Skip to content

Commit

Permalink
generated content from 2024-11-01
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Nov 1, 2024
1 parent 127c655 commit 29288ac
Show file tree
Hide file tree
Showing 10 changed files with 207 additions and 0 deletions.
9 changes: 9 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -254357,3 +254357,12 @@ vulnerability,CVE-2024-43120,vulnerability--f162dfc3-5c75-424a-b203-0f6e86514206
vulnerability,CVE-2024-43296,vulnerability--4149be0c-4922-4ba0-9b1b-2cd89dfcc798
vulnerability,CVE-2024-43981,vulnerability--d85331e7-5d44-48cd-81bc-ce4a1c685877
vulnerability,CVE-2024-43968,vulnerability--f771caad-4972-4a76-981e-447c753b8c62
vulnerability,CVE-2024-51377,vulnerability--5bbf629d-9fcd-40e6-af24-5d0102adcca6
vulnerability,CVE-2024-51399,vulnerability--6d1a5c31-ed61-4984-9468-5936589c18b4
vulnerability,CVE-2024-51398,vulnerability--149d1210-8164-496b-ae1d-e5963568db7e
vulnerability,CVE-2024-10658,vulnerability--4298b9af-57c0-43ea-a68f-5e49cde6ef6c
vulnerability,CVE-2024-10659,vulnerability--9d002ced-84a0-42d1-ad10-415adfd82fdf
vulnerability,CVE-2024-10660,vulnerability--380146b7-ca3c-4beb-9625-5a328a7daf25
vulnerability,CVE-2024-22733,vulnerability--5995b854-c739-491a-b027-bbd7472782ba
vulnerability,CVE-2024-40490,vulnerability--0a252e46-82a0-4b74-88f1-d01c1c8a9602
vulnerability,CVE-2024-28265,vulnerability--b7765438-7cf9-4c9c-a78e-d5e9720dcb30
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--14f7c6b2-83f7-436c-8054-d7fc760a1daa",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a252e46-82a0-4b74-88f1-d01c1c8a9602",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:54.565537Z",
"modified": "2024-11-01T16:23:54.565537Z",
"name": "CVE-2024-40490",
"description": "An issue in Sourcebans++ before v.1.8.0 allows a remote attacker to obtain sensitive information via a crafted XAJAX call to the Forgot Password function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40490"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2a300e19-6aed-49bf-a3fc-fe7ec0494e70",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--149d1210-8164-496b-ae1d-e5963568db7e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:53.517428Z",
"modified": "2024-11-01T16:23:53.517428Z",
"name": "CVE-2024-51398",
"description": "Altai Technologies Ltd Altai X500 Indoor 22 802.11ac Wave 2 AP web Management Weak password leakage in the background may lead to unauthorized access, data theft, and network attacks, seriously threatening network security.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51398"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ab07f09f-09bf-4870-8a0c-5dacacd1a982",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--380146b7-ca3c-4beb-9625-5a328a7daf25",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:53.743487Z",
"modified": "2024-11-01T16:23:53.743487Z",
"name": "CVE-2024-10660",
"description": "A vulnerability, which was classified as critical, was found in ESAFENET CDG 5. This affects the function deleteHook of the file /com/esafenet/servlet/policy/HookService.java. The manipulation of the argument hookId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10660"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7875cf9a-d86c-47d0-989c-c7c7d58849af",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4298b9af-57c0-43ea-a68f-5e49cde6ef6c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:53.721729Z",
"modified": "2024-11-01T16:23:53.721729Z",
"name": "CVE-2024-10658",
"description": "A vulnerability classified as critical was found in Tongda OA up to 11.10. Affected by this vulnerability is an unknown functionality of the file /pda/approve_center/check_seal.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10658"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a2268e96-0bf1-4092-8699-445935900e12",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5995b854-c739-491a-b027-bbd7472782ba",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:54.472264Z",
"modified": "2024-11-01T16:23:54.472264Z",
"name": "CVE-2024-22733",
"description": "TP Link MR200 V4 Firmware version 210201 was discovered to contain a null-pointer-dereference in the web administration panel on /cgi/login via the sign, Action or LoginStatus query parameters which could lead to a denial of service by a local or remote unauthenticated attacker.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22733"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aaeca50b-5c60-4e13-8ac0-d1351f6a744d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5bbf629d-9fcd-40e6-af24-5d0102adcca6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:53.477963Z",
"modified": "2024-11-01T16:23:53.477963Z",
"name": "CVE-2024-51377",
"description": "An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51377"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--07100cdc-98d1-4698-92f1-635d9cdac05e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--6d1a5c31-ed61-4984-9468-5936589c18b4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:53.505358Z",
"modified": "2024-11-01T16:23:53.505358Z",
"name": "CVE-2024-51399",
"description": "Altai Technologies Ltd Altai IX500 Indoor 22 802.11ac Wave 2 AP After login, there are file reads in the background, and attackers can obtain sensitive information such as user credentials, system configuration, and database connection strings, which can lead to data breaches and identity theft.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51399"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6611427c-26c2-4f4f-a891-27c890aabf4a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9d002ced-84a0-42d1-ad10-415adfd82fdf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:53.734408Z",
"modified": "2024-11-01T16:23:53.734408Z",
"name": "CVE-2024-10659",
"description": "A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5. Affected by this issue is the function delSystemEncryptPolicy of the file /com/esafenet/servlet/document/CDGAuthoriseTempletService.java. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10659"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--90951be8-bc2a-4eb6-a20d-b1e4bbdda1d9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b7765438-7cf9-4c9c-a78e-d5e9720dcb30",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-01T16:23:55.434998Z",
"modified": "2024-11-01T16:23:55.434998Z",
"name": "CVE-2024-28265",
"description": "IBOS v4.5.5 has an arbitrary file deletion vulnerability via \\system\\modules\\dashboard\\controllers\\LoginController.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-28265"
}
]
}
]
}

0 comments on commit 29288ac

Please sign in to comment.