From d1c94cdd7884f67966aa902b1c021c7947d9e8a6 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Fri, 20 Sep 2024 01:41:32 +0000 Subject: [PATCH] generated content from 2024-09-20 --- mapping.csv | 61 +++++++++++++++++++ ...-00f9e2f0-de1c-44bd-9c0d-0607893c0011.json | 22 +++++++ ...-08f8badc-e64b-488f-a19a-ebd62ca807d7.json | 22 +++++++ ...-0cf937e4-55e0-4c0c-ad26-d31596508fef.json | 22 +++++++ ...-0e162f45-ef00-4fd7-847e-8667de61de37.json | 22 +++++++ ...-16620d63-b079-491b-963a-b889367c36bc.json | 22 +++++++ ...-1b07bc39-bd02-4ccc-97d3-8047053fb9ea.json | 22 +++++++ ...-1e6c7aa2-4974-43e8-8f22-cc092d3f2553.json | 22 +++++++ ...-2b722b50-ac6d-40a3-bca3-c81555082082.json | 22 +++++++ ...-3b64cdf7-e816-4392-92bd-3895eecc1f6d.json | 22 +++++++ ...-3f9f9fdb-477b-47bc-a1f4-a3a891bc659a.json | 22 +++++++ ...-411f557c-7343-4f30-a167-0f76aff1a8ad.json | 22 +++++++ ...-457e7107-f54f-4d00-8735-97e418e95e21.json | 22 +++++++ ...-462f122a-af8d-4e37-ab10-2abe78a846f9.json | 22 +++++++ ...-4714c8dc-a854-4a6a-b526-7dc7d9406958.json | 22 +++++++ ...-4cbdfa3e-2fc5-43b3-8296-d30b0da9a125.json | 22 +++++++ ...-5129cdb7-070e-47e6-9a21-bb868bc71f59.json | 22 +++++++ ...-56467874-5ea2-43d2-961c-ab97034786d9.json | 22 +++++++ ...-5ca6b7df-a006-4139-9256-5c3b8518d1f7.json | 22 +++++++ ...-5da24da6-512a-43e5-8816-c65e03286633.json | 22 +++++++ ...-658b3f99-7295-4e8b-a9cc-2376066d6d32.json | 22 +++++++ ...-659bd8bf-f2b4-430f-9609-d55daa6ecf31.json | 22 +++++++ ...-67678a89-195e-4f62-9e41-af3501846ecd.json | 22 +++++++ ...-6c273ed7-7d97-44bb-8dbe-e251586631fa.json | 22 +++++++ ...-6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60.json | 22 +++++++ ...-717fc0e5-feb2-4847-bdc5-c4dc4355a7c3.json | 22 +++++++ ...-75c2584e-93a4-4f41-a0b7-a96ed4895c21.json | 22 +++++++ ...-7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e.json | 22 +++++++ ...-7dc24061-607f-443b-aaaa-470c7bd531a3.json | 22 +++++++ ...-831199f6-1265-48ec-854d-8ff56307db88.json | 22 +++++++ ...-8de01fb7-5320-4e2b-a310-425eac91130e.json | 22 +++++++ ...-8faf5695-d2b7-403f-b0b6-b2e400e65cbc.json | 22 +++++++ ...-9126e99a-68c5-4b44-8c02-eec80361132e.json | 22 +++++++ ...-9443659c-29d8-4c75-94da-426fc0234b20.json | 22 +++++++ ...-9665b7b2-1204-4f5e-a2dc-c2338e837ad4.json | 22 +++++++ ...-96c6148a-1559-4562-a01f-4cfa80aebf85.json | 22 +++++++ ...-9c49c922-faee-4a88-8220-a2426312618b.json | 22 +++++++ ...-9db511ae-77bf-493e-9d28-f39dd8ed4de2.json | 22 +++++++ ...-a5fc1025-f0f5-4160-a7da-7f29953431ca.json | 22 +++++++ ...-af256f15-9f34-467c-b646-df6f4010b97b.json | 22 +++++++ ...-b81fa7a6-44b2-4639-9258-6c5bf9a5343c.json | 22 +++++++ ...-bbb250ce-8b32-4497-924e-cc294c8686bf.json | 22 +++++++ ...-c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a.json | 22 +++++++ ...-c2a75d10-b729-4ab8-880b-3811729d0ba4.json | 22 +++++++ ...-c32ee96d-a3bb-4665-b83a-7566dc644fb0.json | 22 +++++++ ...-c84f3024-24a2-4c19-8fcf-74472623591e.json | 22 +++++++ ...-cb492da1-797e-482c-ab9a-0f779943cd95.json | 22 +++++++ ...-cf487283-2059-4af6-9911-e84bae17154a.json | 22 +++++++ ...-d3745b7e-15c7-4196-a9bc-d722df94895c.json | 22 +++++++ ...-d408014d-f577-47f5-bf4c-e2910fef4a4d.json | 22 +++++++ ...-d777a1d4-f787-4d35-8fa5-fc80a5bf929a.json | 22 +++++++ ...-dbf3d045-aa39-439a-9d57-d49e25251330.json | 22 +++++++ ...-dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6.json | 22 +++++++ ...-e22a2a04-c658-4af5-9b17-6ae2fb52ba41.json | 22 +++++++ ...-e7d120eb-a174-4a33-9c77-bb44ccebd8d7.json | 22 +++++++ ...-e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc.json | 22 +++++++ ...-ec3a44b5-2268-4cac-9158-c38bfabfcc47.json | 22 +++++++ ...-edd9aced-a00b-4ace-8e71-35158123d861.json | 22 +++++++ ...-f25dddab-41c7-4a4c-98e7-3ba97f791849.json | 22 +++++++ ...-f71fe5ef-f3ec-4f22-8087-559f8266eeeb.json | 22 +++++++ ...-fcd94263-4f04-4268-9beb-c663aa28f85a.json | 22 +++++++ ...-fd07ffff-d1ef-401d-b032-0ee9b4ab3eda.json | 22 +++++++ 62 files changed, 1403 insertions(+) create mode 100644 objects/vulnerability/vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011.json create mode 100644 objects/vulnerability/vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7.json create mode 100644 objects/vulnerability/vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef.json create mode 100644 objects/vulnerability/vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37.json create mode 100644 objects/vulnerability/vulnerability--16620d63-b079-491b-963a-b889367c36bc.json create mode 100644 objects/vulnerability/vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea.json create mode 100644 objects/vulnerability/vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553.json create mode 100644 objects/vulnerability/vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082.json create mode 100644 objects/vulnerability/vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d.json create mode 100644 objects/vulnerability/vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a.json create mode 100644 objects/vulnerability/vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad.json create mode 100644 objects/vulnerability/vulnerability--457e7107-f54f-4d00-8735-97e418e95e21.json create mode 100644 objects/vulnerability/vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9.json create mode 100644 objects/vulnerability/vulnerability--4714c8dc-a854-4a6a-b526-7dc7d9406958.json create mode 100644 objects/vulnerability/vulnerability--4cbdfa3e-2fc5-43b3-8296-d30b0da9a125.json create mode 100644 objects/vulnerability/vulnerability--5129cdb7-070e-47e6-9a21-bb868bc71f59.json create mode 100644 objects/vulnerability/vulnerability--56467874-5ea2-43d2-961c-ab97034786d9.json create mode 100644 objects/vulnerability/vulnerability--5ca6b7df-a006-4139-9256-5c3b8518d1f7.json create mode 100644 objects/vulnerability/vulnerability--5da24da6-512a-43e5-8816-c65e03286633.json create mode 100644 objects/vulnerability/vulnerability--658b3f99-7295-4e8b-a9cc-2376066d6d32.json create mode 100644 objects/vulnerability/vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31.json create mode 100644 objects/vulnerability/vulnerability--67678a89-195e-4f62-9e41-af3501846ecd.json create mode 100644 objects/vulnerability/vulnerability--6c273ed7-7d97-44bb-8dbe-e251586631fa.json create mode 100644 objects/vulnerability/vulnerability--6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60.json create mode 100644 objects/vulnerability/vulnerability--717fc0e5-feb2-4847-bdc5-c4dc4355a7c3.json create mode 100644 objects/vulnerability/vulnerability--75c2584e-93a4-4f41-a0b7-a96ed4895c21.json create mode 100644 objects/vulnerability/vulnerability--7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e.json create mode 100644 objects/vulnerability/vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3.json create mode 100644 objects/vulnerability/vulnerability--831199f6-1265-48ec-854d-8ff56307db88.json create mode 100644 objects/vulnerability/vulnerability--8de01fb7-5320-4e2b-a310-425eac91130e.json create mode 100644 objects/vulnerability/vulnerability--8faf5695-d2b7-403f-b0b6-b2e400e65cbc.json create mode 100644 objects/vulnerability/vulnerability--9126e99a-68c5-4b44-8c02-eec80361132e.json create mode 100644 objects/vulnerability/vulnerability--9443659c-29d8-4c75-94da-426fc0234b20.json create mode 100644 objects/vulnerability/vulnerability--9665b7b2-1204-4f5e-a2dc-c2338e837ad4.json create mode 100644 objects/vulnerability/vulnerability--96c6148a-1559-4562-a01f-4cfa80aebf85.json create mode 100644 objects/vulnerability/vulnerability--9c49c922-faee-4a88-8220-a2426312618b.json create mode 100644 objects/vulnerability/vulnerability--9db511ae-77bf-493e-9d28-f39dd8ed4de2.json create mode 100644 objects/vulnerability/vulnerability--a5fc1025-f0f5-4160-a7da-7f29953431ca.json create mode 100644 objects/vulnerability/vulnerability--af256f15-9f34-467c-b646-df6f4010b97b.json create mode 100644 objects/vulnerability/vulnerability--b81fa7a6-44b2-4639-9258-6c5bf9a5343c.json create mode 100644 objects/vulnerability/vulnerability--bbb250ce-8b32-4497-924e-cc294c8686bf.json create mode 100644 objects/vulnerability/vulnerability--c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a.json create mode 100644 objects/vulnerability/vulnerability--c2a75d10-b729-4ab8-880b-3811729d0ba4.json create mode 100644 objects/vulnerability/vulnerability--c32ee96d-a3bb-4665-b83a-7566dc644fb0.json create mode 100644 objects/vulnerability/vulnerability--c84f3024-24a2-4c19-8fcf-74472623591e.json create mode 100644 objects/vulnerability/vulnerability--cb492da1-797e-482c-ab9a-0f779943cd95.json create mode 100644 objects/vulnerability/vulnerability--cf487283-2059-4af6-9911-e84bae17154a.json create mode 100644 objects/vulnerability/vulnerability--d3745b7e-15c7-4196-a9bc-d722df94895c.json create mode 100644 objects/vulnerability/vulnerability--d408014d-f577-47f5-bf4c-e2910fef4a4d.json create mode 100644 objects/vulnerability/vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a.json create mode 100644 