Skip to content

Commit

Permalink
generated content from 2024-11-26
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 26, 2024
1 parent 3de0eec commit 4973408
Show file tree
Hide file tree
Showing 74 changed files with 1,679 additions and 0 deletions.
73 changes: 73 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -257732,3 +257732,76 @@ vulnerability,CVE-2024-53914,vulnerability--3d419a03-2a61-49e6-ae77-d17eba855d4e
vulnerability,CVE-2024-53911,vulnerability--f784b659-0e66-4855-80d3-21c2c14c4e06
vulnerability,CVE-2024-53915,vulnerability--cbd1cdd8-fb56-4767-a3fc-0b0d1bf0afdc
vulnerability,CVE-2024-53899,vulnerability--7fb02c6d-69f2-4174-90e2-7a0cfd6e8845
vulnerability,CVE-2024-51723,vulnerability--aa598c6d-9adc-4db2-9da8-7f33d42b6e2d
vulnerability,CVE-2024-52529,vulnerability--f8440396-dcbb-4b91-aeb5-a3fe8e77ef45
vulnerability,CVE-2024-52787,vulnerability--0d267e92-f88d-4528-bcec-8324b18b4a1a
vulnerability,CVE-2024-52811,vulnerability--96e8cf0b-3caf-4c10-b9fc-46e9ed1d9101
vulnerability,CVE-2024-45755,vulnerability--24bf0792-6821-4d96-a6ea-c22a8866bc70
vulnerability,CVE-2024-45756,vulnerability--69f57ec5-fe34-40ef-b4b4-7af1fef802de
vulnerability,CVE-2024-10270,vulnerability--2316d058-9794-42f4-81d1-c10fd0cdbd15
vulnerability,CVE-2024-10710,vulnerability--d13d6d4c-d1a7-429d-a35f-4c66318f0198
vulnerability,CVE-2024-10451,vulnerability--75d873ae-df25-43c2-bb23-a612bb026868
vulnerability,CVE-2024-10492,vulnerability--85299bb3-8cda-403c-89b4-40c302d76410
vulnerability,CVE-2024-10709,vulnerability--f62a8657-7cef-45c9-bff6-6f888b6b8bc7
vulnerability,CVE-2024-9666,vulnerability--ae2dac61-64c4-47bc-a4cd-5bed7ecf667d
vulnerability,CVE-2024-50672,vulnerability--3012dcc9-dd5a-4816-8f4b-bce4ed953ff3
vulnerability,CVE-2024-50671,vulnerability--6453e02f-9010-49d4-8ea8-a8473da2bc33
vulnerability,CVE-2024-7915,vulnerability--f6df5a43-79d5-4b5d-bcc7-42eccb771de1
vulnerability,CVE-2024-7056,vulnerability--a641d065-ef5f-419a-aeb4-49accf724779
vulnerability,CVE-2024-11651,vulnerability--aa1d2f44-391e-46ed-97dd-e0ff9702d318
vulnerability,CVE-2024-11498,vulnerability--94facfd9-67a3-460e-8cea-792e5b0ceb3f
vulnerability,CVE-2024-11657,vulnerability--6b341259-c806-4996-98e1-f0808136ebe3
vulnerability,CVE-2024-11647,vulnerability--261081f9-da0f-45a6-97ca-741997d83460
vulnerability,CVE-2024-11648,vulnerability--7240dec6-5f49-4a43-a2fc-d53b609a3df2
vulnerability,CVE-2024-11660,vulnerability--f211c1f3-8e2c-4aef-9ab5-b84aa71046b0
vulnerability,CVE-2024-11663,vulnerability--a928c22f-f6cb-4b3c-9ad7-09a6b365f6e5
vulnerability,CVE-2024-11659,vulnerability--0dc99921-9cba-4e51-96bf-44a086c5314c
vulnerability,CVE-2024-11674,vulnerability--ad7dcc7e-b55f-476f-83cc-8cec346dfd9e
vulnerability,CVE-2024-11483,vulnerability--c3a0a868-a10e-4d18-82a3-ce6fc2e12c5d
vulnerability,CVE-2024-11658,vulnerability--16edb476-2469-4c82-8998-be4d158e9b59
vulnerability,CVE-2024-11656,vulnerability--02fb64c6-a030-4712-b17f-dbf960c087ce
vulnerability,CVE-2024-11652,vulnerability--e50d80e6-6aae-4140-b28a-d67f62213592
vulnerability,CVE-2024-11649,vulnerability--a64b67dd-9347-420c-ac3f-d041c485d6d7
vulnerability,CVE-2024-11664,vulnerability--5686e4e1-33af-4faa-989d-aa895312e6f7
vulnerability,CVE-2024-11655,vulnerability--f83a0107-d037-48e2-b5c7-a680749759d1
vulnerability,CVE-2024-11671,vulnerability--e4cbb225-8bf7-4807-8bb7-210c20bf82da
vulnerability,CVE-2024-11403,vulnerability--83e04e8f-6262-4fb2-9f07-9b593f323abc
vulnerability,CVE-2024-11672,vulnerability--bb4e1983-288f-41bd-b434-14ad10b1611e
vulnerability,CVE-2024-11653,vulnerability--f123fdb4-fb72-4918-bd61-077f6cb9409a
vulnerability,CVE-2024-11650,vulnerability--80e67362-a90b-421f-8a49-33b015c0a675
vulnerability,CVE-2024-11661,vulnerability--d154720b-297a-4bec-809b-5d3fd2d01b47
vulnerability,CVE-2024-11662,vulnerability--2c9bae72-ccb3-44b2-b9fa-223d15e6574d
vulnerability,CVE-2024-11673,vulnerability--be483057-8fad-4121-8d91-f5d655ac4ca7
vulnerability,CVE-2024-11654,vulnerability--815d5e4c-52ba-4c98-a3d2-c540b02b7956
vulnerability,CVE-2024-11670,vulnerability--759153b5-3c95-452d-8298-5a8125886d04
vulnerability,CVE-2024-53101,vulnerability--5a5d4d96-89bd-4e1f-9f1b-ba9cec28c95a
vulnerability,CVE-2024-53096,vulnerability--3e8d43ed-386e-426e-8746-bdf468742bea
vulnerability,CVE-2024-53102,vulnerability--ca7aa8ad-a2ac-4804-8785-1ef7634c70b6
vulnerability,CVE-2024-53258,vulnerability--8d665a2e-7e98-4a8a-a48b-9667f18f9da6
