Skip to content

Commit

Permalink
generated content from 2025-01-14
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 14, 2025
1 parent 759d737 commit b87782e
Show file tree
Hide file tree
Showing 110 changed files with 2,507 additions and 0 deletions.
109 changes: 109 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263253,3 +263253,112 @@ vulnerability,CVE-2024-11497,vulnerability--1915d76b-deb0-4941-97b7-913baef2a839
vulnerability,CVE-2024-11863,vulnerability--a9cdf90e-65e8-4180-a01a-a6d5063d05ed
vulnerability,CVE-2024-7344,vulnerability--9d69bee6-c563-4bdc-b0fb-3bc188e1313a
vulnerability,CVE-2024-12988,vulnerability--510ba412-b7d7-4bb6-850d-aebb42cdd4ab
vulnerability,CVE-2023-37937,vulnerability--9240fe36-0078-4747-8873-9d9d3a4909c2
vulnerability,CVE-2023-37931,vulnerability--0387bce3-bf7c-4ceb-9eb0-6875816206ba
vulnerability,CVE-2023-37936,vulnerability--df17fc6d-62fd-48fe-991c-a8ac8da0a6f7
vulnerability,CVE-2023-42785,vulnerability--cd21baec-1693-492d-8820-bf24f1a10b4a
vulnerability,CVE-2023-42786,vulnerability--f576f870-8eac-4980-9eea-4a79d0fc44a9
vulnerability,CVE-2023-46715,vulnerability--5c753068-3ce6-4df2-b2c5-e35e01655db4
vulnerability,CVE-2024-21758,vulnerability--44afb7e1-5e6e-474a-bc9b-cf15a5780284
vulnerability,CVE-2024-21797,vulnerability--0df60211-c2c6-40b4-9b8a-ad90d12d6c4b
vulnerability,CVE-2024-56497,vulnerability--b1c8d9cc-b796-45f6-bb66-488d146d66ca
vulnerability,CVE-2024-48886,vulnerability--94740c97-ba32-400d-bc25-1a112f1d4f2d
vulnerability,CVE-2024-48893,vulnerability--aeff20c0-f580-4a77-b3ce-434fc195b855
vulnerability,CVE-2024-48884,vulnerability--8506902b-bb2f-45f5-b116-9f6fbf344ea5
vulnerability,CVE-2024-48890,vulnerability--738f7b62-0d57-45ca-88d8-5a244a43591f
vulnerability,CVE-2024-32115,vulnerability--0f57fb9e-1aa4-44e5-82ff-92fa7bd54a18
vulnerability,CVE-2024-37184,vulnerability--e2011bce-3439-4e25-91fe-05a1885b8b56
vulnerability,CVE-2024-37186,vulnerability--49f9ed46-bcd9-4b6b-8a5f-3ad3edb23469
vulnerability,CVE-2024-37357,vulnerability--b8d0c3c3-9f62-4f1e-9ece-2c37fef2365e
vulnerability,CVE-2024-23106,vulnerability--1fbbd250-7ad7-4628-8d5c-4ce3bd1ead89
vulnerability,CVE-2024-35277,vulnerability--1f2833f5-752a-45cb-9545-93a005c0104e
vulnerability,CVE-2024-35275,vulnerability--dfeec6e9-0cde-45db-b05a-ed8e6fd6e5f2
vulnerability,CVE-2024-35278,vulnerability--ed0c1998-31ca-470e-a235-e7e32b51092d
vulnerability,CVE-2024-35276,vulnerability--01879d11-aa87-4a1f-96cf-23f5d3c18df3
vulnerability,CVE-2024-35273,vulnerability--5f274eb3-eadd-42f1-aeeb-ad43fff3217f
vulnerability,CVE-2024-40587,vulnerability--edc62c58-856b-4413-95ac-cba70a1c9c06
vulnerability,CVE-2024-50566,vulnerability--cf83d36b-bb78-4d00-8c49-91aee9cef621
vulnerability,CVE-2024-50564,vulnerability--0945c435-7fe9-466b-b1c3-15f98c65d2a5
vulnerability,CVE-2024-55593,vulnerability--04013cb6-4f6a-41b8-bb27-802e3eb6910f
vulnerability,CVE-2024-55591,vulnerability--61539f22-8196-44b1-87bb-a6fd51af951c
vulnerability,CVE-2024-39602,vulnerability--89c45123-c1e6-4e3d-a55c-c994ee1ccf07
vulnerability,CVE-2024-39793,vulnerability--073ca2a5-aac0-4673-8e0d-122fe4ac294b
vulnerability,CVE-2024-39763,vulnerability--e9474c36-07ce-42fe-b1d0-031e09b57e21
vulnerability,CVE-2024-39787,vulnerability--de07e1f3-f7a3-4c71-b773-042f3bab8498
vulnerability,CVE-2024-39782,vulnerability--b33e0302-562d-4227-9c32-623b9fd234ba
vulnerability,CVE-2024-39774,vulnerability--8583ef6c-ea21-4dd3-a8d6-cfcbb98e0c28
vulnerability,CVE-2024-39770,vulnerability--61f9082f-338c-4d57-8aef-d1f3a237fea9
vulnerability,CVE-2024-39370,vulnerability--6a84791a-b966-44d5-b129-a72f258a8bf2
vulnerability,CVE-2024-39762,vulnerability--0c4c510d-05db-452b-bf8e-3355d0e50c98
