Skip to content

Commit

Permalink
generated content from 2024-12-18
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 18, 2024
1 parent f695d67 commit 92b8692
Show file tree
Hide file tree
Showing 85 changed files with 1,932 additions and 0 deletions.
84 changes: 84 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -260463,3 +260463,87 @@ vulnerability,CVE-2024-5333,vulnerability--d0372409-4357-4952-97ff-62b7675020f0
vulnerability,CVE-2024-29671,vulnerability--1f293191-4375-4520-8ac5-9651eb28fb34
vulnerability,CVE-2024-43234,vulnerability--8c06f725-97ae-4828-b13b-8b3d72ae0021
vulnerability,CVE-2024-6001,vulnerability--d0bed3d8-5455-4a29-98da-dfcb341d3a1b
vulnerability,CVE-2024-51175,vulnerability--b806b22a-576e-4408-b13b-0118a6f5dff3
vulnerability,CVE-2024-51479,vulnerability--3922697f-0948-459c-9caf-af964bc92530
vulnerability,CVE-2024-52542,vulnerability--ec94cf8c-5eba-44a9-9a60-3ada93398de3
vulnerability,CVE-2024-52792,vulnerability--8f405f03-2b0e-46b8-8ff3-d3f9068a91e7
vulnerability,CVE-2024-12239,vulnerability--e0565a3f-bfe7-429b-b741-20e5af3f204c
vulnerability,CVE-2024-12179,vulnerability--75370c80-3fd4-4ea8-84b8-a5353d8a2089
vulnerability,CVE-2024-12670,vulnerability--a3f6c377-0961-46b9-a733-7bf656cab1b4
vulnerability,CVE-2024-12197,vulnerability--14d1e388-6699-47eb-a2fe-7790382aadb8
vulnerability,CVE-2024-12469,vulnerability--696daa6a-8391-4baf-88de-8083c2708f09
vulnerability,CVE-2024-12178,vulnerability--57271ff4-fd3f-47b8-a9ce-c72f15c2d1c9
vulnerability,CVE-2024-12192,vulnerability--69633a83-4ae6-4fe0-adec-a4ac701ac536
vulnerability,CVE-2024-12293,vulnerability--93fa2aad-69bc-481a-a724-da0f0e901b91
vulnerability,CVE-2024-12024,vulnerability--62106809-3524-41b1-b469-333fa6d73d19
vulnerability,CVE-2024-12219,vulnerability--bda45d49-b901-4773-ad4a-4e7996382584
vulnerability,CVE-2024-12194,vulnerability--dd16fb6a-0615-4cfc-810b-c084fb5eb630
vulnerability,CVE-2024-12601,vulnerability--c00824ce-2b6e-48e3-8948-42a41f6c81b5
vulnerability,CVE-2024-12127,vulnerability--ef0b3c5b-483a-48a3-b914-095e8b886ad0
vulnerability,CVE-2024-12191,vulnerability--9dcf6100-f427-471a-84b3-0f3090bcefa4
vulnerability,CVE-2024-12200,vulnerability--13df7f2c-0bcf-4b18-9b1c-bf193cbe1726
vulnerability,CVE-2024-12356,vulnerability--a1914f6a-0af0-4828-aaa9-8d8313f74cda
vulnerability,CVE-2024-12193,vulnerability--2a5c26c9-5da7-4925-b88b-28818c4dede4
vulnerability,CVE-2024-12671,vulnerability--64c84e57-59fb-4a4e-9913-de3e5142531f
vulnerability,CVE-2024-12198,vulnerability--228d5e69-ea1c-4a7a-8524-54ce01769ec5
vulnerability,CVE-2024-12395,vulnerability--335512cd-8173-4074-acd1-44167c750048
vulnerability,CVE-2024-12199,vulnerability--0d8d99b4-e4ec-4abf-a990-08e14160f2be
vulnerability,CVE-2024-12220,vulnerability--55366ce0-f1f0-4a3e-a1a4-6a65f63e7959
vulnerability,CVE-2024-12539,vulnerability--d09d8acb-6dd9-4d19-9a2b-4f1337a0ce68
vulnerability,CVE-2024-12669,vulnerability--70137041-fb54-4487-b911-b6bc0104fa43
vulnerability,CVE-2024-10356,vulnerability--f1e301d9-2660-4faf-a24b-a67beba893b5
vulnerability,CVE-2024-10973,vulnerability--74447789-35ee-43bc-934e-b51b2cd89963
vulnerability,CVE-2024-10476,vulnerability--d7c9e6d4-26df-4511-8614-a9e7e4e13371
vulnerability,CVE-2024-10205,vulnerability--2c64da4a-fce1-42ad-b14b-42ba4f564fbf
vulnerability,CVE-2024-9654,vulnerability--f3714bca-0238-4114-b424-a5f8c1c103bd