vulnerability,CVE-2024-53556,vulnerability--0288ca6b-035e-4c09-ad81-57a8a32a7809
vulnerability,CVE-2024-53255,vulnerability--88d27a3b-f0ac-4139-ae8c-8a17bb4e88c5
vulnerability,CVE-2024-53098,vulnerability--fc8a231f-bf21-4709-854d-86204e094cc3
vulnerability,CVE-2024-53597,vulnerability--923be98c-463a-4850-bc83-606b258c9ccc
vulnerability,CVE-2024-53261,vulnerability--674602da-0f50-4e12-8f11-1977a57b86a2
vulnerability,CVE-2024-53097,vulnerability--3d73d791-ed2f-4131-83a9-91bed2117820
vulnerability,CVE-2024-53100,vulnerability--8e5e130e-1df4-44d7-aaf4-01f310c43638
vulnerability,CVE-2024-53099,vulnerability--12a29398-3556-451b-8f45-39449d190cdb
vulnerability,CVE-2024-53843,vulnerability--ea5e23c2-e765-4262-b2c4-54687533d86c
vulnerability,CVE-2024-53262,vulnerability--57743b5c-00fd-459e-9336-bc398b413ce3
vulnerability,CVE-2024-53930,vulnerability--fea1c417-214d-4de7-8641-c2d32cd9de9e
vulnerability,CVE-2024-53554,vulnerability--e710dcc8-523a-488e-bd3e-e3ec1e00384e
vulnerability,CVE-2024-53599,vulnerability--e9a39785-3ee8-41d6-9a96-c6313ae23851
vulnerability,CVE-2024-53268,vulnerability--0512a308-4bf1-42e5-9df5-e3e2205921ef
vulnerability,CVE-2024-8272,vulnerability--e0381604-98f7-401d-9e49-d1b6fc0c1eb8
vulnerability,CVE-2024-32468,vulnerability--f2c5fce6-c99f-4e4b-99cd-768043991366
vulnerability,CVE-2024-27134,vulnerability--b1d8de43-6af5-419f-9dae-265507aa68c3
vulnerability,CVE-2024-6538,vulnerability--7c23e8f3-0550-4efe-8c20-14e59b76d3f3
vulnerability,CVE-2024-6393,vulnerability--f4b2a9a2-d9de-419f-a3c8-deb2e3526576
vulnerability,CVE-2021-23282,vulnerability--f4b4cd43-b743-4e54-be4e-67de5897926e
vulnerability,CVE-2022-33861,vulnerability--cc934916-9ba1-4ae6-b54e-a23fbdf5fc42
vulnerability,CVE-2022-33862,vulnerability--8af65061-8d5a-4532-b2aa-14bd8bd31356
vulnerability,CVE-2023-45181,vulnerability--8cf04b58-0357-46df-8602-531e4cdc41d3
vulnerability,CVE-2023-26280,vulnerability--5e6f1a57-9325-40c2-a7ae-8850ef2c09c0
vulnerability,CVE-2020-12492,vulnerability--98ea4ef4-4705-4232-bf21-4f2fe8baa163
vulnerability,CVE-2020-12491,vulnerability--46029916-8234-4625-a4ee-1b11b7bb3da8
vulnerability,CVE-2020-11311,vulnerability--8c827b77-8d7a-42ef-8294-2374771f14a4
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--14ba53e9-14ec-4f27-873b-7dd9c91616c5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0288ca6b-035e-4c09-ad81-57a8a32a7809",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.422267Z",
"modified": "2024-11-26T00:38:59.422267Z",
"name": "CVE-2024-53556",
"description": "An Open Redirect vulnerability in Taiga v6.8.1 allows attackers to redirect users to arbitrary websites via appending a crafted link to /login?next= in the login page URL.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53556"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--832b8d27-fb8a-4463-9ce8-649a1b78dfda",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02fb64c6-a030-4712-b17f-dbf960c087ce",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.148448Z",
"modified": "2024-11-26T00:38:59.148448Z",
"name": "CVE-2024-11656",
"description": "A vulnerability, which was classified as critical, has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This issue affects some unknown processing of the file /admin/network/diag_ping6. The manipulation of the argument diag_ping6 leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11656"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b61b3752-6e14-4543-ae64-ca316d407db0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0512a308-4bf1-42e5-9df5-e3e2205921ef",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.468256Z",
"modified": "2024-11-26T00:38:59.468256Z",
"name": "CVE-2024-53268",
"description": "Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53268"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e853c0bf-c036-401f-b26a-a7c404a46da5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d267e92-f88d-4528-bcec-8324b18b4a1a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:58.556187Z",
"modified": "2024-11-26T00:38:58.556187Z",
"name": "CVE-2024-52787",
"description": "An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52787"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1cf4ef6c-cfb3-4dc4-908d-50131bcc9ee5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0dc99921-9cba-4e51-96bf-44a086c5314c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.139956Z",