vulnerability,CVE-2024-39803,vulnerability--31f64418-1434-4e74-bad4-6ca12a4cf691
vulnerability,CVE-2024-39781,vulnerability--c257b1d6-af02-49dd-a1c4-c0d09455dc7c
vulnerability,CVE-2024-39288,vulnerability--6d909d37-aeea-4be6-8002-b55d48ac1926
vulnerability,CVE-2024-39773,vulnerability--a6849fd4-24ce-4f35-beb4-c5d6aac85118
vulnerability,CVE-2024-39756,vulnerability--33619078-358d-4f1e-b0d9-9bdc04e4a418
vulnerability,CVE-2024-39783,vulnerability--d976fdb0-40fd-4b89-9027-772c7cc2372e
vulnerability,CVE-2024-39760,vulnerability--cfc7ee6a-aea1-432d-b83f-9f598fd70f6c
vulnerability,CVE-2024-39788,vulnerability--4af8ec29-efbd-4eb3-aa5b-9010c8f12f96
vulnerability,CVE-2024-39757,vulnerability--50c93691-f216-4506-af24-8eeca3152a53
vulnerability,CVE-2024-39299,vulnerability--11e49fca-df96-4443-b2b1-e5388d089f87
vulnerability,CVE-2024-39367,vulnerability--c0daa1b2-db2d-48bf-b52d-aa884ad10c11
vulnerability,CVE-2024-39790,vulnerability--911fd3e2-17f6-4b4f-b190-59d22117b64c
vulnerability,CVE-2024-39294,vulnerability--32da4cdc-934a-4e9b-887c-4344f2cc5b32
vulnerability,CVE-2024-39759,vulnerability--9b4824f6-dfdd-4f39-9be3-086cdda224ed
vulnerability,CVE-2024-39789,vulnerability--394dbb74-6130-484f-80b5-0ecbb03bfe9f
vulnerability,CVE-2024-39761,vulnerability--47409718-854c-435e-b23a-e3d5fd383de5
vulnerability,CVE-2024-39802,vulnerability--8b15c707-ba86-4bfa-b9cf-7f9c59a48b7e
vulnerability,CVE-2024-39357,vulnerability--f6c96b1a-7c3f-4e6d-93de-fc69bb0041f7
vulnerability,CVE-2024-39784,vulnerability--14bc42ea-9858-47f1-bcb7-018fe2eefa27
vulnerability,CVE-2024-39799,vulnerability--1bb5ec30-a064-4945-af82-6905c83c7ec6
vulnerability,CVE-2024-39786,vulnerability--eae8c672-7ae7-4f6f-a4e0-e98ab351d4b2
vulnerability,CVE-2024-39800,vulnerability--f1fbaa1c-f71e-47f5-a1ce-a5000220b7f1
vulnerability,CVE-2024-39754,vulnerability--f8778ad5-c214-4e1c-87d9-b6c98c35cac4
vulnerability,CVE-2024-39765,vulnerability--69924207-d453-4508-82c9-4d8e682ffa49
vulnerability,CVE-2024-39764,vulnerability--ed4b4180-53d2-4d92-a054-53d4c3e8b155
vulnerability,CVE-2024-39785,vulnerability--f1ea3af0-1db5-4fc3-8711-57fe84ff60b4
vulnerability,CVE-2024-39359,vulnerability--053b1846-f83e-4846-803d-64923b8648ab
vulnerability,CVE-2024-39280,vulnerability--1b25999a-5402-40fe-8154-9a9922070978
vulnerability,CVE-2024-39795,vulnerability--8c78b103-7d9f-4d2f-90bc-a754c7ac9d23
vulnerability,CVE-2024-39768,vulnerability--1f438ea6-597f-411d-a05e-7e9053f27cec
vulnerability,CVE-2024-39360,vulnerability--a26fa63d-a74a-4151-84f7-e031a1211c15
vulnerability,CVE-2024-39363,vulnerability--741e3439-dc55-46ae-b1f8-1c002b18c731
vulnerability,CVE-2024-39608,vulnerability--1b8fd896-9087-4ccc-8d41-847bbe35da57
vulnerability,CVE-2024-39769,vulnerability--17375adf-a92a-44ca-97da-31fad7d7f4e0
vulnerability,CVE-2024-39798,vulnerability--e581d2a4-452e-4d59-bfe6-b3c931ff858d
vulnerability,CVE-2024-39794,vulnerability--afdbcd1e-922c-4a22-bea4-88c9a966886f
vulnerability,CVE-2024-39604,vulnerability--f35ec441-1c2d-46a9-a93f-281a60217113
vulnerability,CVE-2024-39801,vulnerability--3d3dfae1-a3ab-49a1-8879-e797699b95b5
vulnerability,CVE-2024-39273,vulnerability--a9cd0b60-25c3-4c3e-9146-203c5d36c4a1
vulnerability,CVE-2024-39603,vulnerability--110330a9-83ea-4ee9-a9eb-50211dc89f43
vulnerability,CVE-2024-39358,vulnerability--aa874a49-9ace-4f05-ad69-fa8b16d3b296
vulnerability,CVE-2024-27778,vulnerability--87762d9a-c24c-4210-b4c9-bcf268c85ba2
vulnerability,CVE-2024-52967,vulnerability--7083bb46-c1d0-4cb3-8aed-b9ee67cd314f
vulnerability,CVE-2024-52963,vulnerability--19b24a21-04ac-4f41-b9e3-dc4848e55232
vulnerability,CVE-2024-52969,vulnerability--09f5dab4-e182-4335-be7d-9345fda95a59
