Skip to content

Commit

Permalink
generated content from 2024-10-10
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 10, 2024
1 parent fd026c6 commit 8ae3c40
Show file tree
Hide file tree
Showing 133 changed files with 3,036 additions and 0 deletions.
132 changes: 132 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -251406,3 +251406,135 @@ vulnerability,CVE-2024-47594,vulnerability--befaac8a-870e-4006-8573-3481c1f79704
vulnerability,CVE-2024-47095,vulnerability--05dc27f3-5f89-430e-af51-611d3563568d
vulnerability,CVE-2023-52952,vulnerability--8592145a-af4e-4f57-909a-c3bf6b7fd16b
vulnerability,CVE-2022-4534,vulnerability--9ec468cd-3081-4e88-a854-2cf422dd3524
vulnerability,CVE-2024-48941,vulnerability--aad882b7-a380-49c1-9f1a-c49b5216fbfc
vulnerability,CVE-2024-48942,vulnerability--193685b0-580d-4ece-9017-02f7dddeb7ad
vulnerability,CVE-2024-48949,vulnerability--4365f8d1-03f8-4ecb-98d7-676fb2822a4c
vulnerability,CVE-2024-30118,vulnerability--e63cb944-c474-404c-87b7-484d00a956f9
vulnerability,CVE-2024-45146,vulnerability--857058dc-0a9c-4580-94c7-7b1c02f5a4d2
vulnerability,CVE-2024-45152,vulnerability--2da49cf7-e97a-4b33-b4a5-c412cb52bf25
vulnerability,CVE-2024-45137,vulnerability--d98b9193-0ff4-4866-a5f0-5541069933ed
vulnerability,CVE-2024-45141,vulnerability--c4abfb3b-b649-498e-b391-5a05d77626c8
vulnerability,CVE-2024-45746,vulnerability--d55f03a9-fa42-4884-be77-15542b07cd84
vulnerability,CVE-2024-45142,vulnerability--08e7df1a-4577-4534-bba8-68246777bb50
vulnerability,CVE-2024-45143,vulnerability--4be37398-a3bf-42dd-885a-cb64887cec5d
vulnerability,CVE-2024-45160,vulnerability--f5371902-9635-4bff-83d6-af24b6ed5b20
vulnerability,CVE-2024-45138,vulnerability--4fa5a73b-2608-4d77-83c4-ba57737b48b1
vulnerability,CVE-2024-45139,vulnerability--60bd383a-dd4a-4331-b99b-83069b1ee1a3
vulnerability,CVE-2024-45144,vulnerability--c4a8caab-bb12-4f6e-8a04-9b7014d1e923
vulnerability,CVE-2024-45150,vulnerability--11c892aa-26ff-4b38-bb3d-e555a229faf4
vulnerability,CVE-2024-45140,vulnerability--e844835f-34a7-4f0e-865f-0c8e6f15458c
vulnerability,CVE-2024-45179,vulnerability--1e665c35-b7f2-4098-9816-da90649ec88b
vulnerability,CVE-2024-45720,vulnerability--dd30569a-386f-406a-9493-f92347f08f68
vulnerability,CVE-2024-45136,vulnerability--bc0221dc-f6a4-4bb4-bad9-4ae8b30bdf30
vulnerability,CVE-2024-45145,vulnerability--d1002de3-bb34-492e-8da3-a45756c36688
vulnerability,CVE-2024-9468,vulnerability--10db8c7d-575e-48ab-838b-864cab56fe93
vulnerability,CVE-2024-9449,vulnerability--133d535c-1cc4-4a92-b6cf-92be604669e8
vulnerability,CVE-2024-9467,vulnerability--2a5c257b-cd02-47ab-9904-9474ea5de8f6
vulnerability,CVE-2024-9680,vulnerability--a5b6d700-a967-4053-8cc4-e48de6eb801d
vulnerability,CVE-2024-9463,vulnerability--eae0ab75-dca0-4d06-bce4-cfb6b6581ab9
vulnerability,CVE-2024-9451,vulnerability--d926524f-b005-4705-893f-f730b92e7982
vulnerability,CVE-2024-9286,vulnerability--a01de821-4994-4d6f-aefa-1528e8adb8c7
vulnerability,CVE-2024-9466,vulnerability--9188f1d2-f127-4af6-96c7-4b3caff7ca46
