Skip to content

Commit

Permalink
generated content from 2024-12-06
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 6, 2024
1 parent cfe9ff2 commit 01fecec
Show file tree
Hide file tree
Showing 111 changed files with 2,530 additions and 0 deletions.
110 changes: 110 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -258655,3 +258655,113 @@ vulnerability,CVE-2018-9463,vulnerability--6409adc3-3ac1-4467-96cb-52c4cb29372a
vulnerability,CVE-2018-9407,vulnerability--1daf3ef2-baf3-4702-8662-0efb8be5c9df
vulnerability,CVE-2018-9399,vulnerability--e665aecb-485b-4482-a5ec-849607ce45f6
vulnerability,CVE-2018-9397,vulnerability--c8d82e21-f52d-4eb6-8c9e-c10aea900c0d
vulnerability,CVE-2017-13308,vulnerability--a9b66fb9-f14f-4a5f-bf30-494f29ba7443
vulnerability,CVE-2024-51548,vulnerability--847bf43e-e28c-48a2-babc-c5bc4bd593f1
vulnerability,CVE-2024-51546,vulnerability--745924a7-59e4-4410-b07a-ab940dccc2e8
vulnerability,CVE-2024-51551,vulnerability--87f3030c-c182-4291-ac52-8eaf2b49ab62
vulnerability,CVE-2024-51550,vulnerability--d41dc199-5824-4dd8-831a-12c8038b7353
vulnerability,CVE-2024-51544,vulnerability--603a107a-20e4-4986-a120-3d8f57cd4e76
vulnerability,CVE-2024-51542,vulnerability--51c3f36b-0a90-47ee-b094-6a31c20c9db6
vulnerability,CVE-2024-51549,vulnerability--dc021edf-ee5b-4525-8b01-bd0ea4b3423b
vulnerability,CVE-2024-51545,vulnerability--1e424be4-6019-42fc-ba82-1f84e5971f08
vulnerability,CVE-2024-51541,vulnerability--72d05c9f-eac6-4543-a15f-5c2d16496893
vulnerability,CVE-2024-51543,vulnerability--68d4b37b-5167-4344-a103-30ac38cc1d50
vulnerability,CVE-2024-51555,vulnerability--dc731b5c-3738-4151-ada2-bc45326a7ebd
vulnerability,CVE-2024-51554,vulnerability--10d8e86c-1acf-4c29-b0bf-15c5282f1c20
vulnerability,CVE-2024-48844,vulnerability--fa1938a6-3e95-4dcd-8c33-db2a77776515
vulnerability,CVE-2024-48847,vulnerability--2638e9c0-f164-4c1d-8685-92f376b9c2f1
vulnerability,CVE-2024-48846,vulnerability--212b4b1b-e4aa-4803-bfe9-c6894876c184
vulnerability,CVE-2024-48839,vulnerability--edf77bb9-ae1b-413b-9470-02de3f346e21
vulnerability,CVE-2024-48845,vulnerability--2280694c-197a-4f62-a932-594355278f1a
vulnerability,CVE-2024-48840,vulnerability--cdf32a6d-5e55-47f8-813d-e3ea43502c4f
vulnerability,CVE-2024-48843,vulnerability--48691b0e-e90f-433e-a5e1-b4f0fa565fb4
vulnerability,CVE-2024-30962,vulnerability--e6b53ad7-dab5-4dc1-8c81-53145c4812d3
vulnerability,CVE-2024-30964,vulnerability--5e639331-1a48-4ae2-9372-00cbe9103cc8
vulnerability,CVE-2024-30963,vulnerability--d8fd5996-0079-48df-b4a8-b2a53ba0c308
vulnerability,CVE-2024-30961,vulnerability--b4119dcf-75be-483e-a5e6-a074f0dd935f
vulnerability,CVE-2024-52271,vulnerability--d087d6b0-b0ab-4010-bb29-b7a4165760cc
vulnerability,CVE-2024-52798,vulnerability--a8edf695-929a-48f1-ad37-dc2d2d2580ef
vulnerability,CVE-2024-52564,vulnerability--29e7f821-2097-4b3e-804e-a3127be1885e
vulnerability,CVE-2024-52270,vulnerability--dd3f4a31-a7c9-46de-bf4e-c063ac2735d3
vulnerability,CVE-2024-45319,vulnerability--4cbb36e0-f122-4caf-80f2-d30dbd13c587
vulnerability,CVE-2024-45841,vulnerability--fad34aeb-60e5-4562-8e1a-8f2b2f71ed88
vulnerability,CVE-2024-45318,vulnerability--7fdc6856-593c-4579-8010-1e102e8cb0b9
vulnerability,CVE-2024-12094,vulnerability--32ddae2d-c099-404e-a3f4-39de3d0866f4
vulnerability,CVE-2024-12231,vulnerability--f3149092-5620-4362-bfcd-2c03f86d139c
vulnerability,CVE-2024-12233,vulnerability--d8056687-5605-4657-8431-07535e269dba
vulnerability,CVE-2024-12227,vulnerability--a50773ca-cb27-4eff-a8de-d63d449c65ff
vulnerability,CVE-2024-12188,vulnerability--832997b0-ec75-4e1b-a47f-a78eb049936b
vulnerability,CVE-2024-12247,vulnerability--83294e52-218c-4c24-9720-ffa0b35bdd46
vulnerability,CVE-2024-12130,vulnerability--9a163338-4c6f-4b79-85dc-fab559ce2032
vulnerability,CVE-2024-12228,vulnerability--894f1755-16a4-476f-affd-b78676c14486
