Skip to content

Commit

Permalink
generated content from 2024-09-20
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 20, 2024
1 parent f62316b commit d1c94cd
Show file tree
Hide file tree
Showing 62 changed files with 1,403 additions and 0 deletions.
61 changes: 61 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -249798,3 +249798,64 @@ vulnerability,CVE-2022-25769,vulnerability--1602e54a-ff65-434e-8c0d-9c1727f1e700
vulnerability,CVE-2022-25775,vulnerability--b0bad660-97fa-47b6-8436-005042d448a8
vulnerability,CVE-2022-25770,vulnerability--d5c37c6a-abee-42ec-a3ec-6899757eb14b
vulnerability,CVE-2022-25776,vulnerability--3398415d-b6f6-41dc-b599-875acae1b67f
vulnerability,CVE-2024-33109,vulnerability--b81fa7a6-44b2-4639-9258-6c5bf9a5343c
vulnerability,CVE-2024-43496,vulnerability--831199f6-1265-48ec-854d-8ff56307db88
vulnerability,CVE-2024-43489,vulnerability--ec3a44b5-2268-4cac-9158-c38bfabfcc47
vulnerability,CVE-2024-45808,vulnerability--c32ee96d-a3bb-4665-b83a-7566dc644fb0
vulnerability,CVE-2024-45769,vulnerability--9665b7b2-1204-4f5e-a2dc-c2338e837ad4
vulnerability,CVE-2024-45810,vulnerability--dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6
vulnerability,CVE-2024-45862,vulnerability--8faf5695-d2b7-403f-b0b6-b2e400e65cbc
vulnerability,CVE-2024-45809,vulnerability--f25dddab-41c7-4a4c-98e7-3ba97f791849
vulnerability,CVE-2024-45752,vulnerability--6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60
vulnerability,CVE-2024-45861,vulnerability--4cbdfa3e-2fc5-43b3-8296-d30b0da9a125
vulnerability,CVE-2024-45770,vulnerability--4714c8dc-a854-4a6a-b526-7dc7d9406958
vulnerability,CVE-2024-45806,vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9
vulnerability,CVE-2024-45614,vulnerability--9db511ae-77bf-493e-9d28-f39dd8ed4de2
vulnerability,CVE-2024-45410,vulnerability--e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc
vulnerability,CVE-2024-45807,vulnerability--cb492da1-797e-482c-ab9a-0f779943cd95
vulnerability,CVE-2024-9001,vulnerability--9c49c922-faee-4a88-8220-a2426312618b
vulnerability,CVE-2024-9006,vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad
vulnerability,CVE-2024-9009,vulnerability--f71fe5ef-f3ec-4f22-8087-559f8266eeeb
vulnerability,CVE-2024-9011,vulnerability--8de01fb7-5320-4e2b-a310-425eac91130e
vulnerability,CVE-2024-9008,vulnerability--fcd94263-4f04-4268-9beb-c663aa28f85a
vulnerability,CVE-2024-9004,vulnerability--5ca6b7df-a006-4139-9256-5c3b8518d1f7
vulnerability,CVE-2024-9007,vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a
vulnerability,CVE-2024-9003,vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef
vulnerability,CVE-2024-8986,vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011
vulnerability,CVE-2024-8375,vulnerability--dbf3d045-aa39-439a-9d57-d49e25251330
vulnerability,CVE-2024-8653,vulnerability--c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a
vulnerability,CVE-2024-8963,vulnerability--bbb250ce-8b32-4497-924e-cc294c8686bf
vulnerability,CVE-2024-8354,vulnerability--7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e
vulnerability,CVE-2024-8883,vulnerability--67678a89-195e-4f62-9e41-af3501846ecd
vulnerability,CVE-2024-8850,vulnerability--c2a75d10-b729-4ab8-880b-3811729d0ba4
vulnerability,CVE-2024-8698,vulnerability--56467874-5ea2-43d2-961c-ab97034786d9
vulnerability,CVE-2024-8652,vulnerability--cf487283-2059-4af6-9911-e84bae17154a
vulnerability,CVE-2024-8364,vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7
vulnerability,CVE-2024-8651,vulnerability--5da24da6-512a-43e5-8816-c65e03286633
vulnerability,CVE-2024-40125,vulnerability--af256f15-9f34-467c-b646-df6f4010b97b
vulnerability,CVE-2024-46946,vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37
vulnerability,CVE-2024-46382,vulnerability--6c273ed7-7d97-44bb-8dbe-e251586631fa
vulnerability,CVE-2024-46394,vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082
vulnerability,CVE-2024-46984,vulnerability--fd07ffff-d1ef-401d-b032-0ee9b4ab3eda
vulnerability,CVE-2024-46983,vulnerability--e7d120eb-a174-4a33-9c77-bb44ccebd8d7
vulnerability,CVE-2024-46999,vulnerability--96c6148a-1559-4562-a01f-4cfa80aebf85
