Skip to content

Commit

Permalink
generated content from 2024-12-04
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 4, 2024
1 parent e295e22 commit 170bdee
Show file tree
Hide file tree
Showing 84 changed files with 1,909 additions and 0 deletions.
83 changes: 83 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -258438,3 +258438,86 @@ vulnerability,CVE-2018-9380,vulnerability--4380e1db-16c8-4958-9152-2c8f954ee988
vulnerability,CVE-2018-9381,vulnerability--92978462-9e20-4da0-bb97-c74ec8c10984
vulnerability,CVE-2018-9418,vulnerability--2a19822d-a56a-40b0-8a1f-a9e8627b7e3b
vulnerability,CVE-2018-9426,vulnerability--1c3317dc-b3ee-45de-a3eb-8c379b40fb74
vulnerability,CVE-2024-51772,vulnerability--01a0ef0d-8ec9-497c-879e-078f841f4102
vulnerability,CVE-2024-51771,vulnerability--874242cb-af59-476e-ad7b-f8d2b28e13d1
vulnerability,CVE-2024-51363,vulnerability--7f9eeedb-63f4-4edf-bf9f-b61011d257ec
vulnerability,CVE-2024-51114,vulnerability--85954f4f-f305-4e79-84f5-6dbb991a6bf4
vulnerability,CVE-2024-51773,vulnerability--b48f1d43-cc87-4e51-8539-8687b965ade4
vulnerability,CVE-2024-48080,vulnerability--ef0a339e-85f3-44bd-8905-c233f3a029dd
vulnerability,CVE-2024-52548,vulnerability--ff0601e2-ed4b-464f-83e4-5ff88dba11e8
vulnerability,CVE-2024-52815,vulnerability--36c26ad4-8255-4c4e-ac65-1721c8ceb9a2
vulnerability,CVE-2024-52546,vulnerability--8c2711ab-1036-4dc8-a08c-5a19aa5c873a
vulnerability,CVE-2024-52547,vulnerability--b000eb56-4804-4467-8d89-03760c5c594c
vulnerability,CVE-2024-52805,vulnerability--a1282511-826a-4265-aa0f-9f0a86e411bf
vulnerability,CVE-2024-52545,vulnerability--859337a1-22f5-4284-adb5-d9b5ff3da734
vulnerability,CVE-2024-52544,vulnerability--3f74c554-7e56-4cb7-9b6e-683196acbd86
vulnerability,CVE-2024-45068,vulnerability--0b6e5e15-6081-41ad-8c62-bb8ae5e0cdfe
vulnerability,CVE-2024-45757,vulnerability--5c05f81c-015e-4d92-8c5a-284017f443f0
vulnerability,CVE-2024-45106,vulnerability--81b45f56-69c4-48b9-bfa4-120167330ce4
vulnerability,CVE-2024-45676,vulnerability--6679e6c6-0e20-41db-bea1-2425cae9984e
vulnerability,CVE-2024-12062,vulnerability--e09a8ee2-42d4-4d51-90af-22cdcb0e6947
vulnerability,CVE-2024-12053,vulnerability--ca51d738-bbcc-40ea-a602-1a2f97d15f86
vulnerability,CVE-2024-12082,vulnerability--07b35be5-8cb4-4b44-938e-9637a64819bd
vulnerability,CVE-2024-10484,vulnerability--774d01c7-f076-43e3-b2c2-853ab54e1e56
vulnerability,CVE-2024-10074,vulnerability--ea72bff6-bc37-44fd-b82d-eb7b7fb4ee3a
vulnerability,CVE-2024-10893,vulnerability--bd7635da-66b2-49c2-8f5c-70e05bd727c6
vulnerability,CVE-2024-9200,vulnerability--abd7db5a-82bf-4d72-9b37-9866bdbc5e6e
vulnerability,CVE-2024-9058,vulnerability--f8926d0b-8a91-478a-b10a-360bacca0a83
vulnerability,CVE-2024-9694,vulnerability--84ee639c-0aef-4799-8f12-52c81a3fac4b
vulnerability,CVE-2024-9197,vulnerability--a3111aae-61a5-4e87-820c-11dc8802987d
vulnerability,CVE-2024-9978,vulnerability--bc9fe0d0-797f-48db-b777-de2c7086d9ed
vulnerability,CVE-2024-47476,vulnerability--f7337d7e-3160-40b4-8a85-3cb5f7e9f5ad
vulnerability,CVE-2024-50948,vulnerability--d1e67665-06c4-4485-962d-50adf96d2c79
vulnerability,CVE-2024-25035,vulnerability--2eee8415-71ef-4954-95ec-3b76ca920526
vulnerability,CVE-2024-25020,vulnerability--168bc979-1eb5-4dca-91cc-6176e2764ca0
vulnerability,CVE-2024-25036,vulnerability--d41384b7-25bc-41a0-b9a5-06348c06aae4
vulnerability,CVE-2024-25019,vulnerability--c7cb6712-0c62-4e58-9752-d7c0100bf77f
vulnerability,CVE-2024-11461,vulnerability--0a265051-dbb5-4c9d-a603-8bb89ea74e91
vulnerability,CVE-2024-11200,vulnerability--aafafe74-78ef-45d7-a308-a573d49b8ebc
vulnerability,CVE-2024-11391,vulnerability--259899c2-7f72-4be7-bc94-936be1a20fe8