vulnerability,CVE-2024-9819,vulnerability--a290f81e-8adb-4706-8c8e-446628dc7b83
vulnerability,CVE-2024-9624,vulnerability--ee47ce32-e4d1-4354-83d4-4a8954fd342a
vulnerability,CVE-2024-9779,vulnerability--dad3e9a8-9d73-4943-8472-5453db0ded74
vulnerability,CVE-2024-50379,vulnerability--a7175a64-df12-43ad-b03a-155550ffbf7c
vulnerability,CVE-2024-11999,vulnerability--96668a76-d3ee-4657-84de-e1cd0dc6587f
vulnerability,CVE-2024-11422,vulnerability--e6f90917-977d-4fee-9df1-f54bb3ff2ad1
vulnerability,CVE-2024-11294,vulnerability--64e39b4e-e1ec-4edc-b906-7e7e314b9626
vulnerability,CVE-2024-11280,vulnerability--2dbc4652-9f85-4f53-a537-1d271520d3a0
vulnerability,CVE-2024-11993,vulnerability--361cb349-4bbe-4b45-97f0-fe8701febd98
vulnerability,CVE-2024-53144,vulnerability--2e390297-ddff-4467-af60-5370539cafe6
vulnerability,CVE-2024-8972,vulnerability--156022d6-a78f-48ad-81c9-7893b3395bcb
vulnerability,CVE-2024-8429,vulnerability--1bb7e050-62d2-42be-8c43-da7b8ac42c58
vulnerability,CVE-2024-8475,vulnerability--8ddfa831-8bb5-4c04-a4cb-e621ae99254b
vulnerability,CVE-2024-8326,vulnerability--f0399420-7705-43a8-9c6e-caaaa834d3fa
vulnerability,CVE-2024-38499,vulnerability--f8821bc0-8970-4ee9-a0b5-6377515f2011
vulnerability,CVE-2024-31668,vulnerability--7b847ff6-7e24-4f33-b3af-c58d027188ca
vulnerability,CVE-2024-37606,vulnerability--1e79bce8-18e1-4898-94eb-64b3fa2a5346
vulnerability,CVE-2024-37605,vulnerability--979daf62-2a55-4acf-84d9-57d531210ef1
vulnerability,CVE-2024-37607,vulnerability--69a1e304-4833-4e13-8a5d-576d3c2eab28
vulnerability,CVE-2024-54677,vulnerability--eb394e53-63d3-422e-b698-0c5204cdae18
vulnerability,CVE-2024-54662,vulnerability--115c75be-1b7d-4369-a11c-eab0ce1c6d7e
vulnerability,CVE-2024-54125,vulnerability--ed89ab84-175c-4393-bfc3-42d49d3893d0
vulnerability,CVE-2024-55516,vulnerability--cda47857-debd-4893-8ac7-d740ee79270a
vulnerability,CVE-2024-55057,vulnerability--67ff4141-411e-414b-8776-6d273ae61f5a
vulnerability,CVE-2024-55513,vulnerability--46eb8dfc-6f08-41c6-a343-bb873fa0aabf
vulnerability,CVE-2024-55864,vulnerability--c792fc87-2d04-4971-9f5c-07330ceba11a
vulnerability,CVE-2024-55059,vulnerability--41458325-155e-43d8-bc19-52303553e362
vulnerability,CVE-2024-55514,vulnerability--99fa1226-a351-45c7-95fd-0816a9dad3a9
vulnerability,CVE-2024-55056,vulnerability--d420736a-8afe-4638-8ba7-715bc8603154
vulnerability,CVE-2024-55058,vulnerability--ed3ede47-c51c-4ed2-85d1-c29b30ddbd10
vulnerability,CVE-2024-55496,vulnerability--450c0260-22e3-4409-ba3c-2aa69e48a9e6
vulnerability,CVE-2024-55515,vulnerability--cbebc31b-774a-4429-a4ef-acfd9297ae9b
vulnerability,CVE-2024-49819,vulnerability--2eb0306a-be68-40ba-8efa-d4dd3392f17b
vulnerability,CVE-2024-49820,vulnerability--17acf8d6-765b-4a43-8d20-fbc831476f78
vulnerability,CVE-2024-49194,vulnerability--ebbfb3d1-25c6-402e-b51e-92803cc9de4c
vulnerability,CVE-2024-49817,vulnerability--7bff4fb4-c101-4e54-9cfc-56eac6c5ff6e
vulnerability,CVE-2024-49816,vulnerability--d2fa8f49-0c51-4b86-8e10-dde9e9ba0c13
vulnerability,CVE-2024-49818,vulnerability--a6fff532-9436-41a8-b108-f6b99a712161
vulnerability,CVE-2024-56139,vulnerability--4eb1b618-988c-4767-be85-2d76114c1ec1
vulnerability,CVE-2024-56142,vulnerability--33005581-5f80-4a3c-8c45-69e7d1145100
vulnerability,CVE-2024-36832,vulnerability--ba81e49c-837a-4152-95fb-99f63b2dea9e
vulnerability,CVE-2024-36831,vulnerability--e03df5ca-a796-4466-89b4-1afe94d102f9
