From f21e117c858bfd7a175e59559f362b3272318164 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Wed, 13 Nov 2024 00:21:15 +0000 Subject: [PATCH] generated content from 2024-11-13 --- mapping.csv | 341 ++++++++++++++++++ ...-001074ac-4ae3-4229-94ea-dace86c1c179.json | 22 ++ ...-0026fb67-9a3b-4598-a12d-d6052e3175ab.json | 22 ++ ...-0069fcab-3eb7-4cd2-b0b0-913740ab9f3f.json | 22 ++ ...-02ac4c98-8d6b-4d21-8c82-29b1be70402a.json | 22 ++ ...-03183130-b128-4f19-ace2-567986fc8183.json | 22 ++ ...-034644fc-1db3-4e2d-ad94-8a9bfcf9197f.json | 22 ++ ...-043627e3-59b0-44e8-b969-bfc0cd7dadad.json | 22 ++ ...-04755de4-fec8-4386-860d-6271c4bb7f4f.json | 22 ++ ...-04a48be3-c36d-4ea9-9632-eaef706c72cd.json | 22 ++ ...-050110ed-c513-4ad1-8c32-41a635c1b30c.json | 22 ++ ...-0524688a-e415-43c6-a443-a810b49e9b3c.json | 22 ++ ...-071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de.json | 22 ++ ...-08862ec1-e603-43e5-8c54-22c6f0512c34.json | 22 ++ ...-08cabef1-4df5-475c-9c1d-06acd67c271d.json | 22 ++ ...-093fd410-acd8-4182-acf3-fd125a0a5162.json | 22 ++ ...-0959809b-7889-4246-8da2-17e4fbe2ed2c.json | 22 ++ ...-0a04204e-fed1-4e73-a7a0-bd23d2c9bcdf.json | 22 ++ ...-0aa55ba3-e263-481e-bb79-a181d0cb7ba8.json | 22 ++ ...-0b599c25-3ee0-47de-8506-e609295ff1f6.json | 22 ++ ...-0c490060-a968-47a7-8df8-062df28db102.json | 22 ++ ...-0c801698-ee76-468a-b7d2-02dcd77e7305.json | 22 ++ ...-0ca4c694-65f3-4697-92a2-ed853dc948cf.json | 22 ++ ...-0d683d9d-d567-4793-85aa-8ab5e5d248d5.json | 22 ++ ...-0dfd86ae-c774-448a-80ff-75373c4759af.json | 22 ++ ...-0efa6760-f36b-44ca-b145-258613b5c95a.json | 22 ++ ...-0f53ba76-f1a0-4bc1-a83f-2e0b286dd3f3.json | 22 ++ ...-0f8f057d-5360-4527-91c3-eb6fe704cf3f.json | 22 ++ ...-0fddec66-8a26-4a1b-8efa-fea6cb753e47.json | 22 ++ ...-11ecff62-4c33-4ca3-88ed-ef18dcfc8206.json | 22 ++ ...-1212a1df-5b47-4bd4-99a8-bf152c79736b.json | 22 ++ ...-13266cd9-ab5f-4fd4-b309-516e4f2adb02.json | 22 ++ ...-148ef938-caec-4bb8-b0f0-1cda25ba8e88.json | 22 ++ ...-17edf8b4-fac9-49d8-a824-5cff6fd8b371.json | 22 ++ ...-18d19dd8-aec4-4197-83f4-e0a351e7ac0c.json | 22 ++ ...-1901f44f-d027-44cc-8d53-2ff75c7bc5b2.json | 22 ++ ...-19d52fc8-1f99-4cd8-ba01-2b6333023ba2.json | 22 ++ ...-1a1aea2d-a8ef-483c-9a4b-f2223771f281.json | 22 ++ ...-1a699dc2-8ea1-4c59-a585-f470059ae16c.json | 22 ++ ...-1ad39a48-420f-4943-a51a-832dca3d2fd0.json | 22 ++ ...-1c7ded7d-b681-4168-b753-ac8a98c45909.json | 22 ++ ...-1ce696f4-2b3f-40fc-bc46-466063b2ed34.json | 22 ++ ...-1cf5ed06-3f0a-4a88-9d49-742afccfd53d.json | 22 ++ ...-1d90b99a-cc17-4070-98b1-dd5d031d8cd6.json | 22 ++ ...