vulnerability,CVE-2024-12232,vulnerability--5c15c538-608b-48b4-b251-63864ad78f65
vulnerability,CVE-2024-12235,vulnerability--06877660-8a25-4669-87bb-5d6cfcc3269c
vulnerability,CVE-2024-12229,vulnerability--84d5722c-a782-49b9-8ac3-31a777b39ab4
vulnerability,CVE-2024-12234,vulnerability--5950f04f-90e3-41d1-8ec6-5e9833c1d978
vulnerability,CVE-2024-12230,vulnerability--94915236-cbf9-4755-ae59-9d47a3c52327
vulnerability,CVE-2024-12187,vulnerability--b30c3731-ad97-413c-a2f9-75caca329679
vulnerability,CVE-2024-10848,vulnerability--55f40e86-75c6-4789-abf2-c04a3d0afe2c
vulnerability,CVE-2024-10777,vulnerability--2f2d3346-3468-4b72-aa4c-66f11a140e5e
vulnerability,CVE-2024-10933,vulnerability--5c913777-77b7-4587-b9f0-38f7fc4a5e70
vulnerability,CVE-2024-10178,vulnerability--178b7315-23d2-4fbf-8d04-951fb1564222
vulnerability,CVE-2024-10716,vulnerability--4378d1c5-7c46-4ff2-9864-7171e612dba1
vulnerability,CVE-2024-10937,vulnerability--2d2b4582-d09b-42c4-9fda-01189177f965
vulnerability,CVE-2024-10056,vulnerability--6f930dae-73ca-4492-b7de-0dc30991eefb
vulnerability,CVE-2024-10881,vulnerability--4b166e10-eca9-496e-8f9f-b95e73c2d69b
vulnerability,CVE-2024-47133,vulnerability--dfb0e798-270b-48f0-8b65-db2644289448
vulnerability,CVE-2024-11156,vulnerability--aeacee93-ad33-41af-8428-7a26f11f48d9
vulnerability,CVE-2024-11317,vulnerability--a693712e-39f1-4d30-a066-bcf1ad5dae85
vulnerability,CVE-2024-11420,vulnerability--4fdddbf4-77b6-4b2b-a69a-e6e78eb2346d
vulnerability,CVE-2024-11324,vulnerability--d28b1fed-9d9f-4aed-b372-5c6adf60423d
vulnerability,CVE-2024-11941,vulnerability--a87fbb05-7369-461d-b527-397703f54f46
vulnerability,CVE-2024-11779,vulnerability--e4b59dfa-5acd-4e04-8760-21e58f31ca2a
vulnerability,CVE-2024-11429,vulnerability--124bf6a3-34f7-4a09-8830-a35392a918eb
vulnerability,CVE-2024-11316,vulnerability--cc41f980-afa7-49a9-aa1b-6065a1477b1e
vulnerability,CVE-2024-11942,vulnerability--75c1f527-95ec-4182-88ea-3c407fd6d938
vulnerability,CVE-2024-11158,vulnerability--be5a8136-cd92-487e-9cda-86244f6ecca3
vulnerability,CVE-2024-11341,vulnerability--65bca08e-6c5a-442b-b393-6e5f6f2f046f
vulnerability,CVE-2024-11148,vulnerability--2aa1d73a-768d-41ff-b507-4e2018346867
vulnerability,CVE-2024-11155,vulnerability--83f484ab-d200-47a0-a0aa-2faa3bbde08e
vulnerability,CVE-2024-53702,vulnerability--3e92b383-6129-45fd-82ea-cf68fcf518d1
vulnerability,CVE-2024-53857,vulnerability--d3653c0f-2761-4343-a5dd-72a08ba192b3
vulnerability,CVE-2024-53589,vulnerability--89c6ea51-ebcf-4224-b799-21bd161b3cca
vulnerability,CVE-2024-53472,vulnerability--094090e2-d3a8-4530-9101-30fe31c74d23
vulnerability,CVE-2024-53442,vulnerability--aca197e7-c427-433b-bd05-8b5226cf152c
vulnerability,CVE-2024-53470,vulnerability--95d2c322-2f2d-40ff-b311-d301b7610849
vulnerability,CVE-2024-53490,vulnerability--b1856784-75dc-414d-8378-6f1f087842de
vulnerability,CVE-2024-53703,vulnerability--72135cb5-a575-4bf7-926e-9995c47d426b
vulnerability,CVE-2024-53846,vulnerability--30313156-3cf4-40a3-a735-a2245b96b107
vulnerability,CVE-2024-53856,vulnerability--0466eba7-3b66-4bee-bc69-2df6f4d99086
vulnerability,CVE-2024-53523,vulnerability--bb0717c9-ea58-4b47-8b55-a17c078b299f
vulnerability,CVE-2024-53457,vulnerability--5bd49d37-a9b0-40bd-9936-aec5a2333f4f
vulnerability,CVE-2024-53471,vulnerability--970a20ac-f45f-4441-821c-9319979591ab
vulnerability,CVE-2024-38920,vulnerability--4479892c-a615-45f4-a02c-c7559e1fb942
vulnerability,CVE-2024-38910,vulnerability--434e449f-5b84-4c4c-bb9b-b5c088dd0b6a
vulnerability,CVE-2024-40763,vulnerability--ad01111f-b0f3-4702-92eb-a12cbb56c209
vulnerability,CVE-2024-41579,vulnerability--5e577465-e971-4376-89a2-2453d5acf53a
vulnerability,CVE-2024-37861,vulnerability--61fe092c-eea9-4a5a-a12f-ad1a1d16f92c
vulnerability,CVE-2024-37863,vulnerability--b55d32bc-11a1-4096-a834-b9fc686b0570
