Skip to content

Commit

Permalink
generated content from 2024-11-28
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 28, 2024
1 parent 5de6065 commit 5bd29b1
Show file tree
Hide file tree
Showing 83 changed files with 1,886 additions and 0 deletions.
82 changes: 82 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -257967,3 +257967,85 @@ vulnerability,CVE-2018-11922,vulnerability--044a87cb-bf6d-4965-ad2c-3ccb203baf73
vulnerability,CVE-2018-11816,vulnerability--a3fe0e4f-722f-4ca0-bd09-a3e866b21b07
vulnerability,CVE-2018-11952,vulnerability--006b445c-c8db-497a-8593-6c7709e4682c
vulnerability,CVE-2018-5852,vulnerability--2efa976a-d8cf-44a2-b773-53ef3a320e12
vulnerability,CVE-2017-13323,vulnerability--d8f1dd91-a88a-4080-bfcc-1a591169de01
vulnerability,CVE-2017-13320,vulnerability--02b3da40-5591-4da1-8ad4-3727db3bb1a8
vulnerability,CVE-2017-13316,vulnerability--87e864db-0506-4f0f-ba23-79689e69e9bf
vulnerability,CVE-2017-13319,vulnerability--814b18b1-c6d0-485d-9a87-2d4c129f8d74
vulnerability,CVE-2017-13321,vulnerability--c7424481-e005-4209-99b4-81b4dc9de8ea
vulnerability,CVE-2024-51228,vulnerability--6fb09801-4b1e-4172-962a-2f78548b2beb
vulnerability,CVE-2024-52951,vulnerability--8b5e1aa1-4dfa-4b1d-a34d-3f50d13db771
vulnerability,CVE-2024-52959,vulnerability--e76d5e14-0bbb-487e-acaf-c7ec11576528
vulnerability,CVE-2024-52958,vulnerability--ad8efe78-50a1-471e-8339-4ddfa1344d17
vulnerability,CVE-2024-52323,vulnerability--2264538f-1047-4c58-928e-a4a7670dc8d4
vulnerability,CVE-2024-10521,vulnerability--dad1f50b-9b6f-401d-9800-45335b9de384
vulnerability,CVE-2024-10580,vulnerability--23784a4b-25c1-4e3b-b98b-0657e59f0208
vulnerability,CVE-2024-10175,vulnerability--f293b536-8bff-4d6d-ac51-5065503226f3
vulnerability,CVE-2024-10895,vulnerability--ce02435c-940e-46b2-a240-a52eb6f1f977
vulnerability,CVE-2024-9369,vulnerability--4d74826c-c69e-42d4-a3dd-3b8d694cd572
vulnerability,CVE-2024-47181,vulnerability--c41f5b35-0ec6-420c-9198-0a9bfb7b83d6
vulnerability,CVE-2024-7025,vulnerability--776fddf3-3c4e-4f26-8daa-c2c26d4932b7
vulnerability,CVE-2024-11820,vulnerability--a11acc95-16de-4c27-8a15-e7a474e6a6a6
vulnerability,CVE-2024-11083,vulnerability--9304b836-a31d-4d4b-a135-245cee7b8b62
vulnerability,CVE-2024-11794,vulnerability--23919414-afe8-4ac3-b21e-d755320df8de
vulnerability,CVE-2024-11797,vulnerability--23404828-47ac-48fe-8704-97309fc863d8
vulnerability,CVE-2024-11795,vulnerability--9d467bda-8ac7-4613-b268-463fdcd615e5
vulnerability,CVE-2024-11796,vulnerability--cf69a794-abc4-4acd-8a88-ee23f6d66acf
vulnerability,CVE-2024-11667,vulnerability--56529271-d25d-4be0-998d-776000de2b4c
vulnerability,CVE-2024-11792,vulnerability--a285cd3d-11a7-46ba-8581-283ab26d6e83
vulnerability,CVE-2024-11219,vulnerability--08a763a5-14a5-4af7-8e29-7f15fd86d681
vulnerability,CVE-2024-11803,vulnerability--c150078c-b727-49ae-a98b-3e778b7149c5
vulnerability,CVE-2024-11791,vulnerability--69b15f8f-1611-47f3-a136-fca87f2f0d7d
vulnerability,CVE-2024-11860,vulnerability--01a5acde-6b06-4220-9187-db20fc11d926
vulnerability,CVE-2024-11799,vulnerability--e782c835-5e59-4376-b437-3f084131070c
vulnerability,CVE-2024-11801,vulnerability--7cf04352-ac3d-4469-bf33-0145e5d7e0e2
vulnerability,CVE-2024-11025,vulnerability--3e3d06fc-e5de-49c5-bf84-c2f390e9d08a
vulnerability,CVE-2024-11862,vulnerability--91f838db-0e66-444e-8cc5-fdf57798770f
vulnerability,CVE-2024-11800,vulnerability--4a540c0f-d1b8-403c-8387-30ce6e128a9b
vulnerability,CVE-2024-11790,vulnerability--10bc4712-9b2f-477f-8fbe-d7eadf77c3c6
vulnerability,CVE-2024-11789,vulnerability--6a2bdd29-2310-46c8-b6a3-d9216f641115
vulnerability,CVE-2024-11802,vulnerability--62d0a18c-7ddc-4b67-ba7c-401449d3782d
vulnerability,CVE-2024-11787,vulnerability--9a11e5e8-ece4-44ba-a4ce-ce0099a02bac
vulnerability,CVE-2024-11798,vulnerability--bb8b2971-158a-4a69-ac5c-cdd6e1bc475a
vulnerability,CVE-2024-11793,vulnerability--ebf3c556-d282-405f-9d66-29e9b67b8c34
vulnerability,CVE-2024-11009,vulnerability--4737f09a-ec23-4757-8fb9-a0e354c26852
vulnerability,CVE-2024-11933,vulnerability--81a67b5f-b307-4650-b1e2-ae98a72cb7d1
