Skip to content

Commit

Permalink
generated content from 2025-01-29
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 29, 2025
1 parent bb03bef commit be295cf
Show file tree
Hide file tree
Showing 102 changed files with 2,323 additions and 0 deletions.
101 changes: 101 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -265418,3 +265418,104 @@ vulnerability,CVE-2025-0729,vulnerability--cf7ae5a6-0205-4977-928b-b236b3ef414e
vulnerability,CVE-2025-0753,vulnerability--08087b27-dbf1-4fd2-a752-81cbb74edfbe
vulnerability,CVE-2025-0695,vulnerability--1324df33-7d86-4fed-8de6-17b080579584
vulnerability,CVE-2025-0751,vulnerability--27f4e12a-5d75-43f3-b7b9-b0089287fac1
vulnerability,CVE-2024-6351,vulnerability--c56ccc32-f1ed-475d-bc9c-a9694084a6be
vulnerability,CVE-2024-34733,vulnerability--93e82dbb-3c4d-47bd-a327-aab26897d636
vulnerability,CVE-2024-34748,vulnerability--f30edffc-85ea-49a3-bcb9-687079b68802
vulnerability,CVE-2024-34732,vulnerability--9588b65d-4e18-4a49-acfe-7908d9c4760d
vulnerability,CVE-2024-12649,vulnerability--8e71f43c-6cdc-4e1f-8474-de5669b2eb8e
vulnerability,CVE-2024-12807,vulnerability--e514ec95-53eb-402f-8991-69a8dc803864
vulnerability,CVE-2024-12723,vulnerability--ca66fc98-191c-44e9-a47c-fe225c9675d1
vulnerability,CVE-2024-12648,vulnerability--b29620f1-3fa3-476f-9366-74605c97b851
vulnerability,CVE-2024-12647,vulnerability--3ad56f0b-5973-47b3-b6d2-7563063be517
vulnerability,CVE-2024-45341,vulnerability--8bdc2cbd-11b9-4214-b631-d49eea35c58e
vulnerability,CVE-2024-45340,vulnerability--76cf8440-8e2d-4833-90d9-176cc9c503d3
vulnerability,CVE-2024-45339,vulnerability--31179234-7a80-4a44-b330-4f8a3bcf02a6
vulnerability,CVE-2024-45336,vulnerability--f742148c-a0be-4a59-bb50-79d4412aff0a
vulnerability,CVE-2024-27263,vulnerability--0eb192d5-ef6a-49b2-976d-fa9e6244e144
vulnerability,CVE-2024-22315,vulnerability--4f1c55d6-8e21-4ed4-bb2b-1440cf342aca
vulnerability,CVE-2024-57519,vulnerability--f5530dfb-eb61-4ce8-be2a-b019ea97bdc9
vulnerability,CVE-2024-57514,vulnerability--87b1d62c-f8f3-458b-bdbb-52697c3639c4
vulnerability,CVE-2024-57376,vulnerability--0f3d92cf-c689-4d5c-a5df-52b0773f1c2d
vulnerability,CVE-2024-13509,vulnerability--a2045c1f-0022-4a63-b9ec-2df6cf837c5f
vulnerability,CVE-2024-13448,vulnerability--acf6a5e7-4a57-4f55-b53e-d25434152f58
vulnerability,CVE-2024-13527,vulnerability--48108d28-843f-4028-b5fa-6d5158f8507a
vulnerability,CVE-2024-13484,vulnerability--22cb060f-0f64-4027-9e45-325a08e87a0e
vulnerability,CVE-2024-13521,vulnerability--c54b6286-d06b-4f79-8836-f8a6e6e3d697
vulnerability,CVE-2024-53881,vulnerability--4344edd1-6c1f-4ee3-a7da-2f1a2bd15443
vulnerability,CVE-2024-53869,vulnerability--58daf433-2fed-404c-9578-f61c39b39e50
vulnerability,CVE-2024-56529,vulnerability--ed69a0f7-150c-4687-a234-e0556d6d0d8b
vulnerability,CVE-2024-23953,vulnerability--4945e5ed-c063-4980-b2c4-0c36880d31d2
vulnerability,CVE-2024-40673,vulnerability--6497d340-e4d1-409f-9137-b0e2e856098a
vulnerability,CVE-2024-40651,vulnerability--f5e56810-113e-4077-9518-386a50179a24
vulnerability,CVE-2024-40675,vulnerability--b3a30012-0321-443a-a5ec-d165a8c96a4c
vulnerability,CVE-2024-40669,vulnerability--1ae1c734-3814-4576-8e84-0bf358cfe87a
vulnerability,CVE-2024-40670,vulnerability--986a6962-5bae-4371-a4b4-a074686190ca
vulnerability,CVE-2024-40672,vulnerability--75976512-2a3e-4276-9a06-a373a0805d4a
vulnerability,CVE-2024-40677,vulnerability--dc401a33-95db-40be-b77f-eefdcd90f959