-1d920cac-1aaa-47f2-91b1-ecebdc59fbaa.json | 22 ++ ...-1e242caa-9c8f-4729-9868-70611add1521.json | 22 ++ ...-1eb3e9ee-8bd7-4099-be90-87ce8fd03429.json | 22 ++ ...-1efa7430-123f-43c7-bf49-e01853941841.json | 22 ++ ...-21649b56-e027-4c04-8ee7-bf86c772db47.json | 22 ++ ...-218c6300-79e9-49fa-9bee-caec8c4852d2.json | 22 ++ ...-21d10593-03c4-42cd-90f3-2d66f7652481.json | 22 ++ ...-223a28db-7405-46cd-acd6-46261a4b8c57.json | 22 ++ ...-23fae757-590c-468e-9ab6-308f370ad5d7.json | 22 ++ ...-25cbc05b-265a-4188-b694-5193526e99fe.json | 22 ++ ...-25db4893-12ee-4f29-a74f-9910eb23d902.json | 22 ++ ...-2653f5f3-4ab3-4e18-8b64-567ef0d99605.json | 22 ++ ...-26e20b26-6d1b-4bfa-a65c-972c9a7403e1.json | 22 ++ ...-26fc905e-4a90-4649-aefa-527a1ebdd880.json | 22 ++ ...-27098a43-46cc-49bc-911c-24a5bb13b71d.json | 22 ++ ...-28a3b06d-7c73-47e7-b178-7b3e50ed5320.json | 22 ++ ...-290ec42d-8a9d-4eee-bc01-5115cb121310.json | 22 ++ ...-29cb0177-1c38-4441-9b90-a07b104748c8.json | 22 ++ ...-29e54b86-f0e2-4bb6-8057-fe1d3ec8e481.json | 22 ++ ...-2aea823b-c69b-4f51-be9c-2bc88ed7d835.json | 22 ++ ...-2b0d3baa-fb95-40f1-a00b-97515b0507ab.json | 22 ++ ...-2b2afed9-fedc-42fa-bac0-f004701f0f6d.json | 22 ++ ...-2d09203e-1b25-4916-b3e8-a6feb74a80ba.json | 22 ++ ...-2d51d367-bdf6-4e01-b93c-fb86dbab8e9d.json | 22 ++ ...-2f85d85c-a445-492f-a827-cd74d54eda05.json | 22 ++ ...-3045713a-135a-4f36-af7e-edf1e7add4ee.json | 22 ++ ...-30da3ad4-aedb-4ff5-bcd2-47261a9d13a5.json | 22 ++ ...-31b00ecf-1efc-4ed6-b221-0768beb6fb48.json | 22 ++ ...-32de0503-4718-4fdf-b618-b6375ebdddb1.json | 22 ++ ...-350dcff0-b0ee-4b50-b373-423bff935dd0.json | 22 ++ ...-3637b4ce-291c-43d7-8d0f-9dc1ba336f92.json | 22 ++ ...-3641e862-df09-4186-9884-ceacaafeaf8a.json | 22 ++ ...-37d80a4c-37a3-4e10-bff8-0b44f57f12fd.json | 22 ++ ...-3901419e-cf22-4c11-84cc-1bf3bbc1413f.json | 22 ++ ...-392b4d25-d353-497d-b05c-85ebebe37f29.json | 22 ++ ...-3946e5d3-3aac-4b52-987e-becce8b148c2.json | 22 ++ ...-3befe86a-316b-4990-abcd-ce306ebc91ef.json | 22 ++ ...-3ceb8d54-e4c2-47fe-affc-5648253d550a.json | 22 ++ ...-3d55683d-396f-40c6-8099-06f649478efe.json | 22 ++ ...-3e96e7f2-9978-4063-bbeb-a2a512ecfea5.json | 22 ++ ...-3fe84a4c-dd37-4fb1-b9f6-655f27ce9a8a.json | 22 ++ ...-40672686-b4de-428c-a36b-da06de10b2f4.json | 22 ++ ...-4226bfe8-cda3-49c1-80db-8bb8ac9b7154.json | 22 ++ ...-426856c3-ee11-462d-8be8-cfbc24b8f6d0.json | 22 ++ ...-43c0af8f-7e01-4435-af12-ec1716081748.json | 22 ++ ...-44a6fb28-44a9-4c1f-b978-3366fa216f22.json | 22 ++ ...-45409522-158f-44f5-b4e5-b2157aaf1249.json | 22 ++ ...-45ef9b02-c0fc-48e6-8542-2fb223d00383.json | 22 ++ ...