-2024-8463,vulnerability--c9074b4b-f507-49e4-b9fc-fe4d3620e407
vulnerability,CVE-2024-8466,vulnerability--646a1507-9b92-4445-b496-b6bf0b733805
vulnerability,CVE-2024-8473,vulnerability--4076c72d-b275-4c22-a934-4f03b4abaa57
vulnerability,CVE-2024-8468,vulnerability--4a90fc72-958a-4e53-8300-5f82b773ea90
vulnerability,CVE-2024-8445,vulnerability--e52fd78a-504e-4631-bf19-f86155e58382
vulnerability,CVE-2024-8471,vulnerability--41a3767e-aef2-4f6d-83fe-7365a3081a5d
vulnerability,CVE-2024-8464,vulnerability--da704e4e-02a7-41d1-82da-5ebc56235e87
vulnerability,CVE-2024-8460,vulnerability--5c254e3c-da56-4f2c-bade-650eb8b5c1f6
vulnerability,CVE-2024-8472,vulnerability--799ce09b-a121-423f-b8cf-392b6b869c02
vulnerability,CVE-2024-8363,vulnerability--df9d1e9d-707d-4187-afc2-ca8218a112c4
vulnerability,CVE-2024-8461,vulnerability--89f6d74b-71b7-4061-8d16-782fd7b6f391
vulnerability,CVE-2024-8178,vulnerability--3c1a49e4-581e-4baf-a476-929d0593fd60
vulnerability,CVE-2024-8395,vulnerability--0000a3c8-8dc9-4130-b5d3-2941c2cdfff2
vulnerability,CVE-2024-39278,vulnerability--1a48796a-aa25-4109-b64a-7864ee0ff189
vulnerability,CVE-2024-7380,vulnerability--ad661eb2-507d-4c65-a885-94dcf9f0e09d
vulnerability,CVE-2024-7381,vulnerability--b291deef-6fd1-4080-8622-f4851a48ece5
vulnerability,CVE-2024-7884,vulnerability--38738356-24b6-4e86-9396-0b9f09d6982a
vulnerability,CVE-2024-7605,vulnerability--45fa97cf-8eab-411f-a8a4-a622e56711d3
vulnerability,CVE-2024-7591,vulnerability--640e72bc-7c23-4590-837b-43f5a5a2fc65
vulnerability,CVE-2024-7627,vulnerability--b161c477-eb70-4f7d-89e2-08022d62e65c
vulnerability,CVE-2024-41928,vulnerability--ed1e156a-b783-4e77-be8e-e6f977d5fd2e
vulnerability,CVE-2024-43102,vulnerability--efac7f5d-ee24-4029-8402-3ab33c9cc446
vulnerability,CVE-2024-43110,vulnerability--2f79f83b-57c4-40b1-8aa6-da735ff54802
vulnerability,CVE-2024-5957,vulnerability--ebc45e03-99fb-45b9-83d5-4314d926de52
vulnerability,CVE-2024-5956,vulnerability--7a48f5bf-d83c-486c-9620-bd90ffda4a6b
vulnerability,CVE-2024-5309,vulnerability--985015a3-31d6-4d80-8f5c-e0b7fb073217
vulnerability,CVE-2024-45287,vulnerability--3d2b9a49-40af-41cd-8281-63290a5de77a
vulnerability,CVE-2024-45288,vulnerability--b1bbae15-0c3f-4370-ae85-01b9d2a23329
vulnerability,CVE-2024-45173,vulnerability--d09f3505-bd06-41c6-b193-2debccc087b7
vulnerability,CVE-2024-45176,vulnerability--d48efdf8-5000-4be3-b1b3-f88dff49eb99
vulnerability,CVE-2024-45096,vulnerability--eaaeac43-bf97-4a5c-b3b4-27ecbae6016a
vulnerability,CVE-2024-45097,vulnerability--a76d06bc-774b-47e7-82fb-2052a567de06
vulnerability,CVE-2024-45098,vulnerability--56f33290-ee53-4afd-9c1a-f1ecfdfe3b19
vulnerability,CVE-2024-45159,vulnerability--1cc6e31f-4982-42b6-b9bb-fd1abadc4af5
vulnerability,CVE-2024-45063,vulnerability--ea8a9e98-6158-4a57-bb9d-f8fc207685c0
vulnerability,CVE-2024-45171,vulnerability--eb98006c-842c-4575-a06d-9f0954c496cd
vulnerability,CVE-2024-45158,vulnerability--f3a6e181-bc94-4112-b0fe-5a6a7b9039a5
vulnerability,CVE-2024-45589,vulnerability--86d0f027-9635-46e1-bd02-1073ff6f7fba
vulnerability,CVE-2024-45400,vulnerability--287eddf1-f7e4-45ad-b62f-1627f72ec296
vulnerability,CVE-2024-45392,vulnerability--49c2f9ee-2512-46b0-ba8e-09ff247afca9
vulnerability,CVE-2024-45175,vulnerability--b4d3ce73-6bdf-4931-beb2-ef4bf2b95001
vulnerability,CVE-2024-45178,vulnerability--6c39c783-8bb9-47f0-bd81-82fd64d1e4c2
vulnerability,CVE-2024-45157,vulnerability--4f08b094-acd3-4e3f-b3f3-9842c2a20a19
vulnerability,CVE-2024-45107,vulnerability--c8669e9b-5b84-4f52-9b0d-724f74ce09d1
vulnerability,CVE-2023-51712,vulnerability--89483cdd-6076-428e-9048-b4cc655fecde
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fb7f8106-e146-4467-88a1-7265b5867374",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0000a3c8-8dc9-4130-b5d3-2941c2cdfff2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:30.052896Z",
"modified": "2024-09-06T00:19:30.052896Z",
"name": "CVE-2024-8395",
