Skip to content

Commit

Permalink
generated content from 2024-10-09
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 9, 2024
1 parent 913dac9 commit fad3532
Show file tree
Hide file tree
Showing 235 changed files with 5,382 additions and 0 deletions.
234 changes: 234 additions & 0 deletions mapping.csv

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13914114-b045-4ddb-83a0-3d297bb1e0b6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--008d60ea-624e-4c9c-9f1d-ba3c84a8357b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:54.88866Z",
"modified": "2024-10-09T00:35:54.88866Z",
"name": "CVE-2024-43615",
"description": "Microsoft OpenSSH for Windows Remote Code Execution Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43615"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3be5dede-ddde-4380-9c32-4bc6f5696d25",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02fff075-cf5b-4462-9351-b6ab3397d21c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.467851Z",
"modified": "2024-10-09T00:35:55.467851Z",
"name": "CVE-2024-9380",
"description": "An OS command injection vulnerability in the admin web console of Ivanti CSA before version 5.0.2 allows a remote authenticated attacker with admin privileges to obtain remote code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9380"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aab6dc96-3def-466b-a19a-673ad27c85b4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03032a2c-d755-4cc5-9065-093845d6823f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.294031Z",
"modified": "2024-10-09T00:35:55.294031Z",
"name": "CVE-2024-45230",
"description": "An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45230"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7f3b3a81-63a8-48a9-9c5b-6a1c9fc07213",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0375b585-17b3-482c-b2b2-d3d626c03f01",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:54.846396Z",
"modified": "2024-10-09T00:35:54.846396Z",
"name": "CVE-2024-43570",
"description": "Windows Kernel Elevation of Privilege Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43570"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7f900ff0-5e50-4875-9cf0-c8c472a93185",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06c80e23-e29e-4af8-a32f-c56b88e54f02",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:54.808417Z",
"modified": "2024-10-09T00:35:54.808417Z",
"name": "CVE-2024-43601",
"description": "Visual Studio Code for Linux Remote Code Execution Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43601"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e589ec49-9cee-4f8a-9d80-1bba6757e275",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0767813b-01fd-4f77-808e-00aa24c2a7e0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.836525Z",
"modified": "2024-10-09T00:35:55.836525Z",
"name": "CVE-2024-34666",
"description": "Out-of-bounds write in parsing h.264 format in a specific mode in librtppayload.so prior to SMR Oct-2024 Release 1 allows remote attackers to execute arbitrary code with system privilege. User interaction is required for triggering this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-34666"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dedaf506-4319-43b6-99f0-42f0be4b1482",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0773f920-f5d4-4f71-a08a-c6540b30e822",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:54.843881Z",
"modified": "2024-10-09T00:35:54.843881Z",
"name": "CVE-2024-43551",
"description": "Windows Storage Elevation of Privilege Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43551"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1819404b-6142-48dd-84c3-c9b63f850b0e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08567c3d-431e-4f0b-bd57-8ea23d2b78bf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:54.891127Z",
"modified": "2024-10-09T00:35:54.891127Z",
"name": "CVE-2024-43502",
"description": "Windows Kernel Elevation of Privilege Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43502"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1c36194e-1fdb-4bfb-8a7b-afcd49788c67",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08d0c86a-3ade-46f6-8d36-3d3c53d90b9d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.562828Z",
"modified": "2024-10-09T00:35:55.562828Z",
"name": "CVE-2024-8215",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Payara Platform Payara Server (Admin Console modules) allows Remote Code Inclusion.This issue affects Payara Server: from 5.20.0 before 5.68.0, from 6.0.0 before 6.19.0, from 6.2022.1 before 6.2024.10, from 4.1.2.191.1 before 4.1.2.191.51.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8215"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--70f588a6-1b53-44b0-9e4a-b0fe81b5617f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08f5adef-ab5d-4967-9cdb-c4a57e1edc74",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.487481Z",
"modified": "2024-10-09T00:35:55.487481Z",
"name": "CVE-2024-9021",
"description": "In the process of testing the Relevanssi WordPress plugin before 4.23.1, a vulnerability was found that allows you to implement Stored XSS on behalf of the Contributor+ by embedding malicious script, which entails account takeover backdoor",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9021"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4c2bc67b-b3d9-4b19-9696-f980aea03d8c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09703df6-a090-49e8-bdb0-42d90b272759",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.544406Z",
"modified": "2024-10-09T00:35:55.544406Z",
"name": "CVE-2024-8629",
"description": "The WooCommerce Multilingual & Multicurrency with WPML plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.3.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8629"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bfec8bbe-ccca-4654-98b9-2c2228d22f8a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0abcaf1c-16b6-43d1-a887-df2d8c83611b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:56.794864Z",
"modified": "2024-10-09T00:35:56.794864Z",
"name": "CVE-2024-38029",
"description": "Microsoft OpenSSH for Windows Remote Code Execution Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38029"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1ab794fb-21fa-40ef-8f07-896b9987f676",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b2b7afe-3afe-4bb3-ba6e-099a97a29b73",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:54.896094Z",
"modified": "2024-10-09T00:35:54.896094Z",
"name": "CVE-2024-43542",
"description": "Windows Mobile Broadband Driver Denial of Service Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43542"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4c1c9fa9-afab-4695-beee-d48024c6ee03",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b9fc7bc-cd64-4894-b0df-f26d87d82af4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.332046Z",
"modified": "2024-10-09T00:35:55.332046Z",
"name": "CVE-2024-45463",
"description": "A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45463"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--72695fc8-2e6d-4dac-a3c1-2abf17098778",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0bbe2af1-7f33-46cb-9be2-8871a8a5e359",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:56.754402Z",
"modified": "2024-10-09T00:35:56.754402Z",
"name": "CVE-2024-38262",
"description": "Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38262"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a3e71562-57f4-40ea-ae86-bdb806f80143",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d653de5-4ace-4550-ba18-bf3cb3da52a6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-10-09T00:35:55.491422Z",
"modified": "2024-10-09T00:35:55.491422Z",
"name": "CVE-2024-9124",
"description": "A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 600T. If the device is overloaded with requests, it will become unavailable. The device may require a power cycle to recover it if it does not re-establish a connection after it stops receiving requests.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9124"
}
]
}
]
}
Loading

0 comments on commit fad3532

Please sign in to comment.