vulnerability,CVE-2024-9469,vulnerability--c5d4d57a-a1a4-4f76-a57d-423c1d7842a7
vulnerability,CVE-2024-9575,vulnerability--ac9e797e-332a-4bfc-90b8-35386ee7cdd0
vulnerability,CVE-2024-9464,vulnerability--a60917fe-29a6-4bf2-a3f0-c70f52c3d931
vulnerability,CVE-2024-9471,vulnerability--eddb77e3-d807-4231-9a0f-8b1cd2890ea7
vulnerability,CVE-2024-9671,vulnerability--60271a9f-5420-4345-a204-9f15208f64b8
vulnerability,CVE-2024-9675,vulnerability--f0d79b2f-995d-4ed9-9d5b-74a361ec7860
vulnerability,CVE-2024-9465,vulnerability--ff0751ff-9859-43ae-8f45-7d8a9af63f86
vulnerability,CVE-2024-9473,vulnerability--e7dc00f0-cd8c-4642-8a8b-e6e33adbeec5
vulnerability,CVE-2024-9470,vulnerability--dcc81df1-9347-42de-9e42-7ddd3aa27fd3
vulnerability,CVE-2024-39586,vulnerability--61265025-4c32-43b9-b783-af39c4507e24
vulnerability,CVE-2024-39440,vulnerability--b32a9fd3-f763-4a10-930e-05396632b241
vulnerability,CVE-2024-39436,vulnerability--a7800e22-711d-4f9d-8aa8-27e7d533a1c2
vulnerability,CVE-2024-39439,vulnerability--cef456df-672c-4b35-80ce-68511189e98a
vulnerability,CVE-2024-39438,vulnerability--2dcfc780-51c9-4f63-adb7-5c3c08b5dada
vulnerability,CVE-2024-39437,vulnerability--688e45e4-7a8c-473e-8cef-d89322c34811
vulnerability,CVE-2024-39515,vulnerability--43bc2cbb-098a-4dea-ab25-11e45ed5f275
vulnerability,CVE-2024-39516,vulnerability--afb7abc5-96ea-455c-a290-c5874b47797b
vulnerability,CVE-2024-39525,vulnerability--6e383864-fd28-4f2d-8643-835a68b6e466
vulnerability,CVE-2024-47670,vulnerability--1d3694a8-f0ad-483e-96e0-f8a8c2c56d82
vulnerability,CVE-2024-47672,vulnerability--f305ec0f-a375-42d9-98b3-c42d9f1db1e8
vulnerability,CVE-2024-47414,vulnerability--38ac9d0c-99a4-45a7-92fa-873f2826522c
vulnerability,CVE-2024-47659,vulnerability--803e1901-c0f8-49bf-9426-941794190a8d
vulnerability,CVE-2024-47423,vulnerability--8b981955-3457-4859-969f-55ffe769ecbf
vulnerability,CVE-2024-47658,vulnerability--57fda48c-4a97-468e-b2bb-75749bcd03a0
vulnerability,CVE-2024-47334,vulnerability--6f4bf529-a959-47f1-963f-8e0b48ab0cb0
vulnerability,CVE-2024-47666,vulnerability--6f2a527b-5de0-4fd5-8094-fc3d121856b4
vulnerability,CVE-2024-47415,vulnerability--5ff12e37-9cc6-4a67-9697-3fd810de120b
vulnerability,CVE-2024-47413,vulnerability--274de55e-ac3a-4df3-8127-3425e3e93ab3
vulnerability,CVE-2024-47424,vulnerability--8ae959fe-1d2f-4a84-adec-8c375260cd7a
vulnerability,CVE-2024-47812,vulnerability--5b015380-f4af-47f7-b4c3-e526b6247e6f
vulnerability,CVE-2024-47832,vulnerability--556032d7-d1fe-4149-bf8a-86c300e5aa12
vulnerability,CVE-2024-47416,vulnerability--6c24c243-ec4d-403e-ac57-c37872f5ea15
vulnerability,CVE-2024-47410,vulnerability--62ad7124-4487-4433-aec5-a1e548b5016f
vulnerability,CVE-2024-47671,vulnerability--bd6bf8d1-e1b2-487c-bd2b-75bad1137244
vulnerability,CVE-2024-47417,vulnerability--c0d0e963-5c1f-4625-bef8-3be55ddf6e25
vulnerability,CVE-2024-47833,vulnerability--08d8ab8c-12c1-4562-9fde-75906d761e33
vulnerability,CVE-2024-47668,vulnerability--da752c2f-86fb-463d-844a-886dd3684187
vulnerability,CVE-2024-47763,vulnerability--35d571f8-0135-44fd-8972-71003049e538
