Skip to content

Commit

Permalink
generated content from 2024-11-07
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Nov 7, 2024
1 parent 1de9904 commit bc8b4ba
Show file tree
Hide file tree
Showing 9 changed files with 184 additions and 0 deletions.
8 changes: 8 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -255000,3 +255000,11 @@ vulnerability,CVE-2024-43431,vulnerability--482dfac0-4f4f-4958-a25d-98abf6c04f69
vulnerability,CVE-2024-10668,vulnerability--68d7433a-b5b4-447e-89db-a58c59d39ea5
vulnerability,CVE-2024-9926,vulnerability--f17bbcfa-9ded-47fd-8b7c-15001da214a5
vulnerability,CVE-2024-8378,vulnerability--5a058fec-2936-4efe-9ca7-1edb97dc88cf
vulnerability,CVE-2024-48951,vulnerability--5a9c5677-e97a-4634-8a4d-0b3cb368f1b1
vulnerability,CVE-2024-48953,vulnerability--a86a838d-4178-4fc7-8c40-9af6fee14ad2
vulnerability,CVE-2024-48954,vulnerability--066610e0-682c-4189-8cc8-c3f1728d3773
vulnerability,CVE-2024-48950,vulnerability--2069b606-2e02-4994-89c9-14e2daf6d76a
vulnerability,CVE-2024-48952,vulnerability--33b0bf41-e4d9-4f6d-8330-8da814cea13c
vulnerability,CVE-2024-10963,vulnerability--fca84a21-fe1d-401f-a0ea-d8abc9012ab4
vulnerability,CVE-2024-10964,vulnerability--3b599527-12ad-4ea7-8305-7698fb9fe795
vulnerability,CVE-2024-40715,vulnerability--14d4abc8-7d58-4924-83c9-f006c8422ac3
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--602baa7e-db53-43b8-9bea-5d2bb95a8962",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--066610e0-682c-4189-8cc8-c3f1728d3773",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:44.315676Z",
"modified": "2024-11-07T17:16:44.315676Z",
"name": "CVE-2024-48954",
"description": "An issue was discovered in Logpoint before 7.5.0. Unvalidated input during the EventHub Collector setup by an authenticated user leads to Remote Code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48954"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--45b5af76-0c6a-4dd9-8559-0357972b5c4f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--14d4abc8-7d58-4924-83c9-f006c8422ac3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:45.300276Z",
"modified": "2024-11-07T17:16:45.300276Z",
"name": "CVE-2024-40715",
"description": "A vulnerability in Veeam Backup & Replication Enterprise Manager has been identified, which allows attackers to perform authentication bypass. Attackers must be able to perform Man-in-the-Middle (MITM) attack to exploit this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40715"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a9a4aa75-57f9-4b2d-83d3-4e2cb61b73e3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2069b606-2e02-4994-89c9-14e2daf6d76a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:44.322192Z",
"modified": "2024-11-07T17:16:44.322192Z",
"name": "CVE-2024-48950",
"description": "An issue was discovered in Logpoint before 7.5.0. An endpoint used by Distributed Logpoint Setup was exposed, allowing unauthenticated attackers to bypass CSRF protections and authentication.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48950"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a47e698f-ff0a-4693-9555-d2d31ef701ea",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--33b0bf41-e4d9-4f6d-8330-8da814cea13c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:44.324099Z",
"modified": "2024-11-07T17:16:44.324099Z",
"name": "CVE-2024-48952",
"description": "An issue was discovered in Logpoint before 7.5.0. SOAR uses a static JWT secret key to generate tokens that allow access to SOAR API endpoints without authentication. This static key vulnerability enables attackers to create custom JWT secret keys for unauthorized access to these endpoints.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48952"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ec5862cd-432f-460f-ae06-e69cc3ef8816",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3b599527-12ad-4ea7-8305-7698fb9fe795",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:44.501799Z",
"modified": "2024-11-07T17:16:44.501799Z",
"name": "CVE-2024-10964",
"description": "A vulnerability classified as critical has been found in emqx neuron up to 2.10.0. Affected is the function handle_add_plugin in the library cmd.library of the file plugins/restful/plugin_handle.c. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10964"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6264e7de-5ab1-4b60-bfbb-1b9531fc8a89",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5a9c5677-e97a-4634-8a4d-0b3cb368f1b1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:44.300995Z",
"modified": "2024-11-07T17:16:44.300995Z",
"name": "CVE-2024-48951",
"description": "An issue was discovered in Logpoint before 7.5.0. Server-Side Request Forgery (SSRF) on SOAR can be used to leak Logpoint's API Token leading to authentication bypass.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48951"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7990e3a1-451d-46a6-a5da-cfbbd7ecc65a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a86a838d-4178-4fc7-8c40-9af6fee14ad2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:44.311331Z",
"modified": "2024-11-07T17:16:44.311331Z",
"name": "CVE-2024-48953",
"description": "An issue was discovered in Logpoint before 7.5.0. Endpoints for creating, editing, or deleting third-party authentication modules lacked proper authorization checks. This allowed unauthenticated users to register their own authentication plugins in Logpoint, resulting in unauthorized access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48953"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e74e9724-f644-419d-911b-8513674c50a8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--fca84a21-fe1d-401f-a0ea-d8abc9012ab4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-07T17:16:44.471964Z",
"modified": "2024-11-07T17:16:44.471964Z",
"name": "CVE-2024-10963",
"description": "A vulnerability was found in pam_access due to the improper handling of tokens in access.conf, interpreted as hostnames. This flaw allows attackers to bypass access restrictions by spoofing hostnames, undermining configurations designed to limit access to specific TTYs or services. The flaw poses a risk in environments relying on these configurations for local access control.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10963"
}
]
}
]
}

0 comments on commit bc8b4ba

Please sign in to comment.