Skip to content

Commit

Permalink
generated content from 2024-12-20
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 20, 2024
1 parent 504a75b commit c146755
Show file tree
Hide file tree
Showing 95 changed files with 2,162 additions and 0 deletions.
94 changes: 94 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -260698,3 +260698,97 @@ vulnerability,CVE-2022-40733,vulnerability--80643042-539a-44e4-95de-f2192d9db339
vulnerability,CVE-2023-50956,vulnerability--a7def47a-b636-4e47-b6a1-58a404958fd4
vulnerability,CVE-2023-34990,vulnerability--af1b8a2d-a0f9-45bd-9dd7-468366634f50
vulnerability,CVE-2023-21586,vulnerability--3fed3aec-0b25-427d-9228-28eddbd9038b
vulnerability,CVE-2024-51471,vulnerability--12a86d4c-59bf-470f-9a12-da29136a93fc
vulnerability,CVE-2024-51532,vulnerability--f4e9daa9-6e26-4d9d-9c89-3f1c50f14348
vulnerability,CVE-2024-52896,vulnerability--839b1dee-e34c-4d6f-a83b-25a07502fe69
vulnerability,CVE-2024-52897,vulnerability--4a77cf95-276a-4c77-8fdb-1d2d09cfd5c7
vulnerability,CVE-2024-52794,vulnerability--573f2276-a7af-44d9-acad-8de7f6a13c99
vulnerability,CVE-2024-52589,vulnerability--109d998d-7d76-4fce-aeb3-34251fb9e09c
vulnerability,CVE-2024-45818,vulnerability--d786116d-6f69-4021-9630-6cfe797b12db
vulnerability,CVE-2024-45401,vulnerability--509d5725-e8ee-464c-848c-dabc6f592af9
vulnerability,CVE-2024-45819,vulnerability--d31d7fdf-2301-47aa-a01b-f8328bb349b1
vulnerability,CVE-2024-12783,vulnerability--b7850c0e-d3fb-439c-8362-05adad0bc255
vulnerability,CVE-2024-12792,vulnerability--0639d182-fabe-4218-8626-d910af233ed7
vulnerability,CVE-2024-12788,vulnerability--d99551a3-0165-4b87-989f-571de0e0d50a
vulnerability,CVE-2024-12793,vulnerability--968eec84-265b-449f-a9cd-c13e00b6da0a
vulnerability,CVE-2024-12798,vulnerability--8b1e9570-4917-4e42-aea9-fb619c6f7531
vulnerability,CVE-2024-12331,vulnerability--48fe7085-6b25-4976-a603-f2adeca4fb9e
vulnerability,CVE-2024-12700,vulnerability--e9575d4e-7d10-4284-b27b-7679b0f08b1f
vulnerability,CVE-2024-12626,vulnerability--c1bcceb3-e1ef-4107-9369-702a7e46da30
vulnerability,CVE-2024-12569,vulnerability--e3579bc6-6f69-4e86-9b4b-a9155a7eba60
vulnerability,CVE-2024-12789,vulnerability--3b1cbff4-c141-411d-9e09-af105025074f
vulnerability,CVE-2024-12729,vulnerability--acfde247-1ad3-4dff-9cf3-3f5da05ab426
vulnerability,CVE-2024-12794,vulnerability--aabbc92d-2a56-4278-a2ee-7157f4a35b68
vulnerability,CVE-2024-12727,vulnerability--e530b50d-ebda-427d-99f1-4d4da947ca14
vulnerability,CVE-2024-12801,vulnerability--b2181c9d-c07d-4099-8ffb-db387a7274a2
vulnerability,CVE-2024-12791,vulnerability--26f677c7-004d-4037-a843-3a75d70daabb
vulnerability,CVE-2024-12786,vulnerability--84303e96-db6c-4c18-af2d-9bb890969b8e
vulnerability,CVE-2024-12560,vulnerability--828506b0-3437-42cd-ad9c-35f68a70884f
vulnerability,CVE-2024-12790,vulnerability--08d65725-420a-4cba-bf56-2a7f9e436036
vulnerability,CVE-2024-12175,vulnerability--ba053b99-9128-4a18-9729-636ea92cc80c
vulnerability,CVE-2024-12787,vulnerability--6d4fd1e0-7c9f-4b39-a834-4e0970114bc4
vulnerability,CVE-2024-12728,vulnerability--414dddfc-9a37-4f7c-8b28-e02e677a5687
vulnerability,CVE-2024-12785,vulnerability--7a2dcc77-3fe6-4fa2-a9f2-da44ae3e2043
vulnerability,CVE-2024-12121,vulnerability--5f111806-315c-4505-bdd8-b901f61b8dfa
vulnerability,CVE-2024-12782,vulnerability--76d2b44f-1cdd-4568-b99d-35d7845ed6cd
vulnerability,CVE-2024-12111,vulnerability--c98fee7f-6f81-4d76-84ca-266fc6b6a883
vulnerability,CVE-2024-12784,vulnerability--c1e559a3-da29-4882-867e-e7ed009acbc8
vulnerability,CVE-2024-12672,vulnerability--799c65a3-d062-4f6f-990b-b1333251d01d
vulnerability,CVE-2024-10244,vulnerability--c54255d0-9fe7-4ff0-b994-c34173dd1f22