vulnerability,CVE-2024-47421,vulnerability--625a017e-da20-497f-9e1f-9904302da6e8
vulnerability,CVE-2024-47422,vulnerability--a825d0c4-7f41-43a6-81a3-67ef1ba7ba12
vulnerability,CVE-2024-47813,vulnerability--2494f52d-60ce-46b1-9421-2f072005a4a5
vulnerability,CVE-2024-47419,vulnerability--3eb0437a-d142-4106-98d1-a42a6d6af5f5
vulnerability,CVE-2024-47816,vulnerability--f9236a12-c088-409e-895f-9bb334e036cc
vulnerability,CVE-2024-47661,vulnerability--9a41da75-58ab-4ab3-b170-7f53132f5b05
vulnerability,CVE-2024-47420,vulnerability--25ccfb03-e9d4-42cb-9cfe-7316fa1e4205
vulnerability,CVE-2024-47669,vulnerability--61584340-ae50-4122-8907-ef0ffdbc58f1
vulnerability,CVE-2024-47660,vulnerability--7f4b4f6c-f846-40ed-9566-123e660eb245
vulnerability,CVE-2024-47425,vulnerability--a2be890e-4e5c-4fc2-b49f-5600ed2bf080
vulnerability,CVE-2024-47411,vulnerability--493ccc61-39fa-4a25-b06d-a50ad63b51ce
vulnerability,CVE-2024-47663,vulnerability--f9129957-308e-42bb-ad64-ca974b6b3b74
vulnerability,CVE-2024-47664,vulnerability--f6a97564-0f2b-4c11-b24c-981b36bb27ea
vulnerability,CVE-2024-47191,vulnerability--5acbec3e-4ea7-41a5-92b4-fc58a50b25b1
vulnerability,CVE-2024-47673,vulnerability--93b96a33-21d8-40e5-b5ea-42b82ff903b0
vulnerability,CVE-2024-47667,vulnerability--6d75f140-1ed9-4a9a-b57c-b2321a0f66d3
vulnerability,CVE-2024-47412,vulnerability--43418bd7-91bf-45f8-8d6e-c7c0bf2a76c8
vulnerability,CVE-2024-47665,vulnerability--86d2a83a-dfe5-4a76-b83c-e722d9a6177e
vulnerability,CVE-2024-47662,vulnerability--93e21cf8-ddbb-4fc8-9f03-30c652dc7d0a
vulnerability,CVE-2024-47828,vulnerability--9bc4ba78-d6be-44aa-a8ab-275882476eac
vulnerability,CVE-2024-47815,vulnerability--a38e24a3-03f8-45ad-8422-a16fd1926d52
vulnerability,CVE-2024-47418,vulnerability--f999efd3-fae9-4c72-8787-4b34466b0246
vulnerability,CVE-2024-7840,vulnerability--f70bc052-51d9-4809-a221-77ea16f3f3c4
vulnerability,CVE-2024-7963,vulnerability--97ce0237-054a-4d9c-aa6f-52cec28393f6
vulnerability,CVE-2024-7293,vulnerability--b6ca3218-3b93-42f9-8844-244ec41884f6
vulnerability,CVE-2024-7038,vulnerability--fa3f2a08-0207-4389-ae28-c70020a7c18e
vulnerability,CVE-2024-7292,vulnerability--a7a5576f-6bd0-43de-8697-d8b36e5f89d9
vulnerability,CVE-2024-7037,vulnerability--ff04c78a-d736-4694-a827-de40e2b0fc28
vulnerability,CVE-2024-7294,vulnerability--c88589a0-8130-482e-8dda-f84bdabd1a2c
vulnerability,CVE-2024-7041,vulnerability--3990215d-e5fe-4128-a4f4-388aa92e726b
vulnerability,CVE-2024-25825,vulnerability--5b66baf1-8b85-41e6-8d1b-b730a0359a0d
vulnerability,CVE-2024-25282,vulnerability--ba245e4e-8fc8-4b61-9a81-d82228dadffe
vulnerability,CVE-2024-25283,vulnerability--ee2b3fae-e25a-4d54-b5e4-aaf92a0bd069
vulnerability,CVE-2024-25284,vulnerability--d1df5e28-16aa-4f8e-9684-6c7da6deed5b
vulnerability,CVE-2024-25286,vulnerability--0e992599-b511-46b6-b4a0-23cd4b20a7c4
vulnerability,CVE-2024-25285,vulnerability--8a1171df-cb0b-4179-bfe9-cf0798be7d29
vulnerability,CVE-2024-3656,vulnerability--73a6fa24-142f-476c-9fb6-98fe0ba2783d
vulnerability,CVE-2024-8014,vulnerability--edfa045c-9df7-4928-8ffb-4c368a5766cd