vulnerability,CVE-2024-11732,vulnerability--b8f018fb-3e72-403e-9a29-554f231f5444
vulnerability,CVE-2024-11853,vulnerability--87cbce51-6bb6-44ab-b124-f3078c2c8904
vulnerability,CVE-2024-11707,vulnerability--f91c90b9-97c0-4376-b37a-95ffb5ac64f1
vulnerability,CVE-2024-11325,vulnerability--66e19104-fb64-4aaf-9d67-95850c05f562
vulnerability,CVE-2024-11782,vulnerability--3217f9a7-b7e8-4c94-8bfd-a721126669aa
vulnerability,CVE-2024-11326,vulnerability--8cc4e001-7731-4ddc-b3df-77d4b0682aae
vulnerability,CVE-2024-11844,vulnerability--65a872d6-a3bd-457f-8312-67a16517401a
vulnerability,CVE-2024-11805,vulnerability--bb612aaa-630d-4939-bc47-e005b86b9691
vulnerability,CVE-2024-11866,vulnerability--00ae8465-076b-4dcf-9471-d272335cd3e7
vulnerability,CVE-2024-11898,vulnerability--aecb52d7-8563-4014-b5c2-7e238dc70450
vulnerability,CVE-2024-11453,vulnerability--aba4da6d-0b27-40d7-9afd-ce27f082a211
vulnerability,CVE-2024-53257,vulnerability--57ce57bd-2d66-4f15-b903-1f45813a37fc
vulnerability,CVE-2024-53921,vulnerability--5e9cc982-3330-469a-90c0-5f539a23676e
vulnerability,CVE-2024-53863,vulnerability--a7ccb6f7-8d2e-477a-b4d3-506d96e41c92
vulnerability,CVE-2024-53999,vulnerability--f1cf8411-d44e-4db7-8d36-5d9628adb66e
vulnerability,CVE-2024-53867,vulnerability--61910f7a-fed9-4d26-a103-216482a18d98
vulnerability,CVE-2024-53672,vulnerability--98dbcd3d-5bdd-4bdd-9633-098a2f10c5c9
vulnerability,CVE-2024-53502,vulnerability--0eec67c6-eb81-4329-ba75-a454f64c3729
vulnerability,CVE-2024-8748,vulnerability--677de39f-0be3-4837-a075-14b7e7ad8761
vulnerability,CVE-2024-40691,vulnerability--d0746820-4521-4392-9153-8918f28186e4
vulnerability,CVE-2024-41776,vulnerability--750d1a88-2112-49ae-ade5-071a4b787d0c
vulnerability,CVE-2024-41777,vulnerability--7a78456a-244d-4ca2-b601-46ca4391b8c7
vulnerability,CVE-2024-41775,vulnerability--50067061-3cad-4cb5-83a2-5b5dac44891c
vulnerability,CVE-2024-37303,vulnerability--88853b9c-6c19-4ace-be23-450a74d02628
vulnerability,CVE-2024-37302,vulnerability--e9272625-7697-4fbd-b971-3be482935ddf
vulnerability,CVE-2024-54000,vulnerability--5eda93e7-7820-460e-8ad0-02e24bd46e2e
vulnerability,CVE-2024-54131,vulnerability--d84def9b-a579-496f-b69e-1d42eba95e99
vulnerability,CVE-2024-49412,vulnerability--ddfdc02f-7900-4c07-a253-7127c594f1de
vulnerability,CVE-2024-49421,vulnerability--256a0c63-67a7-46f1-8215-84713b4a10cc
vulnerability,CVE-2024-49415,vulnerability--f24c958e-4fb8-40b7-bb08-77287bd92cd3
vulnerability,CVE-2024-49417,vulnerability--ca412bf2-64f3-4a05-990a-adf0594f7493
vulnerability,CVE-2024-49413,vulnerability--4178baef-f7b7-4207-ae31-1e3589ffc328
vulnerability,CVE-2024-49418,vulnerability--b7be250a-9842-4d34-afd2-3d6357bd873e
vulnerability,CVE-2024-49414,vulnerability--ba870ce6-4af6-4966-af0b-6af87f8f3228
vulnerability,CVE-2024-49420,vulnerability--588d5fa7-6ef1-4c40-8a32-1de15025bea7
vulnerability,CVE-2024-49416,vulnerability--f64eb2e1-01a2-42cf-b986-54635cf2a19d
vulnerability,CVE-2024-49410,vulnerability--21314f20-7bed-45e3-a06a-193aa3050448
vulnerability,CVE-2024-49419,vulnerability--08bb300c-f163-4e59-9744-d18e3775520b
vulnerability,CVE-2024-49411,vulnerability--19cdbd16-2d98-42b1-9a52-3020430dfd46
vulnerability,CVE-2024-46625,vulnerability--0ff3b49d-1c7b-4482-a19a-acb022d86fdb
vulnerability,CVE-2024-46624,vulnerability--6575d4ae-230a-4250-9144-74d0939868b3
vulnerability,CVE-2024-42422,vulnerability--e9ee12a6-c88f-4988-8276-56221ad9a441
vulnerability,CVE-2024-29404,vulnerability--024a48ed-f993-449e-a2a1-679ab4c1881c
vulnerability,CVE-2021-29892,vulnerability--e3c5f9f4-f072-4516-a649-191faa068e5d