vulnerability,CVE-2024-10548,vulnerability--b8b0cd94-2963-41ca-9e29-8e48d637991e
vulnerability,CVE-2024-9102,vulnerability--1ffa36fd-10bf-4b52-8d0a-32d460397d14
vulnerability,CVE-2024-9154,vulnerability--f9bb5877-89da-4c92-b267-5316778d1ebe
vulnerability,CVE-2024-9101,vulnerability--f1223fb0-1dd5-4986-8932-88947d848d78
vulnerability,CVE-2024-47093,vulnerability--bffb2b85-6304-4a02-85fc-bf006cc3cd9b
vulnerability,CVE-2024-7139,vulnerability--b83b13df-c6b8-4cb3-8178-695af5fdd391
vulnerability,CVE-2024-7138,vulnerability--7368183c-ce5f-4d06-9e1d-582c5e04d549
vulnerability,CVE-2024-7137,vulnerability--50ec9736-36ca-4f4c-9012-21a97fcd8733
vulnerability,CVE-2024-25131,vulnerability--cb0528c0-953c-4c6b-b932-d042c07af80c
vulnerability,CVE-2024-11768,vulnerability--794dc436-f7e9-4e3c-9b46-c1c46026a67a
vulnerability,CVE-2024-11616,vulnerability--75ff85d2-95e6-4be3-b75c-ef8544bb870e
vulnerability,CVE-2024-11364,vulnerability--80eb9125-ae12-48ac-8c3d-0fb081d84037
vulnerability,CVE-2024-11157,vulnerability--cedcc414-790e-4634-88de-474f73adc10b
vulnerability,CVE-2024-11740,vulnerability--53e96827-69de-48e4-b233-eb7ec51120e4
vulnerability,CVE-2024-11984,vulnerability--9376b4ae-ff3c-40ed-8a7e-9057a9ae5c2d
vulnerability,CVE-2024-53991,vulnerability--eaa856ee-ab28-469e-b591-fddc0d281ffb
vulnerability,CVE-2024-38864,vulnerability--0b6dc313-162c-428b-bffb-0692e4c6f958
vulnerability,CVE-2024-38819,vulnerability--bb21dda6-0417-4300-8a29-fc04afd5fe8c
vulnerability,CVE-2024-37962,vulnerability--820ad9eb-1a41-4bd4-8688-216a0bc76de2
vulnerability,CVE-2024-35141,vulnerability--372a8a0c-a5ac-4937-9db8-58b59b7186d9
vulnerability,CVE-2024-54984,vulnerability--6e9131e9-6613-44e4-82e7-fa4568fe5e90
vulnerability,CVE-2024-54663,vulnerability--0494934e-6727-48ca-a851-8768c3826500
vulnerability,CVE-2024-54982,vulnerability--f8ce61eb-b59c-42c2-a163-f2706f5909ec
vulnerability,CVE-2024-54790,vulnerability--0fbe0487-0254-4ee7-9d64-04327bc4f40a
vulnerability,CVE-2024-54983,vulnerability--56b73ddb-ab86-4665-879d-bcff1c74de3e
vulnerability,CVE-2024-54009,vulnerability--c16948c6-7c5c-49fe-92d1-6bd02b8db2d6
vulnerability,CVE-2024-54150,vulnerability--fa7c2765-a35b-4dd3-bb09-d6e2eb3317cb
vulnerability,CVE-2024-55196,vulnerability--84b28320-2ca2-494f-9ab7-4726db0f4b52
vulnerability,CVE-2024-55082,vulnerability--84c290e3-ae05-44fb-9bcc-3a1c9cf668df
vulnerability,CVE-2024-55081,vulnerability--837ca77d-36e2-476a-af3f-a2006aa8abc8
vulnerability,CVE-2024-49336,vulnerability--91ed746c-a3fa-47e4-a333-d915ae4683c5
vulnerability,CVE-2024-49765,vulnerability--96528570-3de7-405a-aaac-8b45b3da76dd
vulnerability,CVE-2024-56159,vulnerability--ff5a2f7f-559c-411c-99ac-1514e8c7dd12
vulnerability,CVE-2024-56327,vulnerability--f8ca1b6e-1032-4503-8ad9-038a4eca5388
vulnerability,CVE-2024-56200,vulnerability--4bd7ad4f-9510-4d1c-9a3e-35427a2c116a
vulnerability,CVE-2024-2201,vulnerability--040c86bf-07ba-4dc7-8203-275301ac0546
vulnerability,CVE-2024-4230,vulnerability--a183cb99-1a24-4f1e-8efb-08b682a3dbda
vulnerability,CVE-2024-4229,vulnerability--87a908a5-dd42-4a45-8a3a-aedb56ae1cea
vulnerability,CVE-2021-39081,vulnerability--cde3e840-9b5f-48f1-ab38-7f0653079ebf
vulnerability,CVE-2021-26102,vulnerability--3fb56dbe-ebfe-4f71-9d3a-75c735d5cf5f
vulnerability,CVE-2021-26115,vulnerability--021fdcef-75ed-48d5-a579-232fbaea9ef2
vulnerability,CVE-2021-26093,vulnerability--15618042-9893-4e6a-bd0c-78aa9ae0e351
vulnerability,CVE-2021-22501,vulnerability--793c6118-358c-4b5f-8183-d863c03f2f39
vulnerability,CVE-2021-32589,vulnerability--5e762443-b34d-4613-998a-9a5b0abcebb4
vulnerability,CVE-2022-33954,vulnerability--b7f98fa7-0ff0-487b-8d64-e1850b8c4b8b
vulnerability,CVE-2022-27595,vulnerability--8e1f341d-c6b4-4756-930c-8a5cb2b3c93e