vulnerability,CVE-2024-31570,vulnerability--9443659c-29d8-4c75-94da-426fc0234b20
vulnerability,CVE-2024-25673,vulnerability--edd9aced-a00b-4ace-8e71-35158123d861
vulnerability,CVE-2024-7736,vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea
vulnerability,CVE-2024-7785,vulnerability--9126e99a-68c5-4b44-8c02-eec80361132e
vulnerability,CVE-2024-7207,vulnerability--658b3f99-7295-4e8b-a9cc-2376066d6d32
vulnerability,CVE-2024-7737,vulnerability--d3745b7e-15c7-4196-a9bc-d722df94895c
vulnerability,CVE-2024-38221,vulnerability--c84f3024-24a2-4c19-8fcf-74472623591e
vulnerability,CVE-2024-38016,vulnerability--16620d63-b079-491b-963a-b889367c36bc
vulnerability,CVE-2024-47159,vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553
vulnerability,CVE-2024-47087,vulnerability--a5fc1025-f0f5-4160-a7da-7f29953431ca
vulnerability,CVE-2024-47086,vulnerability--717fc0e5-feb2-4847-bdc5-c4dc4355a7c3
vulnerability,CVE-2024-47162,vulnerability--5129cdb7-070e-47e6-9a21-bb868bc71f59
vulnerability,CVE-2024-47089,vulnerability--d408014d-f577-47f5-bf4c-e2910fef4a4d
vulnerability,CVE-2024-47088,vulnerability--75c2584e-93a4-4f41-a0b7-a96ed4895c21
vulnerability,CVE-2024-47060,vulnerability--e22a2a04-c658-4af5-9b17-6ae2fb52ba41
vulnerability,CVE-2024-47160,vulnerability--457e7107-f54f-4d00-8735-97e418e95e21
vulnerability,CVE-2024-47000,vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31
vulnerability,CVE-2024-47085,vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3
vulnerability,CVE-2023-27584,vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a
vulnerability,CVE-2022-4533,vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--29e7ee93-c08c-4bde-b2a6-7fecb00172c1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.399035Z",
"modified": "2024-09-20T01:41:04.399035Z",
"name": "CVE-2024-8986",
"description": "The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`.\n \nIf credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8986"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b254e85e-64a4-4da9-9f6f-f2f698de24af",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.451731Z",
"modified": "2024-09-20T01:41:04.451731Z",
"name": "CVE-2024-8364",
"description": "The WP Custom Fields Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcfs-preset shortcode in all versions up to, and including, 1.2.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8364"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3a35ffcb-854d-4b35-a4fd-a82cc5cf11b2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.390798Z",
"modified": "2024-09-20T01:41:04.390798Z",
"name": "CVE-2024-9003",
"description": "A vulnerability was found in Jinan Chicheng Company JFlow 2.0.0. It has been rated as problematic. This issue affects the function AttachmentUploadController of the file /WF/Ath/EntityMutliFile_Load.do of the component Attachment Handler. The manipulation of the argument oid leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9003"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--98c10aed-af0c-4b73-b74f-4a15b0f34eb0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.515093Z",
"modified": "2024-09-20T01:41:04.515093Z",
"name": "CVE-2024-46946",
"description": "langchain_experimental (aka LangChain Experimental) 0.1.17 through 0.3.0 for LangChain allows attackers to execute arbitrary code through sympy.sympify (which uses eval) in LLMSymbolicMathChain. LLMSymbolicMathChain was introduced in fcccde406dd9e9b05fc9babcbeb9ff527b0ec0c6 (2023-10-05).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46946"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4139c3a6-caf9-458b-8c42-a6d9e2657319",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16620d63-b079-491b-963a-b889367c36bc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:05.589139Z",
"modified": "2024-09-20T01:41:05.589139Z",
"name": "CVE-2024-38016",
"description": "Microsoft Office Visio Remote Code Execution Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38016"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--db31507f-0f70-46e0-afb7-33ef418e896f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:05.172542Z",