-471e83d9-b6fc-4f5b-be7b-0f425fb4f63e.json | 22 ++ ...-47a65a05-7365-4a7c-b50b-86771e353d61.json | 22 ++ ...-47ad3cd5-dc11-4c79-9518-c4af3fb92aa0.json | 22 ++ ...-47c63eb6-5d06-4741-9f0e-cbefeea577be.json | 22 ++ ...-49de9927-6e42-42cf-8c81-f5b1721e8946.json | 22 ++ ...-4ab4b9d3-cb64-4e8c-9097-8a6756711846.json | 22 ++ ...-4b21d402-b716-4d2a-b3ad-d64e45ea991b.json | 22 ++ ...-4dbb895a-59d3-4fb3-b063-329d6ca3bffb.json | 22 ++ ...-4ee6b52f-7f47-4b7e-84b4-6c1456cb9c6e.json | 22 ++ ...-4f030a42-108d-4a11-ba80-166172d9172e.json | 22 ++ ...-4fe0881f-604e-403b-9553-11891be57d12.json | 22 ++ ...-504ddee3-8889-4007-a692-ecd7693c608f.json | 22 ++ ...-5051cc27-2d05-42fc-b703-5ce4d8092880.json | 22 ++ ...-515f577a-7bbe-47ef-9691-39b6b0a14687.json | 22 ++ ...-5230391b-6a31-472e-a0a6-d63dc3786edb.json | 22 ++ ...-53288a7e-3b87-4189-a3e3-9ab9f042abd9.json | 22 ++ ...-532b5a24-9ca7-4780-8012-62fb3ba5020b.json | 22 ++ ...-5380ee20-4896-487e-9c0e-0d97c0467cee.json | 22 ++ ...-5583c091-fc7b-4400-8cc4-973eba093eca.json | 22 ++ ...-55c99365-3cc5-40d4-8751-810107af0ffa.json | 22 ++ ...-55e8f969-21b5-4e42-914b-7ef04c62a74a.json | 22 ++ ...-55f2c19f-f22a-443b-b787-9cd2c188725f.json | 22 ++ ...-565a50ce-0cd7-4388-8883-f041366d502b.json | 22 ++ ...-5692012f-9b28-46cb-be41-e580f5c52587.json | 22 ++ ...-571e3b7d-c39b-47a6-bbd2-cf59a2fce1ba.json | 22 ++ ...-57eb971c-94bd-4433-9e3e-a082964aba1f.json | 22 ++ ...-580bc8ce-f115-424b-a2b3-3623dae09ef3.json | 22 ++ ...-58a3cf5a-5054-4129-848c-82201b1f8e49.json | 22 ++ ...-58ee2dd5-aa40-4a49-ae06-0a6ac483e17e.json | 22 ++ ...-5a76170b-670a-4f5d-b24f-2d822801b89a.json | 22 ++ ...-5aee4211-a639-4300-86d9-6f069d78c16a.json | 22 ++ ...-5c4e65b1-0606-43e6-ace2-e70cc673a939.json | 22 ++ ...-5cadbbc1-2f26-40a2-91bb-f441754eac22.json | 22 ++ ...-5f921813-1c75-4ead-82f6-afa94d76b73f.json | 22 ++ ...-622b163d-f40a-4b36-b46c-73d3ec21b464.json | 22 ++ ...-6266184b-be2b-47bb-b5a4-170cd3729425.json | 22 ++ ...-638315c0-a5a8-4430-81d7-1261ed030ec8.json | 22 ++ ...-647fd113-a933-4d1d-aa64-4f80a5022637.json | 22 ++ ...-64c805c9-d6b1-4c0f-bc14-9a9659b667ff.json | 22 ++ ...-6567d8cd-7981-4d4f-b6a5-9b6d098b4d4e.json | 22 ++ ...-661c4e92-68b0-4a79-8fc8-7e0082aaa24e.json | 22 ++ ...-66a1b6c0-023e-4b10-a926-debb3ed2be94.json | 22 ++ ...-66aa9cba-a743-46ec-86a1-e5ab6f84db19.json | 22 ++ ...-6707a637-018e-495f-a7fa-c407102696a2.json | 22 ++ ...-6791aabd-5fe1-489d-8beb-2118b16563aa.json | 22 ++ ...-68757a63-6721-45a5-bf6e-828849011ff4.json | 22 ++ ...-696833b1-005b-41b5-97dd-20a2f807008f.json | 22 ++ ...-6b97a85f-ad43-4466-a17e-a29bc91fc423.json | 22 ++ ...