vulnerability,CVE-2022-27600,vulnerability--67ea55f8-0253-4ab7-b87b-f1da1cda7bc0
vulnerability,CVE-2023-30443,vulnerability--ff2e5cfe-f775-4d8b-9aa8-54ceece9341b
vulnerability,CVE-2023-7005,vulnerability--a7547e1f-bd01-47d0-bb36-aaf7e787b017
vulnerability,CVE-2023-23357,vulnerability--81e38fae-7ca6-46ca-b092-e231328cfa31
vulnerability,CVE-2023-23356,vulnerability--1c47b32c-d048-4e23-a44f-46874ceea808
vulnerability,CVE-2023-23354,vulnerability--3e16eb93-d154-413e-bef1-6a99e9c7ec18
vulnerability,CVE-2023-4617,vulnerability--7872bce2-37d9-487c-bb81-cf35c31c8464
vulnerability,CVE-2020-12820,vulnerability--c348fddd-0bf1-49fb-8a26-5da43e47fb6e
vulnerability,CVE-2020-12819,vulnerability--cc7c4e85-f83d-4e75-abde-f3faa9b5b884
vulnerability,CVE-2020-15934,vulnerability--931c70e6-b3f6-40d8-a349-9cc7b7490ac8
vulnerability,CVE-2020-6923,vulnerability--72f42e3c-91b3-4658-8f84-0b5497de67d3
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--30bda055-e2fc-4a00-b676-f86fbc8045d7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--021fdcef-75ed-48d5-a579-232fbaea9ef2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:07.036313Z",
"modified": "2024-12-20T00:21:07.036313Z",
"name": "CVE-2021-26115",
"description": "An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.An OS command injection (CWE-78) vulnerability in FortiWAN Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-26115"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0067268c-0f2b-454a-beda-d2832977701a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--040c86bf-07ba-4dc7-8203-275301ac0546",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:04.62627Z",
"modified": "2024-12-20T00:21:04.62627Z",
"name": "CVE-2024-2201",
"description": "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-2201"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--925df4d7-7da2-4800-b7c2-63db8fc87a99",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0494934e-6727-48ca-a851-8768c3826500",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:04.247389Z",
"modified": "2024-12-20T00:21:04.247389Z",
"name": "CVE-2024-54663",
"description": "An issue was discovered in the Webmail Classic UI in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A Local File Inclusion (LFI) vulnerability exists in the /h/rest endpoint, allowing authenticated remote attackers to include and access sensitive files in the WebRoot directory. Exploitation requires a valid auth token and involves crafting a malicious request targeting specific file paths.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54663"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--80fae854-845f-477d-a01d-6a863448ae51",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0639d182-fabe-4218-8626-d910af233ed7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:02.760914Z",
"modified": "2024-12-20T00:21:02.760914Z",
"name": "CVE-2024-12792",
"description": "A vulnerability classified as critical was found in Codezips E-Commerce Site 1.0. Affected by this vulnerability is an unknown functionality of the file newadmin.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12792"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--39b7cd2c-05d1-45ca-81ac-f1f3eba7ccef",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08d65725-420a-4cba-bf56-2a7f9e436036",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:02.796014Z",
"modified": "2024-12-20T00:21:02.796014Z",
"name": "CVE-2024-12790",
