Skip to content

Commit

Permalink
generated content from 2024-12-18
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 18, 2024
1 parent 327743f commit 597d7c6
Show file tree
Hide file tree
Showing 85 changed files with 1,932 additions and 0 deletions.
84 changes: 84 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -260463,3 +260463,87 @@ vulnerability,CVE-2024-10095,vulnerability--1f954102-e278-4da1-8ad9-3d5dadddae22
vulnerability,CVE-2024-10972,vulnerability--46ae6704-4c85-4fba-94d2-01fbecfb416b
vulnerability,CVE-2024-29671,vulnerability--71c0fdaa-ba84-4c70-8d34-1423b024299b
vulnerability,CVE-2024-43234,vulnerability--06d94a39-f8b6-49ad-819a-4d7632d2c1c9
vulnerability,CVE-2023-37940,vulnerability--cb9c1d4c-546a-49ce-8bee-79a2d1b11bfa
vulnerability,CVE-2021-26280,vulnerability--4cf3fd5a-e10f-4549-afcd-6da54e31898b
vulnerability,CVE-2021-26278,vulnerability--99870968-83d6-4746-91fd-0b1f10274a10
vulnerability,CVE-2021-26279,vulnerability--411f96f0-e286-497f-9d53-487c290e664b
vulnerability,CVE-2021-26281,vulnerability--0f797de0-16ab-4c68-ac49-2663e3cf32b0
vulnerability,CVE-2024-11294,vulnerability--b77cf078-5548-4489-8a5d-0d1a105d5980
vulnerability,CVE-2024-11422,vulnerability--b3b61240-5827-4431-ae99-fe5e7ea1eca3
vulnerability,CVE-2024-11993,vulnerability--46fd267f-5743-4681-9432-e12c77f6b036
vulnerability,CVE-2024-11280,vulnerability--9d931601-eedd-4d78-bd77-792b602fee2b
vulnerability,CVE-2024-11999,vulnerability--4e63d42a-e7f3-47d0-aa8e-7a10c899018f
vulnerability,CVE-2024-56139,vulnerability--7f38db0f-73cd-4883-af9a-0c410d80f03e
vulnerability,CVE-2024-56142,vulnerability--224c4346-93d6-4ab9-9c64-97162e9420fc
vulnerability,CVE-2024-31668,vulnerability--7e65ecb6-0912-4ddd-a3df-090d92f20edd
vulnerability,CVE-2024-49818,vulnerability--1baa0f1b-970e-4b1a-af5a-626edd1fd2d5
vulnerability,CVE-2024-49819,vulnerability--948031aa-8deb-4635-b56f-cb2710fe06d8
vulnerability,CVE-2024-49194,vulnerability--f44c9f85-9580-4613-8322-9f4e4ebbfc79
vulnerability,CVE-2024-49817,vulnerability--33137f95-37b3-4aa4-99d4-af661bcff4ba
vulnerability,CVE-2024-49816,vulnerability--204e3ff5-df73-4dae-9191-1c33714e4217
vulnerability,CVE-2024-49820,vulnerability--ed387516-f2c0-4ff0-a1ec-1275245e6964
vulnerability,CVE-2024-9654,vulnerability--8f2b0573-bd58-4afe-8fe7-cfc544e29f61
vulnerability,CVE-2024-9779,vulnerability--4a017450-c9f9-41d4-8b9e-4afc6d585419
vulnerability,CVE-2024-9624,vulnerability--f7f08ad8-9565-4a4a-bf41-4f33ef3659fe
vulnerability,CVE-2024-9819,vulnerability--21e14864-faaa-4beb-82ba-ca3a269c1961
vulnerability,CVE-2024-37607,vulnerability--1f1a3bd6-8a2b-491d-a228-16b2e1bb3b49
vulnerability,CVE-2024-37605,vulnerability--9c25d0cc-2f0a-401a-b6a2-2b81b39f84bd
vulnerability,CVE-2024-37606,vulnerability--2d91b43e-0146-4ad8-9c24-1b7c87f794d3
vulnerability,CVE-2024-53144,vulnerability--d43a998d-c089-4c6d-a517-15826542b7bd
vulnerability,CVE-2024-8429,vulnerability--fb5c9958-626c-4c00-987d-6c849836f671
vulnerability,CVE-2024-8475,vulnerability--759b654e-10c1-4127-902b-5941c0b9fd5c
vulnerability,CVE-2024-8972,vulnerability--d6e8ef87-f271-40f0-9469-d73c40ea4af8
vulnerability,CVE-2024-8326,vulnerability--0adb0eb0-03f3-4a5e-bea8-c5aa6fa2ddab
vulnerability,CVE-2024-50379,vulnerability--074cb101-cbe2-4995-a991-53beed0d10bd
vulnerability,CVE-2024-55515,vulnerability--99566413-4b7e-480a-8f99-b72cf31c7db7
vulnerability,CVE-2024-55864,vulnerability--e8c45ca6-72ac-4108-9032-a6fec5ae8f91
vulnerability,CVE-2024-55513,vulnerability--a38824af-2664-4b0c-86ac-66229d427e63