"description": "FlyCASS CASS and KCM systems did not correctly filter SQL queries, which\n made them vulnerable to attack by outside attackers with no \nauthentication.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8395"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7d432a9e-4974-4466-a433-9107eaad80e6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0070f632-b172-4996-be55-a8b694fc5e83",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:29.429529Z",
"modified": "2024-09-06T00:19:29.429529Z",
"name": "CVE-2024-6929",
"description": "The Dynamic Featured Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘dfiFeatured’ parameter in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6929"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4c793649-cc36-4bd7-b151-547f94f270da",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d55ee6a-3bf2-4975-88e3-5895bee4134a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:30.012748Z",
"modified": "2024-09-06T00:19:30.012748Z",
"name": "CVE-2024-8469",
"description": "SQL injection vulnerability, by which an attacker could send a specially designed query through id parameter in /jobportal/admin/employee/index.php, and retrieve all the information stored in it.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8469"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9d06fd9d-a805-4404-974f-432740e878e5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d5776f6-00f4-4674-bfad-b1501b9b7538",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:30.014789Z",
"modified": "2024-09-06T00:19:30.014789Z",
"name": "CVE-2024-8470",
"description": "SQL injection vulnerability, by which an attacker could send a specially designed query through CATEGORY parameter in /jobportal/admin/vacancy/controller.php, and retrieve all the information stored in it.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8470"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d1e085bc-3cc3-43b2-a8b9-874a3a840854",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12be7ef2-672e-497e-be92-5484ab0adbd2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:29.643668Z",
"modified": "2024-09-06T00:19:29.643668Z",
"name": "CVE-2024-24759",
"description": "MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 23.12.4.2, a threat actor can bypass the server-side request forgery protection on the whole website with DNS Rebinding. The vulnerability can also lead to denial of service. Version 23.12.4.2 contains a patch.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24759"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--22692a62-62e8-4ead-b90d-6ce895d81fe8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1a48796a-aa25-4109-b64a-7864ee0ff189",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:30.180542Z",
"modified": "2024-09-06T00:19:30.180542Z",
"name": "CVE-2024-39278",
"description": "Credentials to access device configuration information stored unencrypted in flash memory. These credentials would allow read-only access to network configuration information and terminal configuration data.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39278"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--59bc6838-5155-47b6-876c-0b19c5a2d400",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1cc6e31f-4982-42b6-b9bb-fd1abadc4af5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:31.025181Z",
"modified": "2024-09-06T00:19:31.025181Z",
"name": "CVE-2024-45159",
"description": "An issue was discovered in Mbed TLS 3.x before 3.6.1. With TLS 1.3, when a server enables optional authentication of the client, if the client-provided certificate does not have appropriate values in if keyUsage or extKeyUsage extensions, then the return value of mbedtls_ssl_get_verify_result() would incorrectly have the MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_KEY_USAGE bits clear. As a result, an attacker that had a certificate valid for uses other than TLS client authentication would nonetheless be able to use it for TLS client authentication. Only TLS 1.3 servers were affected, and only with optional authentication (with required authentication, the handshake would be aborted with a fatal alert).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45159"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a57de014-2944-4636-b0ad-67c7a9d261c4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--287eddf1-f7e4-45ad-b62f-1627f72ec296",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:31.04097Z",