objects/vulnerability/vulnerability--dbf3d045-aa39-439a-9d57-d49e25251330.json create mode 100644 objects/vulnerability/vulnerability--dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6.json create mode 100644 objects/vulnerability/vulnerability--e22a2a04-c658-4af5-9b17-6ae2fb52ba41.json create mode 100644 objects/vulnerability/vulnerability--e7d120eb-a174-4a33-9c77-bb44ccebd8d7.json create mode 100644 objects/vulnerability/vulnerability--e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc.json create mode 100644 objects/vulnerability/vulnerability--ec3a44b5-2268-4cac-9158-c38bfabfcc47.json create mode 100644 objects/vulnerability/vulnerability--edd9aced-a00b-4ace-8e71-35158123d861.json create mode 100644 objects/vulnerability/vulnerability--f25dddab-41c7-4a4c-98e7-3ba97f791849.json create mode 100644 objects/vulnerability/vulnerability--f71fe5ef-f3ec-4f22-8087-559f8266eeeb.json create mode 100644 objects/vulnerability/vulnerability--fcd94263-4f04-4268-9beb-c663aa28f85a.json create mode 100644 objects/vulnerability/vulnerability--fd07ffff-d1ef-401d-b032-0ee9b4ab3eda.json diff --git a/mapping.csv b/mapping.csv index bf71739c533..25dda5a136c 100644 --- a/mapping.csv +++ b/mapping.csv @@ -249798,3 +249798,64 @@ vulnerability,CVE-2022-25769,vulnerability--1602e54a-ff65-434e-8c0d-9c1727f1e700 vulnerability,CVE-2022-25775,vulnerability--b0bad660-97fa-47b6-8436-005042d448a8 vulnerability,CVE-2022-25770,vulnerability--d5c37c6a-abee-42ec-a3ec-6899757eb14b vulnerability,CVE-2022-25776,vulnerability--3398415d-b6f6-41dc-b599-875acae1b67f +vulnerability,CVE-2024-33109,vulnerability--b81fa7a6-44b2-4639-9258-6c5bf9a5343c +vulnerability,CVE-2024-43496,vulnerability--831199f6-1265-48ec-854d-8ff56307db88 +vulnerability,CVE-2024-43489,vulnerability--ec3a44b5-2268-4cac-9158-c38bfabfcc47 +vulnerability,CVE-2024-45808,vulnerability--c32ee96d-a3bb-4665-b83a-7566dc644fb0 +vulnerability,CVE-2024-45769,vulnerability--9665b7b2-1204-4f5e-a2dc-c2338e837ad4 +vulnerability,CVE-2024-45810,vulnerability--dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6 +vulnerability,CVE-2024-45862,vulnerability--8faf5695-d2b7-403f-b0b6-b2e400e65cbc +vulnerability,CVE-2024-45809,vulnerability--f25dddab-41c7-4a4c-98e7-3ba97f791849 +vulnerability,CVE-2024-45752,vulnerability--6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60 +vulnerability,CVE-2024-45861,vulnerability--4cbdfa3e-2fc5-43b3-8296-d30b0da9a125 +vulnerability,CVE-2024-45770,vulnerability--4714c8dc-a854-4a6a-b526-7dc7d9406958 +vulnerability,CVE-2024-45806,vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9 +vulnerability,CVE-2024-45614,vulnerability--9db511ae-77bf-493e-9d28-f39dd8ed4de2 +vulnerability,CVE-2024-45410,vulnerability--e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc +vulnerability,CVE-2024-45807,vulnerability--cb492da1-797e-482c-ab9a-0f779943cd95 +vulnerability,CVE-2024-9001,vulnerability--9c49c922-faee-4a88-8220-a2426312618b +vulnerability,CVE-2024-9006,vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad +vulnerability,CVE-2024-9009,vulnerability--f71fe5ef-f3ec-4f22-8087-559f8266eeeb +vulnerability,CVE-2024-9011,vulnerability--8de01fb7-5320-4e2b-a310-425eac91130e +vulnerability,CVE-2024-9008,vulnerability--fcd94263-4f04-4268-9beb-c663aa28f85a +vulnerability,CVE-2024-9004,vulnerability--5ca6b7df-a006-4139-9256-5c3b8518d1f7 +vulnerability,CVE-2024-9007,vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a +vulnerability,CVE-2024-9003,vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef +vulnerability,CVE-2024-8986,vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011 +vulnerability,CVE-2024-8375,vulnerability--dbf3d045-aa39-439a-9d57-d49e25251330 +vulnerability,CVE-2024-8653,vulnerability--c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a +vulnerability,CVE-2024-8963,vulnerability--bbb250ce-8b32-4497-924e-cc294c8686bf +vulnerability,CVE-2024-8354,vulnerability--7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e +vulnerability,CVE-2024-8883,vulnerability--67678a89-195e-4f62-9e41-af3501846ecd +vulnerability,CVE-2024-8850,vulnerability--c2a75d10-b729-4ab8-880b-3811729d0ba4 +vulnerability,CVE-2024-8698,vulnerability--56467874-5ea2-43d2-961c-ab97034786d9 +vulnerability,CVE-2024-8652,vulnerability--cf487283-2059-4af6-9911-e84bae17154a +vulnerability,CVE-2024-8364,vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7 +vulnerability,CVE-2024-8651,vulnerability--5da24da6-512a-43e5-8816-c65e03286633 +vulnerability,CVE-2024-40125,vulnerability--af256f15-9f34-467c-b646-df6f4010b97b +vulnerability,CVE-2024-46946,vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37 +vulnerability,CVE-2024-46382,vulnerability--6c273ed7-7d97-44bb-8dbe-e251586631fa +vulnerability,CVE-2024-46394,vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082 +vulnerability,CVE-2024-46984,vulnerability--fd07ffff-d1ef-401d-b032-0ee9b4ab3eda +vulnerability,CVE-2024-46983,vulnerability--e7d120eb-a174-4a33-9c77-bb44ccebd8d7 +vulnerability,CVE-2024-46999,vulnerability--96c6148a-1559-4562-a01f-4cfa80aebf85 +vulnerability,CVE-2024-31570,vulnerability--9443659c-29d8-4c75-94da-426fc0234b20 +vulnerability,CVE-2024-25673,vulnerability--edd9aced-a00b-4ace-8e71-35158123d861 +vulnerability,CVE-2024-7736,vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea +vulnerability,CVE-2024-7785,vulnerability--9126e99a-68c5-4b44-8c02-eec80361132e +vulnerability,CVE-2024-7207,vulnerability--658b3f99-7295-4e8b-a9cc-2376066d6d32 +vulnerability,CVE-2024-7737,vulnerability--d3745b7e-15c7-4196-a9bc-d722df94895c +vulnerability,CVE-2024-38221,vulnerability--c84f3024-24a2-4c19-8fcf-74472623591e +vulnerability,CVE-2024-38016,vulnerability--16620d63-b079-491b-963a-b889367c36bc +vulnerability,CVE-2024-47159,vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553 +vulnerability,CVE-2024-47087,vulnerability--a5fc1025-f0f5-4160-a7da-7f29953431ca +vulnerability,CVE-2024-47086,vulnerability--717fc0e5-feb2-4847-bdc5-c4dc4355a7c3 +vulnerability,CVE-2024-47162,vulnerability--5129cdb7-070e-47e6-9a21-bb868bc71f59 +vulnerability,CVE-2024-47089,vulnerability--d408014d-f577-47f5-bf4c-e2910fef4a4d +vulnerability,CVE-2024-47088,vulnerability--75c2584e-93a4-4f41-a0b7-a96ed4895c21 +vulnerability,CVE-2024-47060,vulnerability--e22a2a04-c658-4af5-9b17-6ae2fb52ba41 +vulnerability,CVE-2024-47160,vulnerability--457e7107-f54f-4d00-8735-97e418e95e21 +vulnerability,CVE-2024-47000,vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31 +vulnerability,CVE-2024-47085,vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3 +vulnerability,CVE-2023-27584,vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a +vulnerability,CVE-2022-4533,vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d diff --git a/objects/vulnerability/vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011.json b/objects/vulnerability/vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011.json new file mode 100644 index 00000000000..bfdf5adc94c --- /dev/null +++ b/objects/vulnerability/vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--29e7ee93-c08c-4bde-b2a6-7fecb00172c1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--00f9e2f0-de1c-44bd-9c0d-0607893c0011", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.399035Z", + "modified": "2024-09-20T01:41:04.399035Z", + "name": "CVE-2024-8986", + "description": "The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`.\n \nIf credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8986" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7.json b/objects/vulnerability/vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7.json new file mode 100644 index 00000000000..6b5bf6a134e --- /dev/null +++ b/objects/vulnerability/vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b254e85e-64a4-4da9-9f6f-f2f698de24af", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--08f8badc-e64b-488f-a19a-ebd62ca807d7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.451731Z", + "modified": "2024-09-20T01:41:04.451731Z", + "name": "CVE-2024-8364", + "description": "The WP Custom Fields Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcfs-preset shortcode in all versions up to, and including, 1.2.