Skip to content

Commit

Permalink
generated content from 2024-09-21
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 21, 2024
1 parent d1c94cd commit 83075ca
Show file tree
Hide file tree
Showing 38 changed files with 851 additions and 0 deletions.
37 changes: 37 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -249859,3 +249859,40 @@ vulnerability,CVE-2024-47000,vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31
vulnerability,CVE-2024-47085,vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3
vulnerability,CVE-2023-27584,vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a
vulnerability,CVE-2022-4533,vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d
vulnerability,CVE-2024-42697,vulnerability--1504c604-7fd4-4937-b0fb-a64c00e96e97
vulnerability,CVE-2024-42346,vulnerability--df290a45-884c-42af-b2bf-c02aa861c4ca
vulnerability,CVE-2024-42351,vulnerability--f62e4ac1-8842-47d1-a089-41f0118c5811
vulnerability,CVE-2024-45489,vulnerability--aaeefa34-a5e8-4bd0-ba93-a67f12777ef1
vulnerability,CVE-2024-45793,vulnerability--7293eceb-f01e-4f4d-9131-1f18dafebf47
vulnerability,CVE-2024-45229,vulnerability--9ee2daa9-8394-40d8-b7b4-100d4e0e7b41
vulnerability,CVE-2024-9043,vulnerability--7dd4703d-e4f4-435b-adf4-5c6102b432d5
vulnerability,CVE-2024-9039,vulnerability--1ee230d4-4fdc-476b-bd1a-e1c69f6efed0
vulnerability,CVE-2024-9035,vulnerability--77601b1a-5eb5-4c72-839e-ac6cb8e75adc
vulnerability,CVE-2024-9041,vulnerability--2663de80-34de-4e8e-8faa-66395ced6a78
vulnerability,CVE-2024-9038,vulnerability--154f52cf-373c-4f47-b7f1-0c9680b87462
vulnerability,CVE-2024-9032,vulnerability--03977d31-d835-4d48-8b27-85d5b31b9cde
vulnerability,CVE-2024-9036,vulnerability--838db7f7-ccb6-448c-bacb-8619ef8569e3
vulnerability,CVE-2024-9033,vulnerability--9296a0f8-2919-440e-8665-b7e30ac10c94
vulnerability,CVE-2024-9037,vulnerability--3d770e5c-1d9b-4385-a186-5dcb1267a66d
vulnerability,CVE-2024-9034,vulnerability--2a848412-14f5-4169-b313-5138a7a9028c
vulnerability,CVE-2024-9040,vulnerability--7a729f75-8cff-4c3b-bb27-c6fd7ab92f49
vulnerability,CVE-2024-9030,vulnerability--d87dae7b-afbc-4750-8424-d373d8187ab1
vulnerability,CVE-2024-9031,vulnerability--e6332195-c402-4c64-9223-0af0b2c340ca
vulnerability,CVE-2024-8612,vulnerability--0ea7d322-1dd7-43e0-8494-4c402d13c662
vulnerability,CVE-2024-8853,vulnerability--a8b51918-5161-475b-9ebc-fe176a441f47
vulnerability,CVE-2024-46640,vulnerability--1d1de4b0-a97a-4048-a24f-994c9050c10f
vulnerability,CVE-2024-46644,vulnerability--2136be2b-e549-4420-b974-a5030d36e75d
vulnerability,CVE-2024-46649,vulnerability--a95ad80e-8995-447f-9dee-7adea05d9d13
vulnerability,CVE-2024-46654,vulnerability--b1afb1ef-f6b1-464d-a709-5ae81fbfb2f3
vulnerability,CVE-2024-46645,vulnerability--23cfa82e-07e9-4e6d-9663-16c7dd8b0e4b
vulnerability,CVE-2024-46103,vulnerability--a56472a2-003b-45b4-9ab2-0fcce63f8046
vulnerability,CVE-2024-46647,vulnerability--3c3f4f89-a6f5-4edf-b90f-e13645f65c27
vulnerability,CVE-2024-46652,vulnerability--1147d539-72c0-4973-ae17-7a025065e73b
vulnerability,CVE-2024-46646,vulnerability--e217ff58-fe96-4c24-805c-c02d315fc59c
vulnerability,CVE-2024-46648,vulnerability--5923f9d3-fc34-4285-af2b-b0f0fd31680f
vulnerability,CVE-2024-46101,vulnerability--9091f5d8-54e7-43f9-81e9-5fa04397e281
vulnerability,CVE-2024-41721,vulnerability--3926b20e-5d7e-48aa-a17b-7523885732a2
vulnerability,CVE-2024-37879,vulnerability--c6b46944-3453-4760-a4a4-44bc39cc8239
vulnerability,CVE-2024-47062,vulnerability--18004ea6-d6f3-4e12-935c-194259349d21
vulnerability,CVE-2024-47061,vulnerability--e8d55700-0281-462c-be2b-cbb2aa1178af
vulnerability,CVE-2023-47480,vulnerability--c1981d86-6371-4c70-a71a-7baacdfa6f4e
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d57d19f3-8863-4280-8fb7-dc46b56ca1c0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03977d31-d835-4d48-8b27-85d5b31b9cde",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.790905Z",
"modified": "2024-09-21T01:39:16.790905Z",
"name": "CVE-2024-9032",
"description": "A vulnerability, which was classified as critical, was found in SourceCodester Simple Forum-Discussion System 1.0. Affected is an unknown function of the file /index.php. The manipulation of the argument page leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9032"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--19e6423a-10fa-4b16-b258-7681c1b77c8d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ea7d322-1dd7-43e0-8494-4c402d13c662",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.84497Z",
"modified": "2024-09-21T01:39:16.84497Z",
"name": "CVE-2024-8612",
"description": "A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8612"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--35905e1a-d5ab-4bd8-af6f-c5374aeb74dc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1147d539-72c0-4973-ae17-7a025065e73b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.934318Z",
"modified": "2024-09-21T01:39:16.934318Z",
"name": "CVE-2024-46652",
"description": "Tenda AC8v4 V16.03.34.06 has a stack overflow vulnerability in the fromAdvSetMacMtuWan function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46652"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--84a4d5cf-f947-422a-8ebc-40e0f1d734dd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1504c604-7fd4-4937-b0fb-a64c00e96e97",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.309701Z",
"modified": "2024-09-21T01:39:16.309701Z",
"name": "CVE-2024-42697",
"description": "Cross Site Scripting vulnerability in Leotheme Leo Product Search Module v.2.1.6 and earlier allows a remote attacker to execute arbitrary code via the q parameter of the product search function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42697"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c053d7dc-8bd3-4326-b2a3-d5a9f06ef3cb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--154f52cf-373c-4f47-b7f1-0c9680b87462",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.789962Z",