vulnerability,CVE-2024-55059,vulnerability--4cf3a8b3-e47a-42cd-b66b-d3abb7a590f6
vulnerability,CVE-2024-55514,vulnerability--92346145-0635-4e86-b90d-9b5485dfa78d
vulnerability,CVE-2024-55058,vulnerability--949422dd-5b6a-4fde-bab3-d75034411295
vulnerability,CVE-2024-55496,vulnerability--fa33c5d0-76e8-48c5-9cd8-572142611c9c
vulnerability,CVE-2024-55516,vulnerability--7728b8aa-91bc-4172-accb-d3c6f549d86a
vulnerability,CVE-2024-55056,vulnerability--d83ed45e-e4a4-4208-8f06-938843bd268c
vulnerability,CVE-2024-55057,vulnerability--af6afc9e-67a2-4bca-99eb-633ecb3abae8
vulnerability,CVE-2024-52542,vulnerability--f44f5e76-705d-47ce-b41c-1082cb654074
vulnerability,CVE-2024-52792,vulnerability--8ddbee96-f3db-4217-9913-d56688a97d1b
vulnerability,CVE-2024-38499,vulnerability--3242d075-d511-4db5-970a-39009165bdaa
vulnerability,CVE-2024-12469,vulnerability--c2e5da69-dd60-4547-9b26-be20e0244555
vulnerability,CVE-2024-12191,vulnerability--70026ad7-f533-4c34-b0bb-a834c54bdfe4
vulnerability,CVE-2024-12199,vulnerability--87a672a1-1ba9-4f45-ae24-b6a9b03e78f3
vulnerability,CVE-2024-12395,vulnerability--65d378e2-b255-42a0-b480-6d2fffe0a4cd
vulnerability,CVE-2024-12219,vulnerability--7876a79e-9d6d-4d20-9e57-2d217a0609ff
vulnerability,CVE-2024-12127,vulnerability--6b6e3bb8-4858-4f9b-ae15-ff99225cde23
vulnerability,CVE-2024-12671,vulnerability--46e8a1cd-ac35-4624-b431-83794e46b37e
vulnerability,CVE-2024-12024,vulnerability--2d09df72-c967-4d3a-8e62-68a3424a35d2
vulnerability,CVE-2024-12200,vulnerability--2db7d703-3bd3-4818-838b-d6032884e3bb
vulnerability,CVE-2024-12239,vulnerability--a36ddb0e-aebb-4f4e-b94c-c460b58057be
vulnerability,CVE-2024-12293,vulnerability--e35706eb-8186-4c26-b300-531af600d1af
vulnerability,CVE-2024-12670,vulnerability--b348b473-08fb-4dfe-a990-f72ea0d9606e
vulnerability,CVE-2024-12178,vulnerability--1bb1340d-7b09-4ead-9b25-aecdb3dc1e1f
vulnerability,CVE-2024-12356,vulnerability--42e2b6d2-b108-42c4-88dc-2ec0853180a5
vulnerability,CVE-2024-12192,vulnerability--3a0bd8cc-55ec-47c8-bf18-7d0b20a25243
vulnerability,CVE-2024-12539,vulnerability--c2aa40e1-e2a7-45ae-b57a-6a7c4a777a00
vulnerability,CVE-2024-12220,vulnerability--355f22a7-75e3-4827-917b-029b39f328a3
vulnerability,CVE-2024-12179,vulnerability--4eaf9069-db53-4996-b15b-f1669141105c
vulnerability,CVE-2024-12194,vulnerability--5ea18c9f-d972-49e8-b4c7-bd09ae66eec6
vulnerability,CVE-2024-12198,vulnerability--57dcafdb-1fcf-4df1-85a0-0e781d2cc524
vulnerability,CVE-2024-12193,vulnerability--3be81a8c-3c5e-4758-96f9-f96f373c1524
vulnerability,CVE-2024-12197,vulnerability--9325beae-110f-49c5-bf24-a8d7cf233e5e
vulnerability,CVE-2024-12669,vulnerability--1b73f303-6d22-45a5-bf1c-3de5c03d8c4f
vulnerability,CVE-2024-12601,vulnerability--eb188576-14e1-4247-9f3c-438ad2665280
vulnerability,CVE-2024-54662,vulnerability--6bf73b4d-e745-450b-a8f7-f4c259ecca78
vulnerability,CVE-2024-54677,vulnerability--b630a933-5024-479b-986b-d046bd4cc55e
vulnerability,CVE-2024-54125,vulnerability--45c30c9b-19ee-40b0-98a4-3d78389d718b
vulnerability,CVE-2024-10476,vulnerability--3a558bfe-8066-494b-9866-c77858da70ab
vulnerability,CVE-2024-10205,vulnerability--3463f3ee-f57d-4a23-a794-d31b373940b6
vulnerability,CVE-2024-10973,vulnerability--1df28f4b-91e2-4f70-873a-1f424ddd8ca6
vulnerability,CVE-2024-10356,vulnerability--75fe70ea-acd8-4815-96d5-d3780ec81f58
vulnerability,CVE-2024-51479,vulnerability--474cba47-039a-48ab-b875-b5a8b6c61dbf
vulnerability,CVE-2024-51175,vulnerability--1ba11195-b17c-4b10-9dbf-25c8bc0a2a89
vulnerability,CVE-2024-42194,vulnerability--ad41177d-24ac-4fa8-91da-f0bfb4d9fe0b