vulnerability,CVE-2024-8048,vulnerability--be391763-c480-421b-b5c2-8b6530e0ace2
vulnerability,CVE-2024-8015,vulnerability--4d4772aa-7e73-43db-a4e4-09a437151484
vulnerability,CVE-2024-8264,vulnerability--3a088891-aa08-4592-8b03-ec55f53ef786
vulnerability,CVE-2024-38815,vulnerability--df79acc8-c3e3-453f-a298-f670c70f640e
vulnerability,CVE-2024-38817,vulnerability--a7ed95bc-f08b-43be-9189-7124e8c9fedf
vulnerability,CVE-2024-38818,vulnerability--f67cdd02-cc24-4e0b-a5c8-59e51a8c9574
vulnerability,CVE-2024-20787,vulnerability--49c992b2-91ab-41b3-a9b3-fae1ab198846
vulnerability,CVE-2024-35288,vulnerability--80bb9a08-154b-42a7-bd0b-661aa74a523a
vulnerability,CVE-2024-46307,vulnerability--b6fb039f-0d4b-4df4-9b1e-6b87dc91e966
vulnerability,CVE-2024-46870,vulnerability--fa28b3bc-6632-4e60-93e6-786e2692c1b0
vulnerability,CVE-2024-46316,vulnerability--8af52ea3-dd8b-4d7b-8578-ed9a7dd2b575
vulnerability,CVE-2024-46304,vulnerability--2f1270f6-30c3-4365-beb9-21f20845418e
vulnerability,CVE-2024-46237,vulnerability--33246706-3774-46b1-90ca-a6f49b9959fc
vulnerability,CVE-2024-46292,vulnerability--961ea829-2987-4c77-b12b-e1b9ddee76a9
vulnerability,CVE-2024-46871,vulnerability--5eb7d44c-30e4-4ad2-a2e6-eb749460888b
vulnerability,CVE-2024-42988,vulnerability--4589e06e-1e88-4f52-b81e-901e06d32990
vulnerability,CVE-2024-42934,vulnerability--d97f75af-2462-4bce-9bb1-0800f2579a1f
vulnerability,CVE-2024-32608,vulnerability--00df4e9d-7519-437a-9a4f-86b842b24629
vulnerability,CVE-2024-28168,vulnerability--b684bf96-89a6-4cab-8884-c1a42a6f3462
vulnerability,CVE-2024-5968,vulnerability--6daa8902-7d8a-40f3-9267-c39eabcd9f20
vulnerability,CVE-2024-43610,vulnerability--e2a636b5-0630-43c3-ba2a-6325d3cc4e6c
vulnerability,CVE-2023-45361,vulnerability--14a9e406-08e1-40bb-a10e-dcb8bd0d18d0
vulnerability,CVE-2023-45359,vulnerability--786376e4-c9f1-4d67-a4e1-43f407778237
vulnerability,CVE-2023-45872,vulnerability--18428ae0-64dd-4e85-90fe-1187ca6d4547
vulnerability,CVE-2023-37154,vulnerability--6c84c721-77f1-42fb-a57c-07b795aad4dd
vulnerability,CVE-2023-36325,vulnerability--e6439cb8-3563-4e5b-980a-347bc08fd606
vulnerability,CVE-2023-46586,vulnerability--c265404b-d5c8-4234-ab1e-6f74a707488c
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1d613087-9747-4924-9a4c-9d5ca200cc12",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00df4e9d-7519-437a-9a4f-86b842b24629",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:43.436439Z",
"modified": "2024-10-10T01:43:43.436439Z",
"name": "CVE-2024-32608",
"description": "HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing denial of service or potential code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-32608"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7252f99c-c48c-47f4-b138-a49e46c81285",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08d8ab8c-12c1-4562-9fde-75906d761e33",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:42.144528Z",
"modified": "2024-10-10T01:43:42.144528Z",
"name": "CVE-2024-47833",