vulnerability,CVE-2024-40649,vulnerability--18854a93-ebaa-4e96-9738-22aefd291642
vulnerability,CVE-2024-40676,vulnerability--6c263473-ca5d-440b-b491-646231e2dac2
vulnerability,CVE-2024-40674,vulnerability--f01e8b7d-248b-45e4-8818-23070566ee87
vulnerability,CVE-2024-7881,vulnerability--23731473-1281-4878-8ced-e255af1bf351
vulnerability,CVE-2024-55968,vulnerability--fc698238-c828-4cd1-8678-1fba16a9fccf
vulnerability,CVE-2024-48310,vulnerability--f95a5746-eaa5-4456-8a96-bae9cbb0f35f
vulnerability,CVE-2024-29869,vulnerability--fe746385-49a4-41b5-a422-e5ae9c4b9a89
vulnerability,CVE-2024-0140,vulnerability--148e36b5-adf6-4fad-bf91-45a82c3082d5
vulnerability,CVE-2024-0146,vulnerability--b59a05e9-02dd-4267-a903-df42973c4a8d
vulnerability,CVE-2024-0149,vulnerability--4b8a30d0-6b23-4d8d-8f39-5a14a743fe3f
vulnerability,CVE-2024-0147,vulnerability--9e9bc6a2-acca-426c-8823-1fcca8aee118
vulnerability,CVE-2024-0135,vulnerability--a024c34e-6c9e-44fa-afb6-bf835ca3bba9
vulnerability,CVE-2024-0150,vulnerability--43a2595f-4947-46ab-82c8-047972693bb5
vulnerability,CVE-2024-0136,vulnerability--56bf535e-a174-47a8-a09f-e88cae8b5712
vulnerability,CVE-2024-0137,vulnerability--dfaa4072-68e9-4ad3-a4b6-171240fb45ca
vulnerability,CVE-2024-8401,vulnerability--58cdacf0-4aa2-41d1-9b8c-8992584dcdba
vulnerability,CVE-2024-11954,vulnerability--e90b6268-7fee-486c-a1c3-a21ca81e8af2
vulnerability,CVE-2024-11135,vulnerability--73423c70-6256-4f7f-990c-48a00faa1ba3
vulnerability,CVE-2024-11956,vulnerability--a763fae5-a2a3-4834-b94e-225cb20036fe
vulnerability,CVE-2022-3365,vulnerability--b6f3e0ea-ba3d-43db-aa7d-9c2df088c4b5
vulnerability,CVE-2023-50316,vulnerability--f61ac7b6-f8af-417d-97af-c099ab9f0ec5
vulnerability,CVE-2018-9373,vulnerability--671361af-28b6-4428-8fb8-123c384a9bd6
vulnerability,CVE-2018-9378,vulnerability--a746bed4-b5cf-48ac-9d34-6f5fa821de74
vulnerability,CVE-2025-22917,vulnerability--b87ddce5-0c79-4fa9-85c8-a99548aee1a4
vulnerability,CVE-2025-22865,vulnerability--d68e0647-4c70-4eba-bf5c-88c5d39ef68b
vulnerability,CVE-2025-22217,vulnerability--a541cb35-8b8c-486f-badd-48cd7e8f71d6
vulnerability,CVE-2025-23057,vulnerability--b20c27d6-2186-4289-9d26-2c73cbd3cea5
vulnerability,CVE-2025-23055,vulnerability--de9d988a-a76a-4395-b45c-22301e896a11
vulnerability,CVE-2025-23212,vulnerability--0964ea46-8f80-433d-b884-45b097ac4ff0
vulnerability,CVE-2025-23213,vulnerability--46a85848-07b0-431a-a3c0-c5dc33c2700e
vulnerability,CVE-2025-23053,vulnerability--5172b9f1-49e3-45bd-884c-65429f5d54f4
vulnerability,CVE-2025-23385,vulnerability--0554663c-dbd7-4884-9780-5bd8dc8d65dd
vulnerability,CVE-2025-23211,vulnerability--754a8d38-5569-4e17-9643-7dd011dd8c84
vulnerability,CVE-2025-23084,vulnerability--4998f485-c003-42af-98f0-c5fb1e836933
vulnerability,CVE-2025-23056,vulnerability--d769df4e-a96b-4628-972b-8383646fed4d
vulnerability,CVE-2025-23054,vulnerability--b11725d7-ab56-497b-a5b1-5913c2f22621
vulnerability,CVE-2025-23045,vulnerability--a647cbe4-675f-48a5-b1c7-c7a07a949d76
vulnerability,CVE-2025-24478,vulnerability--e465358d-c8df-4b41-a6c9-2a07a4f6767b
vulnerability,CVE-2025-24800,vulnerability--c8b2bdf8-5ba3-4117-abd0-5949978f35cc
vulnerability,CVE-2025-24482,vulnerability--5669a9d4-9c35-4031-8607-b2d8d5136475
vulnerability,CVE-2025-24481,vulnerability--ca169a5d-d346-4574-b9c7-b8ec285187f2
vulnerability,CVE-2025-24480,vulnerability--597d3783-8054-4a67-995a-b06cd5dcb9e9