vulnerability,CVE-2018-9449,vulnerability--ba44fb2b-ac7a-4b6e-92a8-7ff7bc469330
vulnerability,CVE-2018-9441,vulnerability--fdfa1ef6-b3e8-4ef1-b6ac-48811ac139fb
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3bccd78a-2089-4e61-9eb0-c86f5b68cec5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00ae8465-076b-4dcf-9471-d272335cd3e7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:37.325191Z",
"modified": "2024-12-04T00:22:37.325191Z",
"name": "CVE-2024-11866",
"description": "The BMLT Tabbed Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bmlt_tabbed_map' shortcode in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11866"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--12b6039a-d8e3-42af-b7ec-8040eb99c0d6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01a0ef0d-8ec9-497c-879e-078f841f4102",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:36.504431Z",
"modified": "2024-12-04T00:22:36.504431Z",
"name": "CVE-2024-51772",
"description": "An authenticated RCE vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51772"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fc89626d-a7f0-4d63-941f-2effc661bae3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--024a48ed-f993-449e-a2a1-679ab4c1881c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:39.031679Z",
"modified": "2024-12-04T00:22:39.031679Z",
"name": "CVE-2024-29404",
"description": "An issue in Razer Synapse 3 v.3.9.131.20813 and Synapse 3 App v.20240213 allows a local attacker to execute arbitrary code via the export parameter of the Chroma Effects function in the Profiles component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-29404"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a219aa20-e548-4bf0-80dc-9ee7d5961bd0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07b35be5-8cb4-4b44-938e-9637a64819bd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:36.809422Z",
"modified": "2024-12-04T00:22:36.809422Z",
"name": "CVE-2024-12082",
"description": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12082"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--934e5414-f980-456e-b49e-84cb3d424793",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08bb300c-f163-4e59-9744-d18e3775520b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:38.272044Z",
"modified": "2024-12-04T00:22:38.272044Z",
"name": "CVE-2024-49419",
"description": "Insufficient verification of url authenticity in GamingHub prior to version 6.1.03.4 in Korea, 7.1.02.4 in Global allows remote attackers to load an arbitrary URL in its webview.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49419"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1d6873b9-11ff-412c-b2c0-d2e499e3ff34",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a265051-dbb5-4c9d-a603-8bb89ea74e91",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:37.27359Z",
"modified": "2024-12-04T00:22:37.27359Z",
"name": "CVE-2024-11461",
"description": "The Form Data Collector plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 2.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11461"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4195e348-0e14-4862-a488-96f567202338",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b6e5e15-6081-41ad-8c62-bb8ae5e0cdfe",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:36.758823Z",
"modified": "2024-12-04T00:22:36.758823Z",
"name": "CVE-2024-45068",