vulnerability,CVE-2024-38666,vulnerability--6d937bce-d974-4bd1-93b5-dbcf416db509
vulnerability,CVE-2024-47571,vulnerability--4159db04-55e4-4d51-808a-7a7ca94fa230
vulnerability,CVE-2024-47572,vulnerability--a8cbe72e-dd2e-41bd-ac9f-dfd9c5acc70a
vulnerability,CVE-2024-47566,vulnerability--e62abfe2-0689-41b1-9c86-7736dc838179
vulnerability,CVE-2024-45326,vulnerability--417173d3-396d-4394-b626-4d18800ca2a8
vulnerability,CVE-2024-54021,vulnerability--bfeffc0b-bc9c-4618-b6aa-32e9c495270a
vulnerability,CVE-2024-26012,vulnerability--7adbc0da-2a9d-4656-b598-d6539d1b50b9
vulnerability,CVE-2024-46668,vulnerability--f8c8389f-7776-4b9b-b10d-f0d8bf7dbf56
vulnerability,CVE-2024-46665,vulnerability--829226de-4fa3-4983-a151-444974ecd2b6
vulnerability,CVE-2024-46669,vulnerability--8184a410-3d54-4db3-8890-b4738c1f0e5b
vulnerability,CVE-2024-46670,vulnerability--800586d5-fa23-4cf7-8db0-6b87995deeff
vulnerability,CVE-2024-46664,vulnerability--506933be-d7e0-497c-b29d-8f78a4581428
vulnerability,CVE-2024-46667,vulnerability--bc62b05a-f8e2-4e0f-adfd-7e2842e86e82
vulnerability,CVE-2024-46666,vulnerability--41f22b5e-8cb2-459f-8d9b-00de7d24f463
vulnerability,CVE-2024-36512,vulnerability--d74df392-a475-426f-9194-d0d4f0ebd6db
vulnerability,CVE-2024-36493,vulnerability--58ccc962-3cb2-44bf-964a-f3b15791b294
vulnerability,CVE-2024-36290,vulnerability--ce500fc1-bee1-44f2-ab4a-c950825bdcfc
vulnerability,CVE-2024-36295,vulnerability--69dfeb85-1999-436b-a9eb-7da737a4ca52
vulnerability,CVE-2024-36272,vulnerability--a8d090b4-b8fd-41f6-97e1-8cbe2a14f7b0
vulnerability,CVE-2024-36258,vulnerability--4bdf5d89-045d-4d15-b6f7-e60af960b206
vulnerability,CVE-2024-36506,vulnerability--6551d2f8-cef5-42c8-91e4-bf18a92b3497
vulnerability,CVE-2024-36504,vulnerability--63d65f27-4619-4b58-b170-1475eb7f79c1
vulnerability,CVE-2024-36510,vulnerability--00c0daf5-2985-4993-9ebe-2aaff0e9521b
vulnerability,CVE-2024-34166,vulnerability--74af3eab-5a7c-49c7-a682-161bac0d0026
vulnerability,CVE-2024-34544,vulnerability--bcc0f955-c96a-46a9-ae48-c265d3b305f3
vulnerability,CVE-2024-33503,vulnerability--abad2219-303c-4823-8ff2-66c8532a77d2
vulnerability,CVE-2024-33502,vulnerability--17fd60de-8e28-4216-bc1d-fb9648000925
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--36621030-7b70-4b70-9511-abda41948e48",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00c0daf5-2985-4993-9ebe-2aaff0e9521b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:04.100505Z",
"modified": "2025-01-14T15:20:04.100505Z",
"name": "CVE-2024-36510",
"description": "An observable response discrepancy vulnerability [CWE-204] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, and FortiSOAR 7.5.0, 7.4.0 through 7.4.4, 7.3.0 through 7.3.2, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to enumerate valid users via observing login request responses.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-36510"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--18574734-85ab-499a-9004-b2caacd9ca54",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01879d11-aa87-4a1f-96cf-23f5d3c18df3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:02.64337Z",
"modified": "2025-01-14T15:20:02.64337Z",
"name": "CVE-2024-35276",
"description": "A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker to execute unauthorized code or commands via specially crafted packets.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-35276"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bb21a086-8fc1-46cb-bde6-83eafe1eb6f5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0387bce3-bf7c-4ceb-9eb0-6875816206ba",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:19:57.806312Z",