vulnerability,CVE-2025-24479,vulnerability--8f3e3f88-9fbe-4a23-81a1-8a5242517cb1
vulnerability,CVE-2025-24826,vulnerability--860d1d9f-54e7-4a4c-8f59-2366b6c3c994
vulnerability,CVE-2025-24810,vulnerability--743c225a-7689-41cc-aa00-1b7fcbdc1f52
vulnerability,CVE-2025-0752,vulnerability--d4806e58-68c2-42a9-8eef-7ad51307f9b3
vulnerability,CVE-2025-0750,vulnerability--e4c0aab9-89e0-4e90-962f-2d94d2dd79d7
vulnerability,CVE-2025-0631,vulnerability--6f805686-5c0e-4bbd-b01e-595eb52a1c58
vulnerability,CVE-2025-0736,vulnerability--7b571a26-b42e-4067-bd03-1aee757dfa54
vulnerability,CVE-2025-0321,vulnerability--765a0486-47b7-4cd8-a45d-4c1e98e32d66
vulnerability,CVE-2025-0659,vulnerability--8b490217-2bde-4bbe-92d7-e5d1f3c93ab1
vulnerability,CVE-2025-0290,vulnerability--b17e9dbf-112d-4126-bcd2-ec71e2219522
vulnerability,CVE-2025-0790,vulnerability--9695f602-806d-49c0-9505-68dc01e9f02a
vulnerability,CVE-2025-0784,vulnerability--1ff0d57d-3d37-4b12-a4c3-eaa8b41eccd3
vulnerability,CVE-2025-0432,vulnerability--9d94efe3-1a3a-45f8-84a5-018b550803a7
vulnerability,CVE-2025-0788,vulnerability--4dd071a0-8c96-40d6-ba8f-70a07b7c4995
vulnerability,CVE-2025-0789,vulnerability--16c8420b-627c-47c5-b600-a948ffc9c74c
vulnerability,CVE-2025-0787,vulnerability--827d24a0-7108-4ab1-aed7-dd6cd07e9bb9
vulnerability,CVE-2025-0065,vulnerability--6b317245-9398-443d-a342-e756b47e62f4
vulnerability,CVE-2025-0754,vulnerability--f1eaa145-3221-4fb0-bff2-e5d6b9562e53
vulnerability,CVE-2025-0785,vulnerability--da8fcb71-21cc-4061-bce8-7bb25ed6c8d5
vulnerability,CVE-2025-0791,vulnerability--ad608229-d2ce-406f-85db-412c98506afd
vulnerability,CVE-2025-0781,vulnerability--610b8265-a553-4cda-a97a-1c9a2ef0583c
vulnerability,CVE-2025-0783,vulnerability--b3be04e3-3237-4674-8ea4-66bb552d3ab9
vulnerability,CVE-2025-0786,vulnerability--11fd58dc-1456-4194-bfe2-e5829baa09a2
vulnerability,CVE-2017-13318,vulnerability--e28ba1ca-9ce4-43de-befa-b2512df9ae1a
vulnerability,CVE-2017-13317,vulnerability--ec8961a3-3ab6-4b4d-930c-94210dfba25d
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ae59fe56-8354-4100-9658-41147b3d81b5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0554663c-dbd7-4884-9780-5bd8dc8d65dd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:37.944329Z",
"modified": "2025-01-29T00:36:37.944329Z",
"name": "CVE-2025-23385",
"description": "In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-23385"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ba095f11-947f-478f-b445-ee73199d8ba5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0964ea46-8f80-433d-b884-45b097ac4ff0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:37.927646Z",
"modified": "2025-01-29T00:36:37.927646Z",
"name": "CVE-2025-23212",
"description": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-23212"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dc67922f-f8d5-4eee-b65a-78a3a22557b7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0eb192d5-ef6a-49b2-976d-fa9e6244e144",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:27.561837Z",
"modified": "2025-01-29T00:36:27.561837Z",
"name": "CVE-2024-27263",
"description": "IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to obtain sensitive information from the dashboard UI using man in the middle techniques.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-27263"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--35f01f9c-404f-4591-b6a6-53b84eb342fc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f3d92cf-c689-4d5c-a5df-52b0773f1c2d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:27.938224Z",
