Skip to content

Commit

Permalink
generated content from 2025-01-14
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 14, 2025
1 parent 7cc1ef5 commit 759d737
Show file tree
Hide file tree
Showing 6 changed files with 115 additions and 0 deletions.
5 changes: 5 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263248,3 +263248,8 @@ vulnerability,CVE-2024-53649,vulnerability--38767296-c5c3-4dcf-b867-ec29b5f8f892
vulnerability,CVE-2024-47100,vulnerability--129a1005-103e-4b06-b4f7-dafcd23d94f8
vulnerability,CVE-2024-45385,vulnerability--95caa5e7-b0df-47ff-8288-4e815412dd61
vulnerability,CVE-2024-12240,vulnerability--ff38791c-8dd8-44f0-9eb6-9ccd4e6faeb3
vulnerability,CVE-2024-11864,vulnerability--fae5748c-e304-4e42-84eb-e1398ef8df53
vulnerability,CVE-2024-11497,vulnerability--1915d76b-deb0-4941-97b7-913baef2a839
vulnerability,CVE-2024-11863,vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed
vulnerability,CVE-2024-7344,vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a
vulnerability,CVE-2024-12988,vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--68e73ebb-daec-478c-8181-3768bd081f76",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1915d76b-deb0-4941-97b7-913baef2a839",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T14:18:10.335833Z",
"modified": "2025-01-14T14:18:10.335833Z",
"name": "CVE-2024-11497",
"description": "An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11497"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6885fa73-eeff-4bc7-9911-c1340a30ed0a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T14:18:12.396375Z",
"modified": "2025-01-14T14:18:12.396375Z",
"name": "CVE-2024-12988",
"description": "** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is the function sub_16C4C of the component HTTP Header Handler. The manipulation of the argument Host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12988"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aa5c1585-48a0-4dfc-b159-40ed4408c381",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T14:18:10.798945Z",
"modified": "2025-01-14T14:18:10.798945Z",
"name": "CVE-2024-7344",
"description": "Howyar UEFI Application \"Reloader\" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-7344"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7a835b3f-b4de-404b-a981-4b8eaaaeaba9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T14:18:10.36189Z",
"modified": "2025-01-14T14:18:10.36189Z",
"name": "CVE-2024-11863",
"description": "Specifically crafted SCMI messages sent to an SCP running SCP-Firmware release versions up to and including 2.15.0 may lead to a Usage Fault and crash the SCP",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11863"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8e428bdf-075f-42ca-b622-e2903221161c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--fae5748c-e304-4e42-84eb-e1398ef8df53",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T14:18:10.331683Z",
"modified": "2025-01-14T14:18:10.331683Z",
"name": "CVE-2024-11864",
"description": "Specifically crafted SCMI messages sent to an SCP running SCP-Firmware release versions up to and including 2.15.0 may lead to a Usage Fault and crash the SCP",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11864"
}
]
}
]
}

0 comments on commit 759d737

Please sign in to comment.