vulnerability,CVE-2024-36831,vulnerability--a3e196f8-8854-484a-8cb4-249d5ea6a40d
vulnerability,CVE-2024-36832,vulnerability--9ea74bc0-5710-4e38-8553-2955966993da
vulnerability,CVE-2024-29646,vulnerability--47cfa9e7-2267-4da1-b055-504b06641f56
vulnerability,CVE-2020-12484,vulnerability--bb9ed944-8f15-471e-b7f1-7e493e897cec
vulnerability,CVE-2020-12487,vulnerability--2b317c34-0a0c-4130-b75b-f38b9fd6067a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0ba47452-fdfc-4025-9e80-0d2860aa4714",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--074cb101-cbe2-4995-a991-53beed0d10bd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:02.523245Z",
"modified": "2024-12-18T00:39:02.523245Z",
"name": "CVE-2024-50379",
"description": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.08, which fixes the issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50379"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0ccd6c39-a57b-457c-a70c-aaa45bc0bda3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0adb0eb0-03f3-4a5e-bea8-c5aa6fa2ddab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:02.468302Z",
"modified": "2024-12-18T00:39:02.468302Z",
"name": "CVE-2024-8326",
"description": "The s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 241114 via the 'sc_get_details' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including user data and database configuration information, which can lead to reading, updating, or dropping database tables. The vulnerability was partially patched in version 241114.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8326"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--23a22852-29bc-44cc-84d8-652ce58633d0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f797de0-16ab-4c68-ac49-2663e3cf32b0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:00.573425Z",
"modified": "2024-12-18T00:39:00.573425Z",
"name": "CVE-2021-26281",
"description": "Some parameters of the alarm clock module are improperly stored, leaking some sensitive information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-26281"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cb0ee070-2063-4ec7-8e6d-f9aef1f9d12a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1b73f303-6d22-45a5-bf1c-3de5c03d8c4f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:03.12119Z",
"modified": "2024-12-18T00:39:03.12119Z",
"name": "CVE-2024-12669",
"description": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12669"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--99022250-bf3a-464d-8030-47ccfc5409fd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ba11195-b17c-4b10-9dbf-25c8bc0a2a89",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:03.312225Z",
"modified": "2024-12-18T00:39:03.312225Z",
"name": "CVE-2024-51175",
"description": "An issue in H3C switch h3c-S1526 allows a remote attacker to obtain sensitive information via the S1526.cfg component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51175"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--23246e67-91b8-492f-9469-4338c2f0e33a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1baa0f1b-970e-4b1a-af5a-626edd1fd2d5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:01.644533Z",
"modified": "2024-12-18T00:39:01.644533Z",
"name": "CVE-2024-49818",
"description": "IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 \n\ncould allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49818"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--46acb05f-5c4e-4bdc-b2b0-8c42ff5efdee",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1bb1340d-7b09-4ead-9b25-aecdb3dc1e1f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:03.097298Z",