"modified": "2025-01-29T00:36:27.938224Z",
"name": "CVE-2024-57376",
"description": "Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57376"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b9ea891d-adb4-4511-8250-0899fce77b39",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--11fd58dc-1456-4194-bfe2-e5829baa09a2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:38.071636Z",
"modified": "2025-01-29T00:36:38.071636Z",
"name": "CVE-2025-0786",
"description": "A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0786"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--86d93f67-9805-489a-a177-391ed55bbbcd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--148e36b5-adf6-4fad-bf91-45a82c3082d5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:29.259373Z",
"modified": "2025-01-29T00:36:29.259373Z",
"name": "CVE-2024-0140",
"description": "NVIDIA RAPIDS contains a vulnerability in cuDF and cuML, where a user could cause a deserialization of untrusted data issue. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, and information disclosure.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0140"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--80680242-137a-43c2-b7a6-d53c6a3e70b5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16c8420b-627c-47c5-b600-a948ffc9c74c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:38.048684Z",
"modified": "2025-01-29T00:36:38.048684Z",
"name": "CVE-2025-0789",
"description": "A vulnerability classified as critical has been found in ESAFENET CDG V5. This affects an unknown part of the file /doneDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0789"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--350eb262-cc3b-4bcb-b505-69ce4b74b7f6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18854a93-ebaa-4e96-9738-22aefd291642",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:28.948142Z",
"modified": "2025-01-29T00:36:28.948142Z",
"name": "CVE-2024-40649",
"description": "In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40649"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d3fdf0b4-fa2e-4505-a613-a7f6c950af8e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ae1c734-3814-4576-8e84-0bf358cfe87a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:28.924104Z",
"modified": "2025-01-29T00:36:28.924104Z",
"name": "CVE-2024-40669",
"description": "In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-40669"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--eda9acd1-4192-4b04-9f16-1844cb01084f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ff0d57d-3d37-4b12-a4c3-eaa8b41eccd3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T00:36:38.035919Z",
"modified": "2025-01-29T00:36:38.035919Z",
"name": "CVE-2025-0784",
"description": "A vulnerability has been found in Intelbras InControl up to 2.21.58 and classified as problematic. This vulnerability affects unknown code of the file /v1/usuario/ of the component Registered User Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.59 is able to address this issue. It is recommended to upgrade the affected component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0784"
}
]
}
]
}
Loading

0 comments on commit be295cf

Please sign in to comment.