vulnerability,CVE-2024-53859,vulnerability--f5710f6d-2721-4d76-91c0-643260696cab
vulnerability,CVE-2024-53676,vulnerability--92b2ffea-2f3b-47a2-b2b2-7e40385c05dc
vulnerability,CVE-2024-53604,vulnerability--377fa5cd-655c-4699-afba-8b5591f83007
vulnerability,CVE-2024-53264,vulnerability--ee7456b3-f867-4863-bfd0-7faa55e87b36
vulnerability,CVE-2024-53603,vulnerability--ae69eacf-40c1-465a-98b6-a01350550a46
vulnerability,CVE-2024-53858,vulnerability--b8fd3e77-03f6-4a3e-9c41-eb5623ef1e40
vulnerability,CVE-2024-53920,vulnerability--f24d2e5a-99d1-47ba-b989-b8f995f4cae4
vulnerability,CVE-2024-53860,vulnerability--d503eb41-9557-4765-9819-b11bcc769ea6
vulnerability,CVE-2024-53260,vulnerability--49a61f57-43ad-42d0-a85e-a659a683c052
vulnerability,CVE-2024-53855,vulnerability--9d89ef29-1750-4860-9a20-16e9b56eec54
vulnerability,CVE-2024-53635,vulnerability--b9e85ce6-c1cf-4fda-bdb7-890274f13bbc
vulnerability,CVE-2024-31976,vulnerability--5dd5501c-1dd7-47c9-bf1d-3e980d76d43f
vulnerability,CVE-2024-41126,vulnerability--5c8d421e-fb5f-4d7f-a635-7c0fde873c53
vulnerability,CVE-2024-41125,vulnerability--a95870ff-a2f6-423d-abf4-1d8c5eafebba
vulnerability,CVE-2024-21703,vulnerability--b646a0cb-bda1-4d11-b33f-9ad993e95233
vulnerability,CVE-2024-37816,vulnerability--f91691dc-ddf7-47df-9bc6-1842dd95d97c
vulnerability,CVE-2024-54004,vulnerability--5416b876-205b-4d79-812f-dab0616a3ba4
vulnerability,CVE-2024-54003,vulnerability--d123f898-88e4-4cfd-8c44-a8d8581fdde3
vulnerability,CVE-2024-36468,vulnerability--f9c1e21c-f6dd-4ea0-b860-99b779d6ee23
vulnerability,CVE-2024-36464,vulnerability--07b4ee78-8b68-4633-bbe6-6d67d3e3f2c2
vulnerability,CVE-2024-36467,vulnerability--d55eb1c9-2fec-4071-9f6e-aa3793f01192
vulnerability,CVE-2024-46054,vulnerability--29d094d1-7b58-44c5-bdaa-330f62f930e1
vulnerability,CVE-2024-46055,vulnerability--8d7a214d-bacc-40f9-99ff-c76d48ea1199
vulnerability,CVE-2024-42331,vulnerability--b3d3f773-1c2e-43c5-a349-0c93533bd400
vulnerability,CVE-2024-42330,vulnerability--19a0b5ca-97d0-4ddd-92ad-7531c342dba8
vulnerability,CVE-2024-42333,vulnerability--43410168-2b52-491b-882d-c10f75c4462a
vulnerability,CVE-2024-42326,vulnerability--a1cfe49d-3224-4509-a2e0-454b64cb585a
vulnerability,CVE-2024-42327,vulnerability--6fa3a9ad-d1b4-4c97-8d61-47c81032c303
vulnerability,CVE-2024-42329,vulnerability--aafdebd0-b406-44e1-a25c-9a690e32b38b
vulnerability,CVE-2024-42328,vulnerability--2c988678-156b-45d9-ab94-55fcdcba61b7
vulnerability,CVE-2024-42332,vulnerability--aa3ee7ed-6f9d-4a8c-8c06-9158ecf26900
vulnerability,CVE-2024-5921,vulnerability--0c277156-c5d4-4f38-b0a6-eb901d48c826
vulnerability,CVE-2023-29001,vulnerability--75847b69-f57c-47ca-8723-6ffd954c42a4
vulnerability,CVE-2018-9350,vulnerability--ce278b9b-8816-4d43-b8bd-22eb739ce28a
vulnerability,CVE-2018-9374,vulnerability--680b357c-a7a3-4705-b17c-d22853efe425
vulnerability,CVE-2018-9353,vulnerability--9164d418-7cd1-4575-95e7-101f25587afe
vulnerability,CVE-2018-9354,vulnerability--a8aaf612-433d-4440-8f90-265d23b9f1d1
vulnerability,CVE-2018-9349,vulnerability--857db9eb-1cb4-4356-888c-d430bcdc27fd
vulnerability,CVE-2018-9352,vulnerability--506fd795-f7b8-46a0-908c-f72960028eb3
vulnerability,CVE-2018-9351,vulnerability--66b329ae-1a04-48ac-babb-569a85325f07
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ccfc0dc7-dae3-4838-bbbc-ccb02e7289fc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01a5acde-6b06-4220-9187-db20fc11d926",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:21.829133Z",
"modified": "2024-11-28T00:39:21.829133Z",
"name": "CVE-2024-11860",
"description": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11860"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fea7589e-5201-4c35-8135-99568275b818",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02b3da40-5591-4da1-8ad4-3727db3bb1a8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:20.564327Z",
"modified": "2024-11-28T00:39:20.564327Z",
"name": "CVE-2017-13320",