vulnerability,CVE-2024-42194,vulnerability--b9a8fedd-8f24-4036-a963-95d5646d822e
vulnerability,CVE-2024-29646,vulnerability--66568489-01a2-4c54-bc0b-3af3c074b4d9
vulnerability,CVE-2021-26279,vulnerability--042df7d1-e85f-4975-bf67-a2e4711054ab
vulnerability,CVE-2021-26280,vulnerability--05adb52b-afeb-4367-96ad-f027c3753f56
vulnerability,CVE-2021-26278,vulnerability--f54f99f2-cac4-46f4-b2cb-90e6eebc16df
vulnerability,CVE-2021-26281,vulnerability--5ffd3bb4-3a8d-4308-9f4f-cc2e3d169814
vulnerability,CVE-2023-37940,vulnerability--4df48b10-cf69-47da-8540-872bd48339c3
vulnerability,CVE-2020-12487,vulnerability--5c2239f3-4785-46de-91cf-84f97d8f1134
vulnerability,CVE-2020-12484,vulnerability--b1c300d7-1336-411b-bc40-b51214b0559a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bb3eda6d-8b7d-4f27-a12d-d836db05a7c2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--042df7d1-e85f-4975-bf67-a2e4711054ab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:54.191551Z",
"modified": "2024-12-18T00:21:54.191551Z",
"name": "CVE-2021-26279",
"description": "Some parameters of the weather module are improperly stored, leaking some sensitive information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-26279"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--02a991a5-122a-4c88-a4cd-a51c00ddd355",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05adb52b-afeb-4367-96ad-f027c3753f56",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:54.198297Z",
"modified": "2024-12-18T00:21:54.198297Z",
"name": "CVE-2021-26280",
"description": "Locally installed application can bypass the permission check and perform system operations that require permission.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-26280"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--40137635-0cd2-4440-86ad-0944c7f78069",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d8d99b4-e4ec-4abf-a990-08e14160f2be",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.054571Z",
"modified": "2024-12-18T00:21:50.054571Z",
"name": "CVE-2024-12199",
"description": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12199"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7b0b0493-26ca-4733-8c4b-8a676ba196c2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--115c75be-1b7d-4369-a11c-eab0ce1c6d7e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:51.475892Z",
"modified": "2024-12-18T00:21:51.475892Z",
"name": "CVE-2024-54662",
"description": "Dante 1.4.0 through 1.4.3 (fixed in 1.4.4) has incorrect access control for some sockd.conf configurations involving socksmethod.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54662"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8946a942-a90d-4c81-80e3-a365b3323fdb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--13df7f2c-0bcf-4b18-9b1c-bf193cbe1726",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.038005Z",
"modified": "2024-12-18T00:21:50.038005Z",
"name": "CVE-2024-12200",
"description": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12200"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3731a97b-41c6-4b91-9e08-76b06c5f81ba",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--14d1e388-6699-47eb-a2fe-7790382aadb8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.014668Z",
"modified": "2024-12-18T00:21:50.014668Z",
"name": "CVE-2024-12197",