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8364" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef.json b/objects/vulnerability/vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef.json new file mode 100644 index 00000000000..276bb4f7c99 --- /dev/null +++ b/objects/vulnerability/vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3a35ffcb-854d-4b35-a4fd-a82cc5cf11b2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0cf937e4-55e0-4c0c-ad26-d31596508fef", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.390798Z", + "modified": "2024-09-20T01:41:04.390798Z", + "name": "CVE-2024-9003", + "description": "A vulnerability was found in Jinan Chicheng Company JFlow 2.0.0. It has been rated as problematic. This issue affects the function AttachmentUploadController of the file /WF/Ath/EntityMutliFile_Load.do of the component Attachment Handler. The manipulation of the argument oid leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9003" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37.json b/objects/vulnerability/vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37.json new file mode 100644 index 00000000000..5c1687f4a0e --- /dev/null +++ b/objects/vulnerability/vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--98c10aed-af0c-4b73-b74f-4a15b0f34eb0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0e162f45-ef00-4fd7-847e-8667de61de37", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.515093Z", + "modified": "2024-09-20T01:41:04.515093Z", + "name": "CVE-2024-46946", + "description": "langchain_experimental (aka LangChain Experimental) 0.1.17 through 0.3.0 for LangChain allows attackers to execute arbitrary code through sympy.sympify (which uses eval) in LLMSymbolicMathChain. LLMSymbolicMathChain was introduced in fcccde406dd9e9b05fc9babcbeb9ff527b0ec0c6 (2023-10-05).", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46946" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--16620d63-b079-491b-963a-b889367c36bc.json b/objects/vulnerability/vulnerability--16620d63-b079-491b-963a-b889367c36bc.json new file mode 100644 index 00000000000..4c8f8752927 --- /dev/null +++ b/objects/vulnerability/vulnerability--16620d63-b079-491b-963a-b889367c36bc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4139c3a6-caf9-458b-8c42-a6d9e2657319", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--16620d63-b079-491b-963a-b889367c36bc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.589139Z", + "modified": "2024-09-20T01:41:05.589139Z", + "name": "CVE-2024-38016", + "description": "Microsoft Office Visio Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-38016" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea.json b/objects/vulnerability/vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea.json new file mode 100644 index 00000000000..4d999c154fc --- /dev/null +++ b/objects/vulnerability/vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--db31507f-0f70-46e0-afb7-33ef418e896f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1b07bc39-bd02-4ccc-97d3-8047053fb9ea", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.172542Z", + "modified": "2024-09-20T01:41:05.172542Z", + "name": "CVE-2024-7736", + "description": "A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-7736" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553.json b/objects/vulnerability/vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553.json new file mode 100644 index 00000000000..60eb36f44e8 --- /dev/null +++ b/objects/vulnerability/vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--dcff0098-4215-4f29-847c-c0f4b6670161", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1e6c7aa2-4974-43e8-8f22-cc092d3f2553", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.619148Z", + "modified": "2024-09-20T01:41:05.619148Z", + "name": "CVE-2024-47159", + "description": "In JetBrains YouTrack before 2024.3.44799 user without appropriate permissions could restore workflows attached to a project", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47159" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082.json b/objects/vulnerability/vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082.json new file mode 100644 index 00000000000..68303a6092d --- /dev/null +++ b/objects/vulnerability/vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--56377ffc-7c26-4b4b-bb11-8230a0296b01", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2b722b50-ac6d-40a3-bca3-c81555082082", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.520401Z", + "modified": "2024-09-20T01:41:04.520401Z", + "name": "CVE-2024-46394", + "description": "FrogCMS v0.9.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/?/user/add", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46394" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d.json b/objects/vulnerability/vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d.json new file mode 100644 index 00000000000..a6fb0eda8dd --- /dev/null +++ b/objects/vulnerability/vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bc8f4afa-0c0f-4147-b3cd-a75e050d0d86", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3b64cdf7-e816-4392-92bd-3895eecc1f6d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:19.000174Z", + "modified": "2024-09-20T01:41:19.000174Z", + "name": "CVE-2022-4533", + "description": "The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1.0. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2022-4533" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a.json b/objects/vulnerability/vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a.json new file mode 100644 index 00000000000..1920ab73081 --- /dev/null +++ b/objects/vulnerability/vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4835d87c-df62-4f4d-b21e-b411ff7db616", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3f9f9fdb-477b-47bc-a1f4-a3a891bc659a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.389896Z", + "modified": "2024-09-20T01:41:04.389896Z", + "name": "CVE-2024-9007", + "description": "A vulnerability classified as problematic has been found in jeanmarc77 123solar 1.8.4.5. This affects an unknown part of the file /detailed.php. The manipulation of the argument date1 leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The patch is named 94bf9ab7ad0ccb7fbdc02f172f37f0e2ea08d48f. It is recommended to apply a patch to fix this issue.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9007" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad.json b/objects/vulnerability/vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad.json new file mode 100644 index 00000000000..6b056cae5da --- /dev/null +++ b/objects/vulnerability/vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d5ca4dc8-feae-4fb9-85fe-4b09dbb4155b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--411f557c-7343-4f30-a167-0f76aff1a8ad", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.384625Z", + "modified": "2024-09-20T01:41:04.384625Z", + "name": "CVE-2024-9006", + "description": "A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9006" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--457e7107-f54f-4d00-8735-97e418e95e21.json b/objects/vulnerability/vulnerability--457e7107-f54f-4d00-8735-97e418e95e21.json new file mode 100644 index 00000000000..284143bf7ce --- /dev/null +++ b/objects/vulnerability/vulnerability--457e7107-f54f-4d00-8735-97e418e95e21.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--305065a3-3628-4101-96f6-b206508a4b7c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--457e7107-f54f-4d00-8735-97e418e95e21", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.628622Z", + "modified": "2024-09-20T01:41:05.628622Z", + "name": "CVE-2024-47160", + "description": "In JetBrains YouTrack before 2024.3.44799 access to global app config data without appropriate permissions was possible", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47160" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9.json b/objects/vulnerability/vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9.json new file mode 100644 index 00000000000..17d0158a16d --- /dev/null +++ b/objects/vulnerability/vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1ef56758-ed7e-453d-b9d5-cc095be8e220", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--462f122a-af8d-4e37-ab10-2abe78a846f9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.263645Z", + "modified": "2024-09-20T01:41:04.263645Z", + "name": "CVE-2024-45806", + "description": "Envoy is a cloud-native high-performance edge/middle/service proxy. A security vulnerability in Envoy allows external clients to manipulate Envoy headers, potentially leading to unauthorized access or other malicious actions within the mesh. This issue arises due to Envoy's default configuration of internal trust boundaries, which considers all RFC1918 private address ranges as internal. The default behavior for handling internal addresses in Envoy has been changed. Previously, RFC1918 IP addresses were automatically considered internal, even if the internal_address_config was empty. The default configuration of Envoy will continue to trust internal addresses while in this release and it will not trust them by default in next release. If you have tooling such as probes on your private network which need to be treated as trusted (e.g. changing arbitrary x-envoy headers) please explicitly include those addresses or CIDR ranges into `internal_address_config`. Successful exploitation could allow attackers to bypass security controls, access sensitive data, or disrupt services within the mesh, like Istio. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45806" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4714c8dc-a854-4a6a-b526-7dc7d9406958.json b/objects/vulnerability/vulnerability--4714c8dc-a854-4a6a-b526-7dc7d9406958.json new file mode 100644 index 00000000000..49efd3ad676 --- /dev/null +++ b/objects/vulnerability/vulnerability--4714c8dc-a854-4a6a-b526-7dc7d9406958.