"description": "In impeg2d_bit_stream_flush() of libmpeg2dec there is a possible OOB read due to a missing bounds check. This could lead to Remote DoS with no additional execution privileges needed. User interaction is needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2017-13320"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9f52c270-42df-49e7-90a5-87f3c0941408",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07b4ee78-8b68-4633-bbe6-6d67d3e3f2c2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:22.986708Z",
"modified": "2024-11-28T00:39:22.986708Z",
"name": "CVE-2024-36464",
"description": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-36464"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2dbdb3ec-280f-4f6b-a13e-8ab2b85298e0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08a763a5-14a5-4af7-8e29-7f15fd86d681",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:21.819562Z",
"modified": "2024-11-28T00:39:21.819562Z",
"name": "CVE-2024-11219",
"description": "The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.0.6 via the get_image function. This makes it possible for unauthenticated attackers to view arbitrary images on the server, which can contain sensitive information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11219"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--81dc1a4e-b3dd-4252-ab97-9083e46d711d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c277156-c5d4-4f38-b0a6-eb901d48c826",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:23.463491Z",
"modified": "2024-11-28T00:39:23.463491Z",
"name": "CVE-2024-5921",
"description": "An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint.\n\nGlobalProtect App for Android is under evaluation. Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-5921"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--91b0c271-de37-424e-9282-f483d11f881a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10bc4712-9b2f-477f-8fbe-d7eadf77c3c6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:21.840553Z",
"modified": "2024-11-28T00:39:21.840553Z",
"name": "CVE-2024-11790",
"description": "Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V10 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24449.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11790"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d8761865-b02e-4818-844f-2ededb66495d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19a0b5ca-97d0-4ddd-92ad-7531c342dba8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:23.104018Z",
"modified": "2024-11-28T00:39:23.104018Z",
"name": "CVE-2024-42330",
"description": "The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42330"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a4b99b4f-b6be-4590-8b10-7e6a921735c5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2264538f-1047-4c58-928e-a4a7670dc8d4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:21.270837Z",
"modified": "2024-11-28T00:39:21.270837Z",
"name": "CVE-2024-52323",
"description": "Zohocorp ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52323"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--eb7ff3f1-9ff0-4a19-8186-4d7dec1da0cd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23404828-47ac-48fe-8704-97309fc863d8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:21.805419Z",
"modified": "2024-11-28T00:39:21.805419Z",
"name": "CVE-2024-11797",
"description": "Fuji Electric Monitouch V-SFT V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24662.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11797"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--99b84c13-fa58-4c8f-8312-ae88d9a9c8b1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23784a4b-25c1-4e3b-b98b-0657e59f0208",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-28T00:39:21.35271Z",
"modified": "2024-11-28T00:39:21.35271Z",
"name": "CVE-2024-10580",
"description": "The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to unauthorized form submissions due to a missing capability check on the submit_form() function in all versions up to, and including, 7.8.5. This makes it possible for unauthenticated attackers to submit unpublished forms.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10580"
}
]
}
]
}
Loading

0 comments on commit 5bd29b1

Please sign in to comment.