"modified": "2024-09-06T00:19:31.04097Z",
"name": "CVE-2024-45400",
"description": "ckeditor-plugin-openlink is a plugin for the CKEditor JavaScript text editor that extends the context menu with a possibility to open a link in a new tab. A vulnerability in versions of the plugin prior to 1.0.7 allowed a user to execute JavaScript code by abusing the link href attribute. The fix is available starting with version 1.0.7.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45400"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fa0894bc-40bd-444b-8069-b2fd4c66d2ed",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2f79f83b-57c4-40b1-8aa6-da735ff54802",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:30.73588Z",
"modified": "2024-09-06T00:19:30.73588Z",
"name": "CVE-2024-43110",
"description": "The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace.\n\nMalicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43110"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5a0538e9-1013-47b4-a1ff-f483280f5d6b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--38738356-24b6-4e86-9396-0b9f09d6982a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:30.590313Z",
"modified": "2024-09-06T00:19:30.590313Z",
"name": "CVE-2024-7884",
"description": "When a canister method is called via ic_cdk::call* , a new Future CallFuture is created and can be awaited by the caller to get the execution result. Internally, the state of the Future is tracked and stored in a struct called CallFutureState. A bug in the polling implementation of the CallFuture allows multiple references to be held for this internal state and not all references were dropped before the Future is resolved. Since we have unaccounted references held, a copy of the internal state ended up being persisted in the canister's heap and thus causing a memory leak. \nImpact Canisters built in Rust with ic_cdk and ic_cdk_timers are affected. If these canisters call a canister method, use timers or heartbeat, they will likely leak a small amount of memory on every such operation. In the worst case, this could lead to heap memory exhaustion triggered by an attacker. Motoko based canisters are not affected by the bug.\nPatchesThe patch has been backported to all minor versions between >= 0.8.0, <= 0.15.0. The patched versions available are 0.8.2, 0.9.3, 0.10.1, 0.11.6, 0.12.2, 0.13.5, 0.14.1, 0.15.1 and their previous versions have been yanked. WorkaroundsThere are no known workarounds at the moment. Developers are recommended to upgrade their canister as soon as possible to the latest available patched version of ic_cdk to avoid running out of Wasm heap memory. \nUpgrading the canisters (without updating `ic_cdk`) also frees the leaked memory but it's only a temporary solution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7884"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fd77fbc9-9bef-418e-a3ab-b60449cec815",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3b202641-9835-4b4a-80c8-2f8180fe5095",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:29.155103Z",
"modified": "2024-09-06T00:19:29.155103Z",
"name": "CVE-2024-44587",
"description": "itsourcecode Alton Management System 1.0 is vulnerable to SQL Injection in /noncombo_save.php via the \"menu\" parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44587"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--32d16996-3dea-46b0-8a5e-78964b7ae5eb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3c1a49e4-581e-4baf-a476-929d0593fd60",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-06T00:19:30.048171Z",
"modified": "2024-09-06T00:19:30.048171Z",
"name": "CVE-2024-8178",
"description": "The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it.\n\nMalicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8178"
}
]
}
]
}
Loading

0 comments on commit fcdf3b6

Please sign in to comment.