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--26c19fa0-8dbe-410c-bbfa-a876a4f58881", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4714c8dc-a854-4a6a-b526-7dc7d9406958", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.258638Z", + "modified": "2024-09-20T01:41:04.258638Z", + "name": "CVE-2024-45770", + "description": "A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45770" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4cbdfa3e-2fc5-43b3-8296-d30b0da9a125.json b/objects/vulnerability/vulnerability--4cbdfa3e-2fc5-43b3-8296-d30b0da9a125.json new file mode 100644 index 00000000000..906eeba8eb1 --- /dev/null +++ b/objects/vulnerability/vulnerability--4cbdfa3e-2fc5-43b3-8296-d30b0da9a125.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--def32fee-2eb6-4e26-95df-e6851815798b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4cbdfa3e-2fc5-43b3-8296-d30b0da9a125", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.248164Z", + "modified": "2024-09-20T01:41:04.248164Z", + "name": "CVE-2024-45861", + "description": "Kastle Systems firmware prior to May 1, 2024, contained a hard-coded credential, which if accessed may allow an attacker to access sensitive information.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45861" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5129cdb7-070e-47e6-9a21-bb868bc71f59.json b/objects/vulnerability/vulnerability--5129cdb7-070e-47e6-9a21-bb868bc71f59.json new file mode 100644 index 00000000000..1adf52c60c7 --- /dev/null +++ b/objects/vulnerability/vulnerability--5129cdb7-070e-47e6-9a21-bb868bc71f59.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1ae8cb66-a546-4162-8972-ef3c6f6b0628", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5129cdb7-070e-47e6-9a21-bb868bc71f59", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.62261Z", + "modified": "2024-09-20T01:41:05.62261Z", + "name": "CVE-2024-47162", + "description": "In JetBrains YouTrack before 2024.3.44799 token could be revealed on Imports page", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47162" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--56467874-5ea2-43d2-961c-ab97034786d9.json b/objects/vulnerability/vulnerability--56467874-5ea2-43d2-961c-ab97034786d9.json new file mode 100644 index 00000000000..59db770d619 --- /dev/null +++ b/objects/vulnerability/vulnerability--56467874-5ea2-43d2-961c-ab97034786d9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--36a0757f-41fb-4201-89a1-22dbab368eef", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--56467874-5ea2-43d2-961c-ab97034786d9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.430193Z", + "modified": "2024-09-20T01:41:04.430193Z", + "name": "CVE-2024-8698", + "description": "A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8698" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5ca6b7df-a006-4139-9256-5c3b8518d1f7.json b/objects/vulnerability/vulnerability--5ca6b7df-a006-4139-9256-5c3b8518d1f7.json new file mode 100644 index 00000000000..6f0cf020c7a --- /dev/null +++ b/objects/vulnerability/vulnerability--5ca6b7df-a006-4139-9256-5c3b8518d1f7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--547baa1d-4b3a-4442-9385-44b3225e5b51", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5ca6b7df-a006-4139-9256-5c3b8518d1f7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.388786Z", + "modified": "2024-09-20T01:41:04.388786Z", + "name": "CVE-2024-9004", + "description": "** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in D-Link DAR-7000 up to 20240912. Affected is an unknown function of the file /view/DBManage/Backup_Server_commit.php. The manipulation of the argument host leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9004" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5da24da6-512a-43e5-8816-c65e03286633.json b/objects/vulnerability/vulnerability--5da24da6-512a-43e5-8816-c65e03286633.json new file mode 100644 index 00000000000..84c2b1e45eb --- /dev/null +++ b/objects/vulnerability/vulnerability--5da24da6-512a-43e5-8816-c65e03286633.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--62884ecd-ccea-4003-9410-7dcaa7d0abfa", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5da24da6-512a-43e5-8816-c65e03286633", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.457395Z", + "modified": "2024-09-20T01:41:04.457395Z", + "name": "CVE-2024-8651", + "description": "A vulnerability in NetCat CMS allows an attacker to send a specially crafted http request that can be used to check whether a user exists in the system, which could be a basis for further attacks.\nThis issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others.\n\nApply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8651" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--658b3f99-7295-4e8b-a9cc-2376066d6d32.json b/objects/vulnerability/vulnerability--658b3f99-7295-4e8b-a9cc-2376066d6d32.json new file mode 100644 index 00000000000..0945ef1ff78 --- /dev/null +++ b/objects/vulnerability/vulnerability--658b3f99-7295-4e8b-a9cc-2376066d6d32.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--962e0b1d-bb47-4554-b2ed-5913c9253ab3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--658b3f99-7295-4e8b-a9cc-2376066d6d32", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.188253Z", + "modified": "2024-09-20T01:41:05.188253Z", + "name": "CVE-2024-7207", + "description": "A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-7207" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31.json b/objects/vulnerability/vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31.json new file mode 100644 index 00000000000..dfc5e23ee48 --- /dev/null +++ b/objects/vulnerability/vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a22cda45-bee2-4890-ac7f-c02688432523", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--659bd8bf-f2b4-430f-9609-d55daa6ecf31", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.630399Z", + "modified": "2024-09-20T01:41:05.630399Z", + "name": "CVE-2024-47000", + "description": "Zitadel is an open source identity management platform. ZITADEL's user account deactivation mechanism did not work correctly with service accounts. Deactivated service accounts retained the ability to request tokens, which could lead to unauthorized access to applications and resources. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised t upgrade. Users unable to upgrade may instead of deactivating the service account, consider creating new credentials and replacing the old ones wherever they are used. This effectively prevents the deactivated service account from being utilized. Be sure to revoke all existing authentication keys associated with the service account and to rotate the service account's password.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47000" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--67678a89-195e-4f62-9e41-af3501846ecd.json b/objects/vulnerability/vulnerability--67678a89-195e-4f62-9e41-af3501846ecd.json new file mode 100644 index 00000000000..87c43265dc8 --- /dev/null +++ b/objects/vulnerability/vulnerability--67678a89-195e-4f62-9e41-af3501846ecd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--21057cf9-df68-4ca6-b070-df189ea37229", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--67678a89-195e-4f62-9e41-af3501846ecd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.416342Z", + "modified": "2024-09-20T01:41:04.416342Z", + "name": "CVE-2024-8883", + "description": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8883" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6c273ed7-7d97-44bb-8dbe-e251586631fa.json b/objects/vulnerability/vulnerability--6c273ed7-7d97-44bb-8dbe-e251586631fa.json new file mode 100644 index 00000000000..46dc0684153 --- /dev/null +++ b/objects/vulnerability/vulnerability--6c273ed7-7d97-44bb-8dbe-e251586631fa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3595b301-4fbe-4d70-9036-395255c6df6a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6c273ed7-7d97-44bb-8dbe-e251586631fa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.51733Z", + "modified": "2024-09-20T01:41:04.51733Z", + "name": "CVE-2024-46382", + "description": "A SQL injection vulnerability in linlinjava litemall 1.8.0 allows a remote attacker to obtain sensitive information via the goodsId, goodsSn, and name parameters in AdminGoodscontroller.java.