"modified": "2024-11-26T00:38:59.139956Z",
"name": "CVE-2024-11659",
"description": "A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/network/diag_iperf. The manipulation of the argument iperf leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11659"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0fd7101b-284e-4a58-a7ba-8447374ce165",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12a29398-3556-451b-8f45-39449d190cdb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.452634Z",
"modified": "2024-11-26T00:38:59.452634Z",
"name": "CVE-2024-53099",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check validity of link->type in bpf_link_show_fdinfo()\n\nIf a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing\nbpf_link_type_strs[link->type] may result in an out-of-bounds access.\n\nTo spot such missed invocations early in the future, checking the\nvalidity of link->type in bpf_link_show_fdinfo() and emitting a warning\nwhen such invocations are missed.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53099"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--afcfd569-eb36-41d6-8cf2-fb2d4df4bd3c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16edb476-2469-4c82-8998-be4d158e9b59",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.14744Z",
"modified": "2024-11-26T00:38:59.14744Z",
"name": "CVE-2024-11658",
"description": "A vulnerability has been found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/network/ajax_getChannelList. The manipulation of the argument countryCode leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11658"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c5f1f114-4029-4a74-b4de-0f6c3d71b714",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2316d058-9794-42f4-81d1-c10fd0cdbd15",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:58.668143Z",
"modified": "2024-11-26T00:38:58.668143Z",
"name": "CVE-2024-10270",
"description": "A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10270"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9ed1a7e6-10ac-41cb-8520-43b04ef7b66c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--24bf0792-6821-4d96-a6ea-c22a8866bc70",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:58.641073Z",
"modified": "2024-11-26T00:38:58.641073Z",
"name": "CVE-2024-45755",
"description": "An issue was discovered in Centreon centreon-dsm-server 24.10.x before 24.10.0, 24.04.x before 24.04.3, 23.10.x before 23.10.1, 23.04.x before 23.04.3, and 22.10.x before 22.10.2. SQL injection can occur in the form to configure Centreon DSM slots. Exploitation is only accessible to authenticated users with high-privileged access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45755"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--57d0ae7b-f197-445a-81ed-54a470229d24",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--261081f9-da0f-45a6-97ca-741997d83460",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.129811Z",
"modified": "2024-11-26T00:38:59.129811Z",
"name": "CVE-2024-11647",
"description": "A vulnerability, which was classified as critical, has been found in 1000 Projects Beauty Parlour Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11647"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--59091e30-771e-42b5-923a-91e0881f193f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2c9bae72-ccb3-44b2-b9fa-223d15e6574d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:59.172475Z",
"modified": "2024-11-26T00:38:59.172475Z",
"name": "CVE-2024-11662",
"description": "A vulnerability was found in welliamcao OpsManage 3.0.1/3.0.2/3.0.3/3.0.4/3.0.5. It has been rated as critical. This issue affects the function deploy_host_vars of the file /apps/api/views/deploy_api.py of the component API Endpoint. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11662"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--34871d72-68d8-4f51-ae72-527ff2bc879b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3012dcc9-dd5a-4816-8f4b-bce4ed953ff3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-26T00:38:58.931612Z",
"modified": "2024-11-26T00:38:58.931612Z",
"name": "CVE-2024-50672",
"description": "A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50672"
}
]
}
]
}
Loading

0 comments on commit 4973408

Please sign in to comment.