Skip to content

Commit

Permalink
generated content from 2024-02-21
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 21, 2024
1 parent b0148af commit de284bf
Show file tree
Hide file tree
Showing 206 changed files with 4,715 additions and 0 deletions.
205 changes: 205 additions & 0 deletions mapping.csv

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4aacc501-b178-433a-8156-9a91070e77fd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01aacd1b-6f4b-4a57-bdff-165e43f1736d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:55.099945Z",
"modified": "2024-02-21T00:26:55.099945Z",
"name": "CVE-2024-24474",
"description": "Buffer Overflow vulnerability in Qemu before v.8.2.0 allows a remote attacker to execute arbitrary code via the async_len variable to the FIFO buffer component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24474"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--23f88fa7-cbef-4ad6-bcdd-2fcc52fa1f7b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04a755f2-f752-4117-88c4-73a2e1bc49fb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.769733Z",
"modified": "2024-02-21T00:26:54.769733Z",
"name": "CVE-2024-1339",
"description": "The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1339"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ff6142be-a622-4b7d-a410-2dd53bd64093",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--054a373f-0e31-4468-b51f-c728d9b9ca50",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.807565Z",
"modified": "2024-02-21T00:26:54.807565Z",
"name": "CVE-2024-1070",
"description": "The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the features attribute in all versions up to, and including, 1.58.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1070"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a40a3b31-fd3a-4898-94ee-6e59b0b9fd1a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07475100-4aa1-43f2-b7c5-56184dc20e1c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:53.446819Z",
"modified": "2024-02-21T00:26:53.446819Z",
"name": "CVE-2023-50923",
"description": "** DISPUTED ** In QUIC in RFC 9000, the Latency Spin Bit specification (section 17.4) does not strictly constrain the bit value when the feature is disabled, which might allow remote attackers to construct a covert channel with data represented as changes to the bit value. NOTE: The \"Sheridan, S., Keane, A. (2015). In Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS), University of Hertfordshire, Hatfield, UK.\" paper says \"Modern Internet communication protocols provide an almost infinite number of ways in which data can be hidden or embed whithin seemingly normal network traffic.\"",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-50923"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5886f9ca-eed5-49fe-b9bf-b969244ef07d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--088e560a-ffa1-4192-960c-22870e7d7cdc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.768282Z",
"modified": "2024-02-21T00:26:54.768282Z",
"name": "CVE-2024-1206",
"description": "The WP Recipe Maker plugin for WordPress is vulnerable to SQL Injection via the 'recipes' parameter in all versions up to, and including, 9.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1206"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a70a39d5-383b-4217-9fd4-43431d597287",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09f7e0b4-14b2-4715-a125-77c50e235262",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.925931Z",
"modified": "2024-02-21T00:26:54.925931Z",
"name": "CVE-2024-26135",
"description": "MeshCentral is a full computer management web site. Versions prior to 1.1.21 a cross-site websocket hijacking (CSWSH) vulnerability within the control.ashx endpoint. This component is the primary mechanism used within MeshCentral to perform administrative actions on the server. The vulnerability is exploitable when an attacker is able to convince a victim end-user to click on a malicious link to a page hosting an attacker-controlled site. The attacker can then originate a cross-site websocket connection using client-side JavaScript code to connect to `control.ashx` as the victim user within MeshCentral. Version 1.1.21 contains a patch for this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-26135"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cd427671-15c0-4df5-8f9d-d4fc6ab7d2cc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0efd32d9-946a-478c-8e0b-789300b437cb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.877499Z",
"modified": "2024-02-21T00:26:54.877499Z",
"name": "CVE-2024-23310",
"description": "A use-after-free vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23310"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6d55c35e-f5e4-465e-bd49-72e65f298a82",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1243a3c3-513b-45df-855c-40db81a46847",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:55.028077Z",
"modified": "2024-02-21T00:26:55.028077Z",
"name": "CVE-2024-0715",
"description": "Expression Language Injection vulnerability in Hitachi Global Link Manager on Windows allows Code Injection.This issue affects Hitachi Global Link Manager: before 8.8.7-03.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0715"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9de53b28-a1a0-499c-88df-0639f170af5d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13837531-bf6e-412e-a85b-46c805ae4d0d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:55.002993Z",
"modified": "2024-02-21T00:26:55.002993Z",
"name": "CVE-2024-0590",
"description": "The Microsoft Clarity plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9.3. This is due to missing nonce validation on the edit_clarity_project_id() function. This makes it possible for unauthenticated attackers to change the project id and add malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0590"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c9653c31-ecd2-4248-93cf-f6be8f85b7a5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--168f5c2f-2617-442a-af35-d9edd38d8369",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.730499Z",
"modified": "2024-02-21T00:26:54.730499Z",
"name": "CVE-2024-22245",
"description": "** UNSUPPPORTED WHEN ASSIGNED ** Arbitrary Authentication Relay and Session Hijack vulnerabilities in the deprecated VMware Enhanced Authentication Plug-in (EAP) could allow a malicious actor that could trick a target domain user with EAP installed in their web browser into requesting and relaying service tickets for arbitrary Active Directory Service Principal Names (SPNs).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22245"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--af4a31b8-673d-432a-aec0-a4f934cfaf8c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--196ba768-0ba2-426a-b2d6-4e235ce939a0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:51.648812Z",
"modified": "2024-02-21T00:26:51.648812Z",
"name": "CVE-2023-5190",
"description": "Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5190"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--91b2ec97-9113-4607-97cd-5f3312a33972",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c092909-a355-409c-a934-c99d40c9223e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:51.995531Z",
"modified": "2024-02-21T00:26:51.995531Z",
"name": "CVE-2023-7245",
"description": "The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-7245"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bf232cd2-c2d1-47e9-a9d7-94c11d2e29c2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e60f600-bcf6-4d6f-9816-be4d4a971a74",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.848052Z",
"modified": "2024-02-21T00:26:54.848052Z",
"name": "CVE-2024-1217",
"description": "The Contact Form builder with drag & drop for WordPress – Kali Forms plugin for WordPress is vulnerable to unauthorized plugin deactivation due to a missing capability check on the await_plugin_deactivation function in all versions up to, and including, 2.3.41. This makes it possible for authenticated attackers, with subscriber access or higher, to deactivate any active plugins.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1217"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3c39d5ba-03da-49b2-b132-42658eaffa7c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ee36d80-0080-493b-a805-910ede21caa5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.81338Z",
"modified": "2024-02-21T00:26:54.81338Z",
"name": "CVE-2024-1156",
"description": "Incorrect directory permissions for the shared NI RabbitMQ service may allow a local authenticated user to read RabbitMQ configuration information and potentially enable escalation of privileges.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1156"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ef3e53a0-1f58-4fba-9b5b-baa0d72f34f4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23f9f804-7fbf-4fef-af5b-50c013258578",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.78588Z",
"modified": "2024-02-21T00:26:54.78588Z",
"name": "CVE-2024-1318",
"description": "The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'feedzy_wizard_step_process' and 'import_status' functions in all versions up to, and including, 4.4.2. This makes it possible for authenticated attackers, with Contributor access and above, who are normally restricted to only being able to create posts rather than pages, to draft and publish posts with arbitrary content.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1318"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ae857163-911a-4df4-a59f-c1f7b640e3ba",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--264a1999-5e1c-40e4-a1eb-b8c7db250af9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-21T00:26:54.932502Z",
"modified": "2024-02-21T00:26:54.932502Z",
"name": "CVE-2024-26268",
"description": "User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-26268"
}
]
}
]
}
Loading

0 comments on commit de284bf

Please sign in to comment.