"description": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12197"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--429ab99e-32bd-48e2-b9d5-980c1a17bbfb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--156022d6-a78f-48ad-81c9-7893b3395bcb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.893272Z",
"modified": "2024-12-18T00:21:50.893272Z",
"name": "CVE-2024-8972",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mobil365 Informatics Saha365 App allows SQL Injection.This issue affects Saha365 App: before 30.09.2024.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8972"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d799d8a7-1c8c-43d4-ac29-b74b3b28e1e0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--17acf8d6-765b-4a43-8d20-fbc831476f78",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:51.574221Z",
"modified": "2024-12-18T00:21:51.574221Z",
"name": "CVE-2024-49820",
"description": "IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49820"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--94a56640-0fe4-4a3c-af86-2f8ceaf8f392",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1bb7e050-62d2-42be-8c43-da7b8ac42c58",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.897194Z",
"modified": "2024-12-18T00:21:50.897194Z",
"name": "CVE-2024-8429",
"description": "Improper Restriction of Excessive Authentication Attempts vulnerability in Digital Operation Services WiFiBurada allows Use of Known Domain Credentials.This issue affects WiFiBurada: before 1.0.5.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8429"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ed8570fe-add4-4ceb-b8ba-b69749baad3d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e79bce8-18e1-4898-94eb-64b3fa2a5346",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:51.340752Z",
"modified": "2024-12-18T00:21:51.340752Z",
"name": "CVE-2024-37606",
"description": "A Stack overflow vulnerability in D-Link DCS-932L REVB_FIRMWARE_2.18.01 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-37606"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--58af62df-e1d4-4881-8984-c2f769f1ef4a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--228d5e69-ea1c-4a7a-8524-54ce01769ec5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.04677Z",
"modified": "2024-12-18T00:21:50.04677Z",
"name": "CVE-2024-12198",
"description": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12198"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--86992651-eee8-4dd9-9e17-1c49a3b12620",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2a5c26c9-5da7-4925-b88b-28818c4dede4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.04055Z",
"modified": "2024-12-18T00:21:50.04055Z",
"name": "CVE-2024-12193",
"description": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12193"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--beafa1c6-33f3-47ff-980f-69ab302e5661",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2c64da4a-fce1-42ad-b14b-42ba4f564fbf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:21:50.116005Z",
"modified": "2024-12-18T00:21:50.116005Z",
"name": "CVE-2024-10205",
"description": "Authentication Bypass\nvulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analytics \n\ncomponent\n\n).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10205"
}
]
}
]
}
Loading

0 comments on commit 92b8692

Please sign in to comment.