-6c945fcd-be54-46df-bb2f-4378c8c2c4a6.json | 22 ++ ...-6cb4dc67-0346-469d-8d30-e58c76ea881e.json | 22 ++ ...-6d8b6f41-7ed0-426a-bdcf-e148481a7527.json | 22 ++ ...-6e0974ba-a053-4e8a-8c63-ef9024152df6.json | 22 ++ ...-6e09d518-c1c4-457b-833e-9a0e4735f12a.json | 22 ++ ...-6e3510b0-2d02-44f4-a506-d5ded33236e0.json | 22 ++ ...-728c277a-710b-425f-9022-d94c73a4c055.json | 22 ++ ...-72a796f8-c6b5-4dab-b3df-9a85846189d5.json | 22 ++ ...-72b824c3-f3ff-4c15-9ac9-166819c0a979.json | 22 ++ ...-75133cdd-a7b6-468c-948e-1ab34b48e561.json | 22 ++ ...-763e1b20-7238-4e53-b6f4-53d4dc850a68.json | 22 ++ ...-76a91f49-1d17-4e12-958f-819975085abe.json | 22 ++ ...-772b9c18-af98-4823-9ff3-b46e88b7aa2f.json | 22 ++ ...-77813cc8-d3d8-490c-af24-41653a21f3fa.json | 22 ++ ...-784dcd38-c6d0-4df1-9f13-e2dba19edfb0.json | 22 ++ ...-785d5e66-460e-4001-80dd-58bb14e2f123.json | 22 ++ ...-7a7ac2b1-b7b6-4a00-b0d5-59097584a15b.json | 22 ++ ...-7bc09bcf-2cff-40a5-85ca-c8d83125da23.json | 22 ++ ...-7bef1c69-cde8-46c6-8618-c97935a17fc7.json | 22 ++ ...-7c2d8c17-dc26-4b13-b1ba-a15988d5cc6b.json | 22 ++ ...-7c5e23db-33be-48ca-a699-95a99bad9b52.json | 22 ++ ...-7cd68cda-35f2-47c7-9485-d510482e55d8.json | 22 ++ ...-7dac3159-1dcb-4e13-944a-f455de2e5d5d.json | 22 ++ ...-7e00e874-274c-4f23-aacc-fe2eb21c05bc.json | 22 ++ ...-7eb94e41-e2f9-425b-8235-e11a89a03f93.json | 22 ++ ...-7ebc731f-4f88-45bd-9ea6-5a1dbc8cfcfa.json | 22 ++ ...-7efc30ea-4076-439e-a7ac-0f92dd62263a.json | 22 ++ ...-7f908bc6-38d7-46c2-baf9-88f10d96c574.json | 22 ++ ...-802cc75f-cfbf-44c2-8355-a8244b04bc46.json | 22 ++ ...-80d28fca-113e-47f6-b17a-ec90f8730ca3.json | 22 ++ ...-819a8fc4-00bb-4854-81a4-a492a8905203.json | 22 ++ ...-820993d4-bd28-4fef-b98d-b89293f719f8.json | 22 ++ ...-8381f1af-05af-4eb4-afaf-578a7c49e3ca.json | 22 ++ ...-84104d42-849a-4bf9-9b76-ed68bc92b4a3.json | 22 ++ ...-856e0712-3654-427c-82fe-95f11312b9f7.json | 22 ++ ...-863ea478-12db-4d60-8860-94f6d45c6c5a.json | 22 ++ ...-8670f060-99d9-4638-bd00-ee9493459a66.json | 22 ++ ...-871fcc30-6821-40d7-8a7a-cfcf41fedaf3.json | 22 ++ ...-87e7b77e-2464-4ba2-8de2-2240ad122fc6.json | 22 ++ ...-8839773a-edc8-45fc-9c83-ecfe73f0ea24.json | 22 ++ ...-8a7d8d2d-dcee-4b5b-b1b5-f93a7fc977c3.json | 22 ++ ...-8abd24ab-182c-437a-8ddf-89d02b1ddbb6.json | 22 ++ ...-8ac4d058-2641-4849-ad75-c5daae42cb8a.json | 22 ++ ...-8aec430f-eade-43bf-aef1-7a350409ae56.json | 22 ++ ...-8b27fed4-17bd-42e1-b6e9-37c48ecb08c8.json | 22 ++ ...-8b4a7aa1-6afb-4ce9-ac47-f20ac055c5fa.json | 22 ++ ...-8b6d2730-0a53-4f58-a356-47cc666fddfe.json | 22 ++ ...-8ce73e56-6e05-4ec6-906d-54d6d3a8341d.json | 22 ++ ...