vulnerability,CVE-2024-37860,vulnerability--4863b784-5d93-4d8a-89a6-49fd915ea329
vulnerability,CVE-2024-37862,vulnerability--f18be146-9cd1-4437-a9cf-851ae9c6c809
vulnerability,CVE-2024-54001,vulnerability--d069ef4f-97be-41a4-b3fd-bec0a93ad8ea
vulnerability,CVE-2024-54679,vulnerability--e698a9d0-fa49-416a-8f99-9099731c2739
vulnerability,CVE-2024-54130,vulnerability--bb417867-8325-41c2-a735-f75698c98d96
vulnerability,CVE-2024-54140,vulnerability--016961b7-624b-41db-a4d5-b51c0ceb58da
vulnerability,CVE-2024-54126,vulnerability--f3854c79-fc76-4f31-a4c8-47d02360cbe4
vulnerability,CVE-2024-54014,vulnerability--d2a457f7-235e-44ba-8871-eb0f0cb75467
vulnerability,CVE-2024-54127,vulnerability--c43c62ca-41e6-4179-b66f-253b4bdefae2
vulnerability,CVE-2024-54129,vulnerability--c1e7fa01-a2f3-4994-8d06-8a9c054c8baf
vulnerability,CVE-2024-54128,vulnerability--adb09a25-b888-4148-a152-5c42d159dfd8
vulnerability,CVE-2024-42195,vulnerability--e00caac3-5cc8-4a0f-8c19-a63177a49367
vulnerability,CVE-2024-6515,vulnerability--6033db10-00c5-4315-be7e-685e58dd0687
vulnerability,CVE-2024-6219,vulnerability--8bfa6b2b-993c-449c-a94f-cafe9cf3e801
vulnerability,CVE-2024-6516,vulnerability--defa3b72-a5ef-4193-a3d2-b4d32435cf07
vulnerability,CVE-2024-6156,vulnerability--0fe394ba-80e4-4f73-8fe8-26d8cb98edb3
vulnerability,CVE-2024-6784,vulnerability--41d10591-b07a-46ff-b6df-7037c88e2437
vulnerability,CVE-2022-41137,vulnerability--96f033ca-7ae2-4fbc-a277-34498d71e369
vulnerability,CVE-2023-48010,vulnerability--ccf24351-972a-4cd6-81bd-881ff742827d
vulnerability,CVE-2023-50913,vulnerability--1287570b-26f1-437c-aad4-23bf274b3e14
vulnerability,CVE-2018-9386,vulnerability--a4311261-8254-4519-a310-22c5c3cf938c
vulnerability,CVE-2018-9390,vulnerability--32c26710-5597-4f20-8f6f-26ac2cd29259
vulnerability,CVE-2018-9388,vulnerability--f207abfa-6284-4309-8d83-5d6d7996d8ee
vulnerability,CVE-2018-9391,vulnerability--785b761b-8b1a-48c5-8e32-7d343b782f85
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--589bded2-d4e6-4b44-9a30-6cd059dfb1c0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--016961b7-624b-41db-a4d5-b51c0ceb58da",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:11.356566Z",
"modified": "2024-12-06T00:40:11.356566Z",
"name": "CVE-2024-54140",
"description": "sigstore-java is a sigstore java client for interacting with sigstore infrastructure. sigstore-java has insufficient verification for a situation where a bundle provides a invalid signature for a checkpoint. This bug impacts clients using any variation of KeylessVerifier.verify(). Currently checkpoints are only used to ensure the root hash of an inclusion proof was provided by the log in question. Failing to validate that means a bundle may provide an inclusion proof that doesn't actually correspond to the log in question. This may eventually lead a monitor/witness being unable to detect when a compromised logs are providing different views of themselves to different clients. There are other mechanisms right now that mitigate this, such as the signed entry timestamp. Sigstore-java currently requires a valid signed entry timestamp. By correctly verifying the signed entry timestamp we can make certain assertions about the log signing the log entry (like the log was aware of the artifact signing event and signed it). Therefore the impact on clients that are not monitors/witnesses is very low. This vulnerability is fixed in 1.2.0.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54140"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9e30ca36-258d-4722-970a-dad399070ca4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0466eba7-3b66-4bee-bc69-2df6f4d99086",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:10.73969Z",
"modified": "2024-12-06T00:40:10.73969Z",
"name": "CVE-2024-53856",
