Skip to content

Commit

Permalink
generated content from 2024-12-09
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 9, 2024
1 parent 18b4418 commit 8f78a0d
Show file tree
Hide file tree
Showing 8 changed files with 161 additions and 0 deletions.
7 changes: 7 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -258966,3 +258966,10 @@ vulnerability,CVE-2024-53143,vulnerability--4a4f946a-2758-43e9-977c-7794bd00c882
vulnerability,CVE-2024-8679,vulnerability--f3c89f97-0403-4b0c-8e34-f112a3040b9a
vulnerability,CVE-2024-41762,vulnerability--a918f4ce-2146-495d-b155-e47650a0eab4
vulnerability,CVE-2024-37071,vulnerability--80c47cec-4987-442a-aaf4-75044906e6c5
vulnerability,CVE-2024-12347,vulnerability--6ee0ad66-c757-482a-afe3-b5a6eda1549e
vulnerability,CVE-2024-12342,vulnerability--dc195c41-3407-4bd3-9d3e-24b5bf86731a
vulnerability,CVE-2024-12209,vulnerability--2bf132c5-a433-4506-ac96-4d167c98535f
vulnerability,CVE-2024-12344,vulnerability--f85f90b0-3ce0-49c3-bbbb-388eca2f6d66
vulnerability,CVE-2024-12343,vulnerability--0f534581-07e9-4d8b-b2c6-ba6f1c810a8a
vulnerability,CVE-2024-12346,vulnerability--8b3b53e1-002b-45a5-86ed-4522489ba239
vulnerability,CVE-2024-55560,vulnerability--e8a4792b-3f99-43f9-9e19-692590a349e4
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cadec9f9-f20b-4ccc-a935-4d0d02838a56",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f534581-07e9-4d8b-b2c6-ba6f1c810a8a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-09T00:23:35.456556Z",
"modified": "2024-12-09T00:23:35.456556Z",
"name": "CVE-2024-12343",
"description": "A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12343"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--810b433b-7998-42b8-81d5-f73fd9634a4e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2bf132c5-a433-4506-ac96-4d167c98535f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-09T00:23:35.444143Z",
"modified": "2024-12-09T00:23:35.444143Z",
"name": "CVE-2024-12209",
"description": "The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12209"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--547c3756-5536-40c9-b149-1a03779fadbb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--6ee0ad66-c757-482a-afe3-b5a6eda1549e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-09T00:23:35.429921Z",
"modified": "2024-12-09T00:23:35.429921Z",
"name": "CVE-2024-12347",
"description": "A vulnerability was found in Guangzhou Huayi Intelligent Technology Jeewms up to 1.0.0 and classified as critical. This issue affects some unknown processing of the file /jeewms_war/webpage/system/druid/index.html of the component Druid Monitoring Interface. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12347"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3160586a-4575-45fd-a8a3-925931cf2c59",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--8b3b53e1-002b-45a5-86ed-4522489ba239",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-09T00:23:35.45942Z",
"modified": "2024-12-09T00:23:35.45942Z",
"name": "CVE-2024-12346",
"description": "A vulnerability has been found in Talentera up to 20241128 and classified as problematic. This vulnerability affects unknown code of the file /app/control/byt_cv_manager. The manipulation of the argument redirect_url leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The provided PoC only works in Mozilla Firefox. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12346"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--041784c4-2ceb-4294-9890-ce58ff0475e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--dc195c41-3407-4bd3-9d3e-24b5bf86731a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-09T00:23:35.44058Z",
"modified": "2024-12-09T00:23:35.44058Z",
"name": "CVE-2024-12342",
"description": "A vulnerability was found in TP-Link VN020 F3v(T) TT_V6.2.1021. It has been rated as critical. This issue affects some unknown processing of the file /control/WANIPConnection of the component Incomplete SOAP Request Handler. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12342"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--49a00a28-2951-4668-aba8-f2fae640bc10",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--e8a4792b-3f99-43f9-9e19-692590a349e4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-09T00:23:36.868468Z",
"modified": "2024-12-09T00:23:36.868468Z",
"name": "CVE-2024-55560",
"description": "MailCleaner before 28d913e has default values of ssh_host_dsa_key, ssh_host_rsa_key, and ssh_host_ed25519_key that persist after installation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-55560"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--81823e97-eb75-4760-8a9c-633b0715286f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--f85f90b0-3ce0-49c3-bbbb-388eca2f6d66",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-12-09T00:23:35.45082Z",
"modified": "2024-12-09T00:23:35.45082Z",
"name": "CVE-2024-12344",
"description": "A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-12344"
}
]
}
]
}

0 comments on commit 8f78a0d

Please sign in to comment.