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46382" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60.json b/objects/vulnerability/vulnerability--6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60.json new file mode 100644 index 00000000000..07e3bec1c06 --- /dev/null +++ b/objects/vulnerability/vulnerability--6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b1df52a5-19e6-456b-a6ad-b1a3e31f8649", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6dfc56d0-9d56-4a10-b15c-cae1ceaf8f60", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.246671Z", + "modified": "2024-09-20T01:41:04.246671Z", + "name": "CVE-2024-45752", + "description": "logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45752" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--717fc0e5-feb2-4847-bdc5-c4dc4355a7c3.json b/objects/vulnerability/vulnerability--717fc0e5-feb2-4847-bdc5-c4dc4355a7c3.json new file mode 100644 index 00000000000..8480746e161 --- /dev/null +++ b/objects/vulnerability/vulnerability--717fc0e5-feb2-4847-bdc5-c4dc4355a7c3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7a7c1c1e-ff26-4abe-a845-025142f68edd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--717fc0e5-feb2-4847-bdc5-c4dc4355a7c3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.621612Z", + "modified": "2024-09-20T01:41:05.621612Z", + "name": "CVE-2024-47086", + "description": "This vulnerability exists in Apex Softcell LD DP Back Office due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by providing arbitrary OTP value for authentication and subsequently changing its API response. \n\nSuccessful exploitation of this vulnerability could allow the attacker to bypass OTP verification for other user accounts.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47086" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--75c2584e-93a4-4f41-a0b7-a96ed4895c21.json b/objects/vulnerability/vulnerability--75c2584e-93a4-4f41-a0b7-a96ed4895c21.json new file mode 100644 index 00000000000..7a9273c8810 --- /dev/null +++ b/objects/vulnerability/vulnerability--75c2584e-93a4-4f41-a0b7-a96ed4895c21.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2ff6c564-d876-404c-af81-63764bf24d36", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--75c2584e-93a4-4f41-a0b7-a96ed4895c21", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.624804Z", + "modified": "2024-09-20T01:41:05.624804Z", + "name": "CVE-2024-47088", + "description": "This vulnerability exists in Apex Softcell LD Geo due to missing restrictions for excessive failed authentication attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a brute force attack on login OTP, which could lead to gain unauthorized access to other user accounts.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47088" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e.json b/objects/vulnerability/vulnerability--7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e.json new file mode 100644 index 00000000000..60dc345a2d5 --- /dev/null +++ b/objects/vulnerability/vulnerability--7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fe272695-d736-4617-a680-1740a32dfc9e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7bdb1377-6ec9-4aa5-9bd5-6dde13e4565e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.414714Z", + "modified": "2024-09-20T01:41:04.414714Z", + "name": "CVE-2024-8354", + "description": "A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8354" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3.json b/objects/vulnerability/vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3.json new file mode 100644 index 00000000000..94d3154ad59 --- /dev/null +++ b/objects/vulnerability/vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9a4ce842-da73-470f-9b6b-3241affd9f3f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7dc24061-607f-443b-aaaa-470c7bd531a3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.63279Z", + "modified": "2024-09-20T01:41:05.63279Z", + "name": "CVE-2024-47085", + "description": "This vulnerability exists in Apex Softcell LD DP Back Office due to improper validation of certain parameters “cCdslClicentcode” and “cLdClientCode” in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating parameters in the API request body leading to exposure of sensitive information belonging to other users.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47085" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--831199f6-1265-48ec-854d-8ff56307db88.json b/objects/vulnerability/vulnerability--831199f6-1265-48ec-854d-8ff56307db88.json new file mode 100644 index 00000000000..b4388ff6c3e --- /dev/null +++ b/objects/vulnerability/vulnerability--831199f6-1265-48ec-854d-8ff56307db88.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7d7ce6b3-88a4-4bbf-8cc2-213cc8340da0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--831199f6-1265-48ec-854d-8ff56307db88", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:03.79873Z", + "modified": "2024-09-20T01:41:03.79873Z", + "name": "CVE-2024-43496", + "description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43496" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8de01fb7-5320-4e2b-a310-425eac91130e.json b/objects/vulnerability/vulnerability--8de01fb7-5320-4e2b-a310-425eac91130e.json new file mode 100644 index 00000000000..cb5a9a709fe --- /dev/null +++ b/objects/vulnerability/vulnerability--8de01fb7-5320-4e2b-a310-425eac91130e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c98e5f87-2bf8-4087-a8b2-591ce2736366", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8de01fb7-5320-4e2b-a310-425eac91130e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.386724Z", + "modified": "2024-09-20T01:41:04.386724Z", + "name": "CVE-2024-9011", + "description": "A vulnerability, which was classified as critical, was found in code-projects Crud Operation System 1.0. Affected is an unknown function of the file updata.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9011" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8faf5695-d2b7-403f-b0b6-b2e400e65cbc.json b/objects/vulnerability/vulnerability--8faf5695-d2b7-403f-b0b6-b2e400e65cbc.json new file mode 100644 index 00000000000..6776dfea379 --- /dev/null +++ b/objects/vulnerability/vulnerability--8faf5695-d2b7-403f-b0b6-b2e400e65cbc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9436b1fc-57df-4d0c-bfff-4c63f87ce0a2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8faf5695-d2b7-403f-b0b6-b2e400e65cbc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.241099Z", + "modified": "2024-09-20T01:41:04.241099Z", + "name": "CVE-2024-45862", + "description": "Kastle Systems firmware prior to May 1, 2024, stored machine credentials in cleartext, which may allow an attacker to access sensitive information.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45862" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9126e99a-68c5-4b44-8c02-eec80361132e.json b/objects/vulnerability/vulnerability--9126e99a-68c5-4b44-8c02-eec80361132e.json new file mode 100644 index 00000000000..f5f7b8f476c --- /dev/null +++ b/objects/vulnerability/vulnerability--9126e99a-68c5-4b44-8c02-eec80361132e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0d44317b-d8d8-4319-a899-a4d088d6da27", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9126e99a-68c5-4b44-8c02-eec80361132e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.175007Z", + "modified": "2024-09-20T01:41:05.175007Z", + "name": "CVE-2024-7785", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ece Software Electronic Ticket System allows Reflected XSS, Cross-Site Scripting (XSS).This issue affects Electronic Ticket System: before 2024.08.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-7785" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9443659c-29d8-4c75-94da-426fc0234b20.json b/objects/vulnerability/vulnerability--9443659c-29d8-4c75-94da-426fc0234b20.json new file mode 100644 index 00000000000..97653c815b3 --- /dev/null +++ b/objects/vulnerability/vulnerability--9443659c-29d8-4c75-94da-426fc0234b20.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--16f50ede-2124-43a6-acf4-f16009c70b16", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9443659c-29d8-4c75-94da-426fc0234b20", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.573195Z", + "modified": "2024-09-20T01:41:04.573195Z", + "name": "CVE-2024-31570", + "description": "libfreeimage in FreeImage 3.4.0 through 3.18.0 has a stack-based buffer overflow in the PluginXPM.cpp Load function via an XPM file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-31570" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9665b7b2-1204-4f5e-a2dc-c2338e837ad4.json b/objects/vulnerability/vulnerability--9665b7b2-1204-4f5e-a2dc-c2338e837ad4.json new file mode 100644 index 00000000000..aa822892332 --- /dev/null +++ b/objects/vulnerability/vulnerability--9665b7b2-1204-4f5e-a2dc-c2338e837ad4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--484a9b8d-b6d7-4856-b093-1de7acf2d61b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9665b7b2-1204-4f5e-a2dc-c2338e837ad4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.176421Z", + "modified": "2024-09-20T01:41:04.176421Z", + "name": "CVE-2024-45769", + "description": "A vulnerability was found in Performance Co-Pilot (PCP).  This flaw allows an attacker to send specially crafted data to the system, which could cause the program to misbehave or crash.