"description": "Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47833"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c2fe1184-96b5-4b9b-a7a6-c8e9a626a812",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08e7df1a-4577-4534-bba8-68246777bb50",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:41.913481Z",
"modified": "2024-10-10T01:43:41.913481Z",
"name": "CVE-2024-45142",
"description": "Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability allows an attacker to write a controlled value to an arbitrary memory location, potentially leading to code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45142"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--902a693d-cf46-40aa-8472-7ee67bba36f7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e992599-b511-46b6-b4a0-23cd4b20a7c4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:42.358666Z",
"modified": "2024-10-10T01:43:42.358666Z",
"name": "CVE-2024-25286",
"description": "3DSecure 2.0 allows CSRF in the Authorization Method via modified Origin and Referer HTTP headers.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-25286"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6b5d4abc-774a-48af-a450-ef4f861a91c8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10db8c7d-575e-48ab-838b-864cab56fe93",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:41.995632Z",
"modified": "2024-10-10T01:43:41.995632Z",
"name": "CVE-2024-9468",
"description": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9468"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ddb260ab-0e07-454c-bfad-97a4dbf38500",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--11c892aa-26ff-4b38-bb3d-e555a229faf4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:41.972392Z",
"modified": "2024-10-10T01:43:41.972392Z",
"name": "CVE-2024-45150",
"description": "Dimension versions 4.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45150"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f6a23d58-6e8b-4d08-9708-5a35da7addb0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--133d535c-1cc4-4a92-b6cf-92be604669e8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:42.000341Z",
"modified": "2024-10-10T01:43:42.000341Z",
"name": "CVE-2024-9449",
"description": "The Auto iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' parameter in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9449"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cbfad2db-f703-499e-8377-48085f64243a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--14a9e406-08e1-40bb-a10e-dcb8bd0d18d0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-10T01:43:50.917208Z",
"modified": "2024-10-10T01:43:50.917208Z",
"name": "CVE-2023-45361",
"description": "An issue was discovered in VectorComponentUserLinks.php in the Vector Skin component in MediaWiki before 1.39.5 and 1.40.x before 1.40.1. vector-intro-page MalformedTitleException is uncaught if it is not a valid title, leading to incorrect web pages.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-45361"
}
]
}
]
}
Loading

0 comments on commit 8ae3c40

Please sign in to comment.