"description": "rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows an attacker to trigger rpgp crashes by providing crafted data. This vulnerability is fixed in 0.14.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53856"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1b7e5e24-e54c-4bb2-bab7-e76c212c714f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06877660-8a25-4669-87bb-5d6cfcc3269c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:09.953392Z",
"modified": "2024-12-06T00:40:09.953392Z",
"name": "CVE-2024-12235",
"description": "A vulnerability was found in Shenzhen Dashi Tongzhou Information Technology AgileBPM up to 1.0.0. It has been declared as critical. Affected by this vulnerability is the function doFilter of the file \\agile-bpm-basic-master\\ab-auth\\ab-auth-spring-security-oauth2\\src\\main\\java\\com\\dstz\\auth\\filter\\AuthorizationTokenCheckFilter.java. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12235"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3804c73c-2f25-4b0c-b82f-db582775fab3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--094090e2-d3a8-4530-9101-30fe31c74d23",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:10.723245Z",
"modified": "2024-12-06T00:40:10.723245Z",
"name": "CVE-2024-53472",
"description": "WeGIA v3.2.0 was discovered to contain a Cross-Site Request Forgery (CSRF).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53472"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d5ce5b5c-c5b9-48ca-a413-9335751fe11c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0fe394ba-80e4-4f73-8fe8-26d8cb98edb3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:12.350682Z",
"modified": "2024-12-06T00:40:12.350682Z",
"name": "CVE-2024-6156",
"description": "Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-6156"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a313a7f7-480f-468f-a446-d324af46d78b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10d8e86c-1acf-4c29-b0bf-15c5282f1c20",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:09.680608Z",
"modified": "2024-12-06T00:40:09.680608Z",
"name": "CVE-2024-51554",
"description": "Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials. \nAffected products:\n\n\nABB ASPECT - Enterprise v3.08.02; \nNEXUS Series v3.08.02; \nMATRIX Series v3.08.02",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51554"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--598e6509-015a-4e11-a176-623a5927e7a2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--124bf6a3-34f7-4a09-8830-a35392a918eb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:10.448094Z",
"modified": "2024-12-06T00:40:10.448094Z",
"name": "CVE-2024-11429",
"description": "The Free Responsive Testimonials, Social Proof Reviews, and Customer Reviews – Stars Testimonials plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.3 via the 'stars-testimonials-with-slider-and-masonry-grid' shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11429"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--daa0340c-84d1-4478-864a-50293803dba5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1287570b-26f1-437c-aad4-23bf274b3e14",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:19.854157Z",
"modified": "2024-12-06T00:40:19.854157Z",
"name": "CVE-2023-50913",
"description": "Oxide control plane software before 5 allows SSRF.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-50913"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3eb83efd-8b71-4764-8abc-6408594a97da",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--178b7315-23d2-4fbf-8d04-951fb1564222",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-06T00:40:09.977785Z",
"modified": "2024-12-06T00:40:09.977785Z",
"name": "CVE-2024-10178",
"description": "The Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10178"
}
]
}
]
}
Loading

0 comments on commit 01fecec

Please sign in to comment.