"description": "Authentication credentials leakage vulnerability in Hitachi Ops Center Common Services within Hitachi Ops Center OVA.\n\n\nThis issue affects Hitachi Ops Center Common Services: from 10.9.3-00 before 11.0.3-00; Hitachi Ops Center OVA: from 10.9.3-00 before 11.0.2-01.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45068"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--511f7989-59f4-44da-a617-74accd67a61e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0eec67c6-eb81-4329-ba75-a454f64c3729",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:37.601797Z",
"modified": "2024-12-04T00:22:37.601797Z",
"name": "CVE-2024-53502",
"description": "Seecms v4.8 was discovered to contain a SQL injection vulnerability in the SEMCMS_SeoAndTag.php page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-53502"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cdb508d0-8098-46f6-a4a3-7212a0efbf3c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ff3b49d-1c7b-4482-a19a-acb022d86fdb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:38.538726Z",
"modified": "2024-12-04T00:22:38.538726Z",
"name": "CVE-2024-46625",
"description": "An authenticated arbitrary file upload vulnerability in the /documentCache/upload endpoint of InfoDom Performa 365 v4.0.1 allows attackers to execute arbitrary code via uploading a crafted SVG file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46625"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0f1cf742-1763-42a3-b332-109a8efa8a28",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--168bc979-1eb5-4dca-91cc-6176e2764ca0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:37.237086Z",
"modified": "2024-12-04T00:22:37.237086Z",
"name": "CVE-2024-25020",
"description": "IBM Cognos Controller 11.0.0 and 11.0.1 \n\n\n\n\n\n\n\n\n\n\n\n\n\nis vulnerable to malicious file upload by allowing unrestricted filetype attachments in the Journal entry page. Attackers can make use of this weakness and upload malicious executable files into the system and can be sent to victims for performing further attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-25020"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--44c43aa4-b613-46bc-9988-f403f3051b23",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19cdbd16-2d98-42b1-9a52-3020430dfd46",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:38.282411Z",
"modified": "2024-12-04T00:22:38.282411Z",
"name": "CVE-2024-49411",
"description": "Path Traversal in ThemeCenter prior to SMR Dec-2024 Release 1 allows physical attackers to copy apk files to arbitrary path with ThemeCenter privilege.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49411"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--15d9dfc2-1680-43f9-8987-8b79f54267a7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21314f20-7bed-45e3-a06a-193aa3050448",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:38.27085Z",
"modified": "2024-12-04T00:22:38.27085Z",
"name": "CVE-2024-49410",
"description": "Out-of-bounds write in libswmfextractor.so prior to SMR Dec-2024 Release 1 allows local attackers to execute arbitrary code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49410"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9c413ad8-7399-46ae-aa2d-db535f928d27",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--256a0c63-67a7-46f1-8215-84713b4a10cc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-04T00:22:38.229588Z",
"modified": "2024-12-04T00:22:38.229588Z",
"name": "CVE-2024-49421",
"description": "Path traversal in Quick Share Agent prior to version 3.5.14.47 in Android 12, 3.5.19.41 in Android 13, and 3.5.19.42 in Android 14 allows adjacent attackers to write file in arbitrary location.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49421"
}
]
}
]
}
Loading

0 comments on commit 170bdee

Please sign in to comment.