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45769" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--96c6148a-1559-4562-a01f-4cfa80aebf85.json b/objects/vulnerability/vulnerability--96c6148a-1559-4562-a01f-4cfa80aebf85.json new file mode 100644 index 00000000000..3197127323b --- /dev/null +++ b/objects/vulnerability/vulnerability--96c6148a-1559-4562-a01f-4cfa80aebf85.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--79519fbc-3cdd-4113-aff3-2c8534118cd0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--96c6148a-1559-4562-a01f-4cfa80aebf85", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.550178Z", + "modified": "2024-09-20T01:41:04.550178Z", + "name": "CVE-2024-46999", + "description": "Zitadel is an open source identity management platform. ZITADEL's user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources. Additionally, the management and auth API always returned the state as active or did not provide any information about the state. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly remove the user grants to make sure the user does not get access anymore.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46999" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9c49c922-faee-4a88-8220-a2426312618b.json b/objects/vulnerability/vulnerability--9c49c922-faee-4a88-8220-a2426312618b.json new file mode 100644 index 00000000000..dcf6af36ade --- /dev/null +++ b/objects/vulnerability/vulnerability--9c49c922-faee-4a88-8220-a2426312618b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--08b5a94b-69c1-446f-937c-46591fa5d4f0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9c49c922-faee-4a88-8220-a2426312618b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.38321Z", + "modified": "2024-09-20T01:41:04.38321Z", + "name": "CVE-2024-9001", + "description": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9001" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9db511ae-77bf-493e-9d28-f39dd8ed4de2.json b/objects/vulnerability/vulnerability--9db511ae-77bf-493e-9d28-f39dd8ed4de2.json new file mode 100644 index 00000000000..1000765e7bd --- /dev/null +++ b/objects/vulnerability/vulnerability--9db511ae-77bf-493e-9d28-f39dd8ed4de2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--48701d3d-6656-4f7a-be30-cc1b382d93c4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9db511ae-77bf-493e-9d28-f39dd8ed4de2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.267442Z", + "modified": "2024-09-20T01:41:04.267442Z", + "name": "CVE-2024-45614", + "description": "Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45614" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a5fc1025-f0f5-4160-a7da-7f29953431ca.json b/objects/vulnerability/vulnerability--a5fc1025-f0f5-4160-a7da-7f29953431ca.json new file mode 100644 index 00000000000..1f4ffb3290e --- /dev/null +++ b/objects/vulnerability/vulnerability--a5fc1025-f0f5-4160-a7da-7f29953431ca.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c09668c8-69a3-41c8-ac8c-38db43bb3d35", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a5fc1025-f0f5-4160-a7da-7f29953431ca", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.620446Z", + "modified": "2024-09-20T01:41:05.620446Z", + "name": "CVE-2024-47087", + "description": "This vulnerability exists in Apex Softcell LD Geo due to improper validation of the certain parameters (Client ID, DPID or BOID) in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating parameters in the API request body leading to exposure of sensitive information belonging to other users.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47087" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--af256f15-9f34-467c-b646-df6f4010b97b.json b/objects/vulnerability/vulnerability--af256f15-9f34-467c-b646-df6f4010b97b.json new file mode 100644 index 00000000000..1019277e3b2 --- /dev/null +++ b/objects/vulnerability/vulnerability--af256f15-9f34-467c-b646-df6f4010b97b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0703d65c-c5d6-451b-bb75-8986f1e8ab90", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--af256f15-9f34-467c-b646-df6f4010b97b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.488081Z", + "modified": "2024-09-20T01:41:04.488081Z", + "name": "CVE-2024-40125", + "description": "An arbitrary file upload vulnerability in the Media Manager function of Closed-Loop Technology CLESS Server v4.5.2 allows attackers to execute arbitrary code via uploading a crafted PHP file to the upload endpoint.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-40125" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b81fa7a6-44b2-4639-9258-6c5bf9a5343c.json b/objects/vulnerability/vulnerability--b81fa7a6-44b2-4639-9258-6c5bf9a5343c.json new file mode 100644 index 00000000000..59866f91160 --- /dev/null +++ b/objects/vulnerability/vulnerability--b81fa7a6-44b2-4639-9258-6c5bf9a5343c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--62be846a-9666-4920-baf8-84bfae985766", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b81fa7a6-44b2-4639-9258-6c5bf9a5343c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:03.761966Z", + "modified": "2024-09-20T01:41:03.761966Z", + "name": "CVE-2024-33109", + "description": "Directory Traversal in the web interface of the Tiptel IP 286 with firmware version 2.61.13.10 allows attackers to overwrite arbitrary files on the phone via the Ringtone upload function.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-33109" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bbb250ce-8b32-4497-924e-cc294c8686bf.json b/objects/vulnerability/vulnerability--bbb250ce-8b32-4497-924e-cc294c8686bf.json new file mode 100644 index 00000000000..37a1af3ba3f --- /dev/null +++ b/objects/vulnerability/vulnerability--bbb250ce-8b32-4497-924e-cc294c8686bf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e92acafa-408f-4683-9832-ff12df1317cb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bbb250ce-8b32-4497-924e-cc294c8686bf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.4135Z", + "modified": "2024-09-20T01:41:04.4135Z", + "name": "CVE-2024-8963", + "description": "Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8963" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a.json b/objects/vulnerability/vulnerability--c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a.json new file mode 100644 index 00000000000..3b7b00555de --- /dev/null +++ b/objects/vulnerability/vulnerability--c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--71f7bf19-abe0-4158-8213-71e97e0bd13b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c1ba7d2f-bdf7-42c3-b4f6-b3eff2bbe85a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.407292Z", + "modified": "2024-09-20T01:41:04.407292Z", + "name": "CVE-2024-8653", + "description": "A vulnerability in NetCat CMS allows an attacker to execute JavaScript code in a user's browser when they visit specific paths on the site.\nThis issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others.\n\nApply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8653" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c2a75d10-b729-4ab8-880b-3811729d0ba4.json b/objects/vulnerability/vulnerability--c2a75d10-b729-4ab8-880b-3811729d0ba4.json new file mode 100644 index 00000000000..3551ea79dff --- /dev/null +++ b/objects/vulnerability/vulnerability--c2a75d10-b729-4ab8-880b-3811729d0ba4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--289f6725-ee95-4b81-a166-2852ca285f89", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c2a75d10-b729-4ab8-880b-3811729d0ba4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.428057Z", + "modified": "2024-09-20T01:41:04.428057Z", + "name": "CVE-2024-8850", + "description": "The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter when a placeholder such as {email} is used for the field in versions 4.9.9 to 4.9.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8850" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c32ee96d-a3bb-4665-b83a-7566dc644fb0.json b/objects/vulnerability/vulnerability--c32ee96d-a3bb-4665-b83a-7566dc644fb0.json new file mode 100644 index 00000000000..333a0a4c5b6 --- /dev/null +++ b/objects/vulnerability/vulnerability--c32ee96d-a3bb-4665-b83a-7566dc644fb0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--871d8cfd-8e09-4131-9912-e634f1dc0598", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c32ee96d-a3bb-4665-b83a-7566dc644fb0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.173058Z", + "modified": "2024-09-20T01:41:04.173058Z", + "name": "CVE-2024-45808", + "description": "Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45808" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c84f3024-24a2-4c19-8fcf-74472623591e.json b/objects/vulnerability/vulnerability--c84f3024-24a2-4c19-8fcf-74472623591e.json new file mode 100644 index 00000000000..96e62e0bc1a --- /dev/null +++ b/objects/vulnerability/vulnerability--c84f3024-24a2-4c19-8fcf-74472623591e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b8142b57-5eb0-41de-b5ea-4f451fdfd151", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c84f3024-24a2-4c19-8fcf-74472623591e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.581903Z", + "modified": "2024-09-20T01:41:05.581903Z", + "name": "CVE-2024-38221", + "description": "Microsoft Edge (Chromium-based) Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-38221" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cb492da1-797e-482c-ab9a-0f779943cd95.json b/objects/vulnerability/vulnerability--cb492da1-797e-482c-ab9a-0f779943cd95.json new file mode 100644 index 00000000000..e9c9aa83448 --- /dev/null +++ b/objects/vulnerability/vulnerability--cb492da1-797e-482c-ab9a-0f779943cd95.