"modified": "2024-09-20T01:41:05.172542Z",
"name": "CVE-2024-7736",
"description": "A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7736"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dcff0098-4215-4f29-847c-c0f4b6670161",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:05.619148Z",
"modified": "2024-09-20T01:41:05.619148Z",
"name": "CVE-2024-47159",
"description": "In JetBrains YouTrack before 2024.3.44799 user without appropriate permissions could restore workflows attached to a project",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47159"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--56377ffc-7c26-4b4b-bb11-8230a0296b01",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.520401Z",
"modified": "2024-09-20T01:41:04.520401Z",
"name": "CVE-2024-46394",
"description": "FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/?/user/add",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46394"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bc8f4afa-0c0f-4147-b3cd-a75e050d0d86",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:19.000174Z",
"modified": "2024-09-20T01:41:19.000174Z",
"name": "CVE-2022-4533",
"description": "The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1.0. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-4533"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4835d87c-df62-4f4d-b21e-b411ff7db616",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.389896Z",
"modified": "2024-09-20T01:41:04.389896Z",
"name": "CVE-2024-9007",
"description": "A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f. It is recommended to apply a patch to fix this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9007"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d5ca4dc8-feae-4fb9-85fe-4b09dbb4155b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.384625Z",
"modified": "2024-09-20T01:41:04.384625Z",
"name": "CVE-2024-9006",
"description": "A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9006"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--305065a3-3628-4101-96f6-b206508a4b7c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--457e7107-f54f-4d00-8735-97e418e95e21",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:05.628622Z",
"modified": "2024-09-20T01:41:05.628622Z",
"name": "CVE-2024-47160",
"description": "In JetBrains YouTrack before 2024.3.44799 access to global app config data without appropriate permissions was possible",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-47160"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1ef56758-ed7e-453d-b9d5-cc095be8e220",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-20T01:41:04.263645Z",
"modified": "2024-09-20T01:41:04.263645Z",
"name": "CVE-2024-45806",
"description": "Envoy is a cloud-native high-performance edge/middle/service proxy. A security vulnerability in Envoy allows external clients to manipulate Envoy headers, potentially leading to unauthorized access or other malicious actions within the mesh. This issue arises due to Envoy's default configuration of internal trust boundaries, which considers all RFC1918 private address ranges as internal. The default behavior for handling internal addresses in Envoy has been changed. Previously, RFC1918 IP addresses were automatically considered internal, even if the internal_address_config was empty. The default configuration of Envoy will continue to trust internal addresses while in this release and it will not trust them by default in next release. If you have tooling such as probes on your private network which need to be treated as trusted (e.g. changing arbitrary x-envoy headers) please explicitly include those addresses or CIDR ranges into `internal_address_config`. Successful exploitation could allow attackers to bypass security controls, access sensitive data, or disrupt services within the mesh, like Istio. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45806"
}
]
}
]
}
Loading

0 comments on commit d1c94cd

Please sign in to comment.