"modified": "2025-01-14T15:19:57.806312Z",
"name": "CVE-2023-37931",
"description": "An improper neutralization of special elements used in an sql command ('sql injection') vulnerability [CWE-88] in FortiVoice Entreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to perform a blind sql injection attack via sending crafted HTTP or HTTPS requests",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37931"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6612a602-e859-4243-8486-adcec7973131",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04013cb6-4f6a-41b8-bb27-802e3eb6910f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:03.032818Z",
"modified": "2025-01-14T15:20:03.032818Z",
"name": "CVE-2024-55593",
"description": "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWeb versions 6.3.17 through 7.6.1 allows attacker to gain information disclosure via crafted SQL queries",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-55593"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b1c1aa28-0f85-43a1-a0f0-bf8d89dc2d94",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--053b1846-f83e-4846-803d-64923b8648ab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:03.121665Z",
"modified": "2025-01-14T15:20:03.121665Z",
"name": "CVE-2024-39359",
"description": "A stack-based buffer overflow vulnerability exists in the wireless.cgi DeleteMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39359"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--da6946c6-1ee3-4837-ba88-2bd6c7c3649d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--073ca2a5-aac0-4673-8e0d-122fe4ac294b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:03.059247Z",
"modified": "2025-01-14T15:20:03.059247Z",
"name": "CVE-2024-39793",
"description": "Multiple external config control vulnerabilities exist in the nas.cgi set_nas() proftpd functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `ftp_name` POST parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39793"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d44f6564-bd89-4142-9135-d505886544d5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0945c435-7fe9-466b-b1c3-15f98c65d2a5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:02.957897Z",
"modified": "2025-01-14T15:20:02.957897Z",
"name": "CVE-2024-50564",
"description": "A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50564"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d851fdb3-19a1-49d0-bfa0-5e30eaf0fcae",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09f5dab4-e182-4335-be7d-9345fda95a59",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:03.307374Z",
"modified": "2025-01-14T15:20:03.307374Z",
"name": "CVE-2024-52969",
"description": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiSIEM ersion 7.1.7 and below, version 7.1.0, version 7.0.3 and below, version 6.7.9 and below, 6.7.8, version 6.6.5 and below, version 6.5.3 and below, version 6.4.4 and below Update/Create Case feature may allow an authenticated attacker to extract database information via crafted requests.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52969"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0df959f0-ca70-40e3-87ed-d411f9b646f2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c4c510d-05db-452b-bf8e-3355d0e50c98",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T15:20:03.070225Z",
"modified": "2025-01-14T15:20:03.070225Z",
"name": "CVE-2024-39762",
"description": "Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `netmask` POST parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39762"
}
]
}
]
}
Loading

0 comments on commit b87782e

Please sign in to comment.