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fd0fd415-7a61-46ab-8966-1371187cc1fb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cb492da1-797e-482c-ab9a-0f779943cd95", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.272913Z", + "modified": "2024-09-20T01:41:04.272913Z", + "name": "CVE-2024-45807", + "description": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45807" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cf487283-2059-4af6-9911-e84bae17154a.json b/objects/vulnerability/vulnerability--cf487283-2059-4af6-9911-e84bae17154a.json new file mode 100644 index 00000000000..a69cb251e87 --- /dev/null +++ b/objects/vulnerability/vulnerability--cf487283-2059-4af6-9911-e84bae17154a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--444615bf-29b1-4b4c-8bee-da1b1f28dd59", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cf487283-2059-4af6-9911-e84bae17154a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.447752Z", + "modified": "2024-09-20T01:41:04.447752Z", + "name": "CVE-2024-8652", + "description": "A vulnerability in NetCat CMS allows an attacker to execute JavaScript code in a user's browser when they visit specific path on the site.\nThis issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others.\n\nApply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8652" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d3745b7e-15c7-4196-a9bc-d722df94895c.json b/objects/vulnerability/vulnerability--d3745b7e-15c7-4196-a9bc-d722df94895c.json new file mode 100644 index 00000000000..b3bdce398b5 --- /dev/null +++ b/objects/vulnerability/vulnerability--d3745b7e-15c7-4196-a9bc-d722df94895c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a479ed67-1e88-4efe-8456-33ecba97c761", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d3745b7e-15c7-4196-a9bc-d722df94895c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.197984Z", + "modified": "2024-09-20T01:41:05.197984Z", + "name": "CVE-2024-7737", + "description": "A stored Cross-site Scripting (XSS) vulnerability affecting 3DSwym in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-7737" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d408014d-f577-47f5-bf4c-e2910fef4a4d.json b/objects/vulnerability/vulnerability--d408014d-f577-47f5-bf4c-e2910fef4a4d.json new file mode 100644 index 00000000000..1be917b8b76 --- /dev/null +++ b/objects/vulnerability/vulnerability--d408014d-f577-47f5-bf4c-e2910fef4a4d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--02f29436-73a9-4572-82d7-1d57fce8911d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d408014d-f577-47f5-bf4c-e2910fef4a4d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.62375Z", + "modified": "2024-09-20T01:41:05.62375Z", + "name": "CVE-2024-47089", + "description": "This vulnerability exists in the Apex Softcell LD Geo due to improper validation of the transaction token ID in the API endpoint. An authenticated remote attacker could exploit this vulnerability by manipulating the transaction token ID in the API request leading to unauthorized access and modification of transactions belonging to other users.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47089" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a.json b/objects/vulnerability/vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a.json new file mode 100644 index 00000000000..ef584e6733f --- /dev/null +++ b/objects/vulnerability/vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b8400158-ebff-42c7-80df-2c96d2da9f70", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d777a1d4-f787-4d35-8fa5-fc80a5bf929a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:12.443751Z", + "modified": "2024-09-20T01:41:12.443751Z", + "name": "CVE-2023-27584", + "description": "Dragonfly is an open source P2P-based file distribution and image acceleration system. It is hosted by the Cloud Native Computing Foundation (CNCF) as an Incubating Level Project. Dragonfly uses JWT to verify user. However, the secret key for JWT, \"Secret Key\", is hard coded, which leads to authentication bypass. An attacker can perform any action as a user with admin privileges. This issue has been addressed in release version 2.0.9. All users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-27584" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dbf3d045-aa39-439a-9d57-d49e25251330.json b/objects/vulnerability/vulnerability--dbf3d045-aa39-439a-9d57-d49e25251330.json new file mode 100644 index 00000000000..579f906b580 --- /dev/null +++ b/objects/vulnerability/vulnerability--dbf3d045-aa39-439a-9d57-d49e25251330.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0a01b79b-a869-435a-b266-78cae086bbe7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dbf3d045-aa39-439a-9d57-d49e25251330", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.404549Z", + "modified": "2024-09-20T01:41:04.404549Z", + "name": "CVE-2024-8375", + "description": "There exists a use after free vulnerability in Reverb. Reverb supports the VARIANT datatype, which is supposed to represent an arbitrary object in C++. When a tensor proto of type VARIANT is unpacked, memory is first allocated to store the entire tensor, and a ctor is called on each instance. Afterwards, Reverb copies the content in tensor_content to the previously mentioned pre-allocated memory, which results in the bytes in tensor_content overwriting the vtable pointers of all the objects which were previously allocated. Reverb exposes 2 relevant gRPC endpoints: InsertStream and SampleStream. The attacker can insert this stream into the server’s database, then when the client next calls SampleStream they will unpack the tensor into RAM, and when any method on that object is called (including its destructor) the attacker gains control of the Program Counter. We recommend upgrading past git commit  https://github.com/google-deepmind/reverb/commit/6a0dcf4c9e842b7f999912f792aaa6f6bd261a25", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8375" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6.json b/objects/vulnerability/vulnerability--dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6.json new file mode 100644 index 00000000000..4e467b28ef8 --- /dev/null +++ b/objects/vulnerability/vulnerability--dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eda380b0-e70f-433c-b0bf-685acab00135", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dc2e994b-a2e2-4256-a9ac-ffd8b03c9fc6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.187162Z", + "modified": "2024-09-20T01:41:04.187162Z", + "name": "CVE-2024-45810", + "description": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling `sendLocalReply` under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the `sendLocalReply()` in http async client, one reason is http async client is duplicating the status code, another one is the destroy of router is called at the destructor of the async stream, while the stream is deferred deleted at first. There will be problems that the stream decoder is destroyed but its reference is called in `router.onDestroy()`, causing segment fault. This will impact ext_authz if the `upgrade` and `connection` header are allowed, and request mirrorring. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45810" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e22a2a04-c658-4af5-9b17-6ae2fb52ba41.json b/objects/vulnerability/vulnerability--e22a2a04-c658-4af5-9b17-6ae2fb52ba41.json new file mode 100644 index 00000000000..3b4f80da629 --- /dev/null +++ b/objects/vulnerability/vulnerability--e22a2a04-c658-4af5-9b17-6ae2fb52ba41.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b1a4c4ae-d405-4b40-83e4-40481b06ffe2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e22a2a04-c658-4af5-9b17-6ae2fb52ba41", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:05.625793Z", + "modified": "2024-09-20T01:41:05.625793Z", + "name": "CVE-2024-47060", + "description": "Zitadel is an open source identity management platform. In Zitadel, even after an organization is deactivated, associated projects, respectively their applications remain active. Users across other organizations can still log in and access through these applications, leading to unauthorized access. Additionally, if a project was deactivated access to applications was also still possible. The issue stems from the fact that when an organization is deactivated in Zitadel, the applications associated with it do not automatically deactivate. The application lifecycle is not tightly coupled with the organization's lifecycle, leading to a situation where the organization or project is marked as inactive, but its resources remain accessible. This vulnerability allows for unauthorized access to projects and their resources, which should have been restricted post-organization deactivation. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly disable the application to make sure the client is not allowed anymore.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47060" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e7d120eb-a174-4a33-9c77-bb44ccebd8d7.json b/objects/vulnerability/vulnerability--e7d120eb-a174-4a33-9c77-bb44ccebd8d7.json new file mode 100644 index 00000000000..7b4228f8592 --- /dev/null +++ b/objects/vulnerability/vulnerability--e7d120eb-a174-4a33-9c77-bb44ccebd8d7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ceecafd4-8913-47e3-a49d-b6a90d0e52d8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e7d120eb-a174-4a33-9c77-bb44ccebd8d7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.543257Z", + "modified": "2024-09-20T01:41:04.543257Z", + "name": "CVE-2024-46983", + "description": "sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46983" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc.json b/objects/vulnerability/vulnerability--e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc.json new file mode 100644 index 00000000000..fd6da2078df --- /dev/null +++ b/objects/vulnerability/vulnerability--e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6f7e3401-4707-486a-9b5c-2c435ad96228", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e99ff7e7-6fee-4b68-bd73-3ee5bba81cfc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.271528Z", + "modified": "2024-09-20T01:41:04.271528Z", + "name": "CVE-2024-45410", + "description": "Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers such as X-Forwarded-Host or X-Forwarded-Port are added by Traefik before the request is routed to the application. For a HTTP client, it should not be possible to remove or modify these headers. Since the application trusts the value of these headers, security implications might arise, if they can be modified. For HTTP/1.1, however, it was found that some of theses custom headers can indeed be removed and in certain cases manipulated. The attack relies on the HTTP/1.1 behavior, that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been addressed in release versions 2.11.9 and 3.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45410" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ec3a44b5-2268-4cac-9158-c38bfabfcc47.json b/objects/vulnerability/vulnerability--ec3a44b5-2268-4cac-9158-c38bfabfcc47.json new file mode 100644 index 00000000000..466c0879506 --- /dev/null +++ b/objects/vulnerability/vulnerability--ec3a44b5-2268-4cac-9158-c38bfabfcc47.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d13ec4c1-4b13-4bed-ab54-0665e2c0e794", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec3a44b5-2268-4cac-9158-c38bfabfcc47", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:03.826103Z", + "modified": "2024-09-20T01:41:03.826103Z", + "name": "CVE-2024-43489", + "description": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43489" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--edd9aced-a00b-4ace-8e71-35158123d861.json b/objects/vulnerability/vulnerability--edd9aced-a00b-4ace-8e71-35158123d861.json new file mode 100644 index 00000000000..4a36c711b39 --- /dev/null +++ b/objects/vulnerability/vulnerability--edd9aced-a00b-4ace-8e71-35158123d861.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ab96b423-44b7-4325-876c-efe00d1c9739", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--edd9aced-a00b-4ace-8e71-35158123d861", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.917237Z", + "modified": "2024-09-20T01:41:04.917237Z", + "name": "CVE-2024-25673", + "description": "Couchbase Server 7.6.x before 7.6.2, 7.2.x before 7.2.6, and all earlier versions allows HTTP Host header injection.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-25673" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f25dddab-41c7-4a4c-98e7-3ba97f791849.json b/objects/vulnerability/vulnerability--f25dddab-41c7-4a4c-98e7-3ba97f791849.json new file mode 100644 index 00000000000..6622931c3f8 --- /dev/null +++ b/objects/vulnerability/vulnerability--f25dddab-41c7-4a4c-98e7-3ba97f791849.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--df7917a3-f583-4a3c-9830-f53adc7b08c0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f25dddab-41c7-4a4c-98e7-3ba97f791849", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.244319Z", + "modified": "2024-09-20T01:41:04.244319Z", + "name": "CVE-2024-45809", + "description": "Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy crash when clear route cache with remote JWKs. In the following case: 1. remote JWKs are used, which requires async header processing; 2. clear_route_cache is enabled on the provider; 3. header operations are enabled in JWT filter, e.g. header to claims feature; 4. the routing table is configured in a way that the JWT header operations modify requests to not match any route. When these conditions are met, a crash is triggered in the upstream code due to nullptr reference conversion from route(). The root cause is the ordering of continueDecoding and clearRouteCache. This issue has been addressed in versions 1.31.2, 1.30.6, and 1.29.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45809" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f71fe5ef-f3ec-4f22-8087-559f8266eeeb.json b/objects/vulnerability/vulnerability--f71fe5ef-f3ec-4f22-8087-559f8266eeeb.json new file mode 100644 index 00000000000..041ccf61556 --- /dev/null +++ b/objects/vulnerability/vulnerability--f71fe5ef-f3ec-4f22-8087-559f8266eeeb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--cef51ff6-1c9f-4547-9202-1557a973b446", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f71fe5ef-f3ec-4f22-8087-559f8266eeeb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.385749Z", + "modified": "2024-09-20T01:41:04.385749Z", + "name": "CVE-2024-9009", + "description": "A vulnerability, which was classified as critical, has been found in code-projects Online Quiz Site 1.0. This issue affects some unknown processing of the file showtest.php. The manipulation of the argument subid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9009" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fcd94263-4f04-4268-9beb-c663aa28f85a.json b/objects/vulnerability/vulnerability--fcd94263-4f04-4268-9beb-c663aa28f85a.json new file mode 100644 index 00000000000..854ced1e9e8 --- /dev/null +++ b/objects/vulnerability/vulnerability--fcd94263-4f04-4268-9beb-c663aa28f85a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7ddddfc4-17f9-4029-9945-f4ef876a0869", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fcd94263-4f04-4268-9beb-c663aa28f85a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.38785Z", + "modified": "2024-09-20T01:41:04.38785Z", + "name": "CVE-2024-9008", + "description": "A vulnerability classified as critical was found in SourceCodester Best Online News Portal 1.0. This vulnerability affects unknown code of the file /news-details.php of the component Comment Section. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9008" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fd07ffff-d1ef-401d-b032-0ee9b4ab3eda.json b/objects/vulnerability/vulnerability--fd07ffff-d1ef-401d-b032-0ee9b4ab3eda.json new file mode 100644 index 00000000000..074a53f81e5 --- /dev/null +++ b/objects/vulnerability/vulnerability--fd07ffff-d1ef-401d-b032-0ee9b4ab3eda.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d9a4d080-2bf2-4e74-a15f-04d4d6697acd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fd07ffff-d1ef-401d-b032-0ee9b4ab3eda", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-09-20T01:41:04.532071Z", + "modified": "2024-09-20T01:41:04.532071Z", + "name": "CVE-2024-46984", + "description": "The reference validator is a tool to perform advanced validation of FHIR resources for TI applications and interoperability standards. The profile location routine in the referencevalidator commons package is vulnerable to `XML External Entities` attack due to insecure defaults of the used Woodstox WstxInputFactory. A malicious XML resource can lead to network requests issued by referencevalidator and thus to a `Server Side Request Forgery` attack. The vulnerability impacts applications which use referencevalidator to process XML resources from untrusted sources. The problem has been patched with the 2.5.1 version of the referencevalidator. Users are strongly recommended to update to this version or a more recent one. A pre-processing or manual analysis of input XML resources on existence of DTD definitions or external entities can mitigate the problem.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46984" + } + ] + } + ] +} \ No newline at end of file