"modified": "2024-12-18T00:39:03.097298Z",
"name": "CVE-2024-12178",
"description": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12178"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6a6420bc-f628-4523-9de3-bbaee22b4c6c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1df28f4b-91e2-4f70-873a-1f424ddd8ca6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:03.258704Z",
"modified": "2024-12-18T00:39:03.258704Z",
"name": "CVE-2024-10973",
"description": "A vulnerability was found in Keycloak. The environment option `KC_CACHE_EMBEDDED_MTLS_ENABLED` does not work and the JGroups replication configuration is always used in plain text which can allow an attacker that has access to adjacent networks related to JGroups to read sensitive information.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10973"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--89521ddc-313b-4621-82aa-7d386711179e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f1a3bd6-8a2b-491d-a228-16b2e1bb3b49",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:01.997463Z",
"modified": "2024-12-18T00:39:01.997463Z",
"name": "CVE-2024-37607",
"description": "A Buffer overflow vulnerability in D-Link DAP-2555 REVA_FIRMWARE_1.20 allows remote attackers to cause a Denial of Service (DoS) via a crafted HTTP request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-37607"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ec94934d-b5ce-479d-8891-1970fe1225b0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--204e3ff5-df73-4dae-9191-1c33714e4217",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:01.692932Z",
"modified": "2024-12-18T00:39:01.692932Z",
"name": "CVE-2024-49816",
"description": "IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 stores potentially sensitive information in log files that could be read by a local privileged user.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49816"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--422b5162-5ef5-4a30-8665-3ba06f93cf36",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21e14864-faaa-4beb-82ba-ca3a269c1961",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:01.857584Z",
"modified": "2024-12-18T00:39:01.857584Z",
"name": "CVE-2024-9819",
"description": "Authorization Bypass Through User-Controlled Key vulnerability in NextGeography NG Analyser allows Functionality Misuse.This issue affects NG Analyser: before 2.2.711.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-9819"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a353064a-93d3-4936-a13c-badfed7f8dd5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--224c4346-93d6-4ab9-9c64-97162e9420fc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-18T00:39:01.406325Z",
"modified": "2024-12-18T00:39:01.406325Z",
"name": "CVE-2024-56142",
"description": "pghoard is a PostgreSQL backup daemon and restore tooling that stores backup data in cloud object stores. A vulnerability has been discovered that could allow an attacker to acquire disk access with privileges equivalent to those of pghoard, allowing for unintended path traversal. Depending on the permissions/privileges assigned to pghoard, this could allow disclosure of sensitive information. This issue has been addressed in releases after 2.2.2a. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-56142"
}
]
}
]
}
Loading

0 comments on commit 597d7c6

Please sign in to comment.