diff --git a/mapping.csv b/mapping.csv index da87bd4193..792e403ea7 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263248,3 +263248,8 @@ vulnerability,CVE-2024-53649,vulnerability--38767296-c5c3-4dcf-b867-ec29b5f8f892 vulnerability,CVE-2024-47100,vulnerability--129a1005-103e-4b06-b4f7-dafcd23d94f8 vulnerability,CVE-2024-45385,vulnerability--95caa5e7-b0df-47ff-8288-4e815412dd61 vulnerability,CVE-2024-12240,vulnerability--ff38791c-8dd8-44f0-9eb6-9ccd4e6faeb3 +vulnerability,CVE-2024-11864,vulnerability--fae5748c-e304-4e42-84eb-e1398ef8df53 +vulnerability,CVE-2024-11497,vulnerability--1915d76b-deb0-4941-97b7-913baef2a839 +vulnerability,CVE-2024-11863,vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed +vulnerability,CVE-2024-7344,vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a +vulnerability,CVE-2024-12988,vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab diff --git a/objects/vulnerability/vulnerability--1915d76b-deb0-4941-97b7-913baef2a839.json b/objects/vulnerability/vulnerability--1915d76b-deb0-4941-97b7-913baef2a839.json new file mode 100644 index 0000000000..b5860be785 --- /dev/null +++ b/objects/vulnerability/vulnerability--1915d76b-deb0-4941-97b7-913baef2a839.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--68e73ebb-daec-478c-8181-3768bd081f76", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1915d76b-deb0-4941-97b7-913baef2a839", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T14:18:10.335833Z", + "modified": "2025-01-14T14:18:10.335833Z", + "name": "CVE-2024-11497", + "description": "An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11497" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab.json b/objects/vulnerability/vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab.json new file mode 100644 index 0000000000..544e72e7e9 --- /dev/null +++ b/objects/vulnerability/vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6885fa73-eeff-4bc7-9911-c1340a30ed0a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T14:18:12.396375Z", + "modified": "2025-01-14T14:18:12.396375Z", + "name": "CVE-2024-12988", + "description": "** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is the function sub_16C4C of the component HTTP Header Handler. The manipulation of the argument Host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-12988" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a.json b/objects/vulnerability/vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a.json new file mode 100644 index 0000000000..b654e2e6db --- /dev/null +++ b/objects/vulnerability/vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--aa5c1585-48a0-4dfc-b159-40ed4408c381", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T14:18:10.798945Z", + "modified": "2025-01-14T14:18:10.798945Z", + "name": "CVE-2024-7344", + "description": "Howyar UEFI Application \"Reloader\" (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-7344" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed.json b/objects/vulnerability/vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed.json new file mode 100644 index 0000000000..44122ad6ee --- /dev/null +++ b/objects/vulnerability/vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7a835b3f-b4de-404b-a981-4b8eaaaeaba9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T14:18:10.36189Z", + "modified": "2025-01-14T14:18:10.36189Z", + "name": "CVE-2024-11863", + "description": "Specifically crafted SCMI messages sent to an SCP running SCP-Firmware release versions up to and including 2.15.0 may lead to a Usage Fault and crash the SCP", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11863" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fae5748c-e304-4e42-84eb-e1398ef8df53.json b/objects/vulnerability/vulnerability--fae5748c-e304-4e42-84eb-e1398ef8df53.json new file mode 100644 index 0000000000..d9f1a46e50 --- /dev/null +++ b/objects/vulnerability/vulnerability--fae5748c-e304-4e42-84eb-e1398ef8df53.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8e428bdf-075f-42ca-b622-e2903221161c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fae5748c-e304-4e42-84eb-e1398ef8df53", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T14:18:10.331683Z", + "modified": "2025-01-14T14:18:10.331683Z", + "name": "CVE-2024-11864", + "description": "Specifically crafted SCMI messages sent to an SCP running SCP-Firmware release versions up to and including 2.15.0 may lead to a Usage Fault and crash the SCP", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11864" + } + ] + } + ] +} \ No newline at end of file