"modified": "2024-09-21T01:39:16.789962Z",
"name": "CVE-2024-9038",
"description": "A vulnerability classified as problematic was found in Codezips Online Shopping Portal 1.0. Affected by this vulnerability is an unknown functionality of the file insert-product.php. The manipulation of the argument productimage1/productimage2/productimage3 leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9038"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6fa6c2db-ec3a-42ed-904a-758465b33a3e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18004ea6-d6f3-4e12-935c-194259349d21",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:17.997338Z",
"modified": "2024-09-21T01:39:17.997338Z",
"name": "CVE-2024-47062",
"description": "Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections. Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username. When adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information. For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`. This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. When adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not properly escaped. This behavior can be used to inject arbitrary SQL code (SQL Injection). These vulnerabilities can be used to leak information and dump the contents of the database and have been addressed in release version 0.53.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47062"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--72c30852-a706-49ab-b0da-e14594eab6d8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1d1de4b0-a97a-4048-a24f-994c9050c10f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.909147Z",
"modified": "2024-09-21T01:39:16.909147Z",
"name": "CVE-2024-46640",
"description": "SeaCMS 13.2 has a remote code execution vulnerability located in the file sql.class.chp. Although the system has a check function, the check function is not executed during execution, allowing remote code execution by writing to the file through the MySQL slow query method.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46640"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--24325106-e123-4477-b37e-f725b7022974",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ee230d4-4fdc-476b-bd1a-e1c69f6efed0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.779271Z",
"modified": "2024-09-21T01:39:16.779271Z",
"name": "CVE-2024-9039",
"description": "A vulnerability, which was classified as critical, has been found in SourceCodester Best House Rental Management System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=signup. The manipulation of the argument firstname/lastname/email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9039"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5083edbd-e7e3-4308-9be0-d7fa04c5bfeb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2136be2b-e549-4420-b974-a5030d36e75d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.911939Z",
"modified": "2024-09-21T01:39:16.911939Z",
"name": "CVE-2024-46644",
"description": "eNMS 4.4.0 to 4.7.1 is vulnerable to Directory Traversal via edit_file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46644"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--70e47334-72d6-4d1a-ad3d-8835959c320a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23cfa82e-07e9-4e6d-9663-16c7dd8b0e4b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.927543Z",
"modified": "2024-09-21T01:39:16.927543Z",
"name": "CVE-2024-46645",
"description": "eNMS 4.0.0 is vulnerable to Directory Traversal via get_tree_files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46645"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--70954de4-405c-47a6-8807-467ec9d961c8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2663de80-34de-4e8e-8faa-66395ced6a78",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.788796Z",
"modified": "2024-09-21T01:39:16.788796Z",
"name": "CVE-2024-9041",
"description": "A vulnerability has been found in SourceCodester Best House Rental Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /ajax.php?action=update_account. The manipulation of the argument firstname/lastname/email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9041"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6c571a75-8bea-44be-aefa-75aa6cd876be",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2a848412-14f5-4169-b313-5138a7a9028c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.795636Z",
"modified": "2024-09-21T01:39:16.795636Z",
"name": "CVE-2024-9034",
"description": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9034"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--392cc96f-bc75-41b4-8e05-afa5f2f4e7f5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3926b20e-5d7e-48aa-a17b-7523885732a2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:17.853349Z",
"modified": "2024-09-21T01:39:17.853349Z",
"name": "CVE-2024-41721",
"description": "An insufficient boundary validation in the USB code could lead to an out-of-bounds read on the heap, which could potentially lead to an arbitrary write and remote code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41721"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--584837ac-6626-4df9-b550-d47fe0c41dfb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3c3f4f89-a6f5-4edf-b90f-e13645f65c27",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-21T01:39:16.930456Z",
"modified": "2024-09-21T01:39:16.930456Z",
"name": "CVE-2024-46647",
"description": "eNMS 4.4.0 to 4.7.1 is vulnerable to Directory Traversal via upload_files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46647"
}
]
}
]
}
Loading

0 comments on commit 83075ca

Please sign in to comment.