"description": "A vulnerability was found in code-projects Hostel Management Site 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file room-details.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12790"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f1e7ff86-559e-4c60-b72e-9c9236cbb5a2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b6dc313-162c-428b-bffb-0692e4c6f958",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:03.717223Z",
"modified": "2024-12-20T00:21:03.717223Z",
"name": "CVE-2024-38864",
"description": "Incorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p23, < 2.2.0p38 and <= 2.1.0p49 (EOL) allows a local attacker to read sensitive data.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38864"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--318658c2-9ee6-4387-8662-356f08ec42ee",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0fbe0487-0254-4ee7-9d64-04327bc4f40a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:04.257186Z",
"modified": "2024-12-20T00:21:04.257186Z",
"name": "CVE-2024-54790",
"description": "A SQL Injection vulnerability was found in /index.php in PHPGurukul Pre-School Enrollment System v1.0, which allows remote attackers to execute arbitrary code via the visittime parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54790"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2c616471-b362-496b-96aa-cf8d87795afd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--109d998d-7d76-4fce-aeb3-34251fb9e09c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:02.672469Z",
"modified": "2024-12-20T00:21:02.672469Z",
"name": "CVE-2024-52589",
"description": "Discourse is an open source platform for community discussion. Moderators can see the Screened emails list in the admin dashboard, and through that can learn the email of a user. This problem is patched in the latest version of Discourse. Users unable to upgrade should remove moderator role from untrusted users.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52589"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ed8614df-7c54-421a-b4fc-06c06226070a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12a86d4c-59bf-470f-9a12-da29136a93fc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:02.483448Z",
"modified": "2024-12-20T00:21:02.483448Z",
"name": "CVE-2024-51471",
"description": "IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS web console could allow an authenticated user to cause a denial-of-service when trace is enabled due to information being written into memory outside of the intended buffer size.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51471"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2060b2ad-3508-452e-b104-585a8b43d6cc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15618042-9893-4e6a-bd0c-78aa9ae0e351",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:07.050455Z",
"modified": "2024-12-20T00:21:07.050455Z",
"name": "CVE-2021-26093",
"description": "An access of uninitialized pointer (CWE-824) vulnerability in FortiWLC versions 8.6.0, 8.5.3 and earlier may allow a local and authenticated attacker to crash the access point being managed by the controller by executing a crafted CLI command.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-26093"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--18376bc2-b6b9-42e0-bb14-9cc244d6b670",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c47b32c-d048-4e23-a44f-46874ceea808",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-20T00:21:14.267519Z",
"modified": "2024-12-20T00:21:14.267519Z",
"name": "CVE-2023-23356",
"description": "A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following versions:\nQuFirewall 2.3.3 ( 2023/03/27 ) and later\n and later",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-23356"
}
]
}
]
}
Loading

0 comments on commit c146755

Please sign in to comment.