-8f34405e-da8b-42c7-ac24-af4f3991935f.json | 22 ++ ...-8fb3e363-9f89-43db-bbc3-f024f7ac1d6f.json | 22 ++ ...-93b22c5a-b7e3-4742-8140-acd31412d5e9.json | 22 ++ ...-93cc7dc5-dd72-4abc-b2da-ee570f974acc.json | 22 ++ ...-94ef9454-fdb1-481c-984e-2c2131f72f46.json | 22 ++ ...-95357a53-5b6e-4c53-a6a2-27fc1f3bf17a.json | 22 ++ ...-95a7b821-0e17-466e-bf3c-8b82e14638c1.json | 22 ++ ...-95c45952-2cca-4d37-bdd0-6c0ffa533690.json | 22 ++ ...-95e0d916-7abc-49e3-83b7-76898d2f5f52.json | 22 ++ ...-960003f8-bc02-43dc-8965-54bd0f3221d6.json | 22 ++ ...-967b60b1-2be3-48b4-a4cf-b250e594e6b1.json | 22 ++ ...-975a0312-f028-47fc-8a28-270673c2b904.json | 22 ++ ...-97f7c328-c3e9-441a-b7d8-9c93efa38fee.json | 22 ++ ...-9817978c-f04a-49ac-aa74-07fdd5265012.json | 22 ++ ...-98b809b7-c734-45f7-a703-27f12c7686f0.json | 22 ++ ...-9990b9e0-6694-4d17-9a4d-aef4fefdc6b1.json | 22 ++ ...-9a99d717-d23f-45f2-8451-63826f334705.json | 22 ++ ...-9b5462f9-a3cb-4535-89d5-fa94007d3c87.json | 22 ++ ...-9d018067-8503-41a9-8b43-079dd789f084.json | 22 ++ ...-a0382dc0-e939-4ed5-a6a7-5559b3b1b03b.json | 22 ++ ...-a15ffed8-73c2-4f50-ac20-029012626791.json | 22 ++ ...-a21100ac-a25a-4842-9f29-a59cfc9a3b83.json | 22 ++ ...-a2dd819d-bcaa-4051-947f-3826e461c6c6.json | 22 ++ ...-a4e2153c-c538-4c1c-b2b8-e36d315ba946.json | 22 ++ ...-a4e9e35d-5e6b-4721-81c8-a802ff1b0385.json | 22 ++ ...-a4eb1201-23dd-44ee-bd9a-7371aa244c3a.json | 22 ++ ...-a55d2b54-4596-4bb7-8c6c-c1589b8293c8.json | 22 ++ ...-a57661d6-781c-4858-a4b4-d10991b12895.json | 22 ++ ...-a5cfa80e-6206-4c0d-a7e9-284c823149b9.json | 22 ++ ...-a62a92d2-5828-425d-a13f-f0daec89d9a4.json | 22 ++ ...-a7b2ccab-9767-4d8e-a4e5-7f7504c84712.json | 22 ++ ...-a7d37e21-73f7-4898-8c8d-00b8aab25947.json | 22 ++ ...-a7dc3f6d-fe26-4fad-82fc-da38ae0d3d94.json | 22 ++ ...-a9781eaf-72c9-4301-90db-8ba8c79d7068.json | 22 ++ ...-a9e468e8-111c-41f5-9831-caa27044f357.json | 22 ++ ...-ab0b4d08-6b2d-43e1-8daa-9b4986b001ff.json | 22 ++ ...-ab45a4ca-3692-45e5-8952-abdfdba95ca3.json | 22 ++ ...-abca7fdb-37b8-4043-b05d-ed9066ea5a33.json | 22 ++ ...-ac2eee53-b914-41f9-aeb6-b774445bd83e.json | 22 ++ ...-aca46458-9fc1-44de-a60c-634acb277029.json | 22 ++ ...-ae4fc22c-9b49-4ed2-ba55-1a0700625e6f.json | 22 ++ ...-ae9ae53f-d095-4af3-9037-04ab6505dfa3.json | 22 ++ ...-afd5f4fa-a03e-49c6-b3ea-2185bde7d575.json | 22 ++ ...-b00b8199-c7c6-4e84-9567-f1c3131e1157.json | 22 ++ ...-b0cc991e-e240-4023-b7b1-3e916fbb4a6d.json | 22 ++ ...-b1344162-71e1-4d3b-a782-570359eb51a1.json | 22 ++ ...-b1fda952-3945-4c67-a43f-15220f6732ab.json | 22 ++ ...-b2d17cf2-8a33-46f9-bf64-0b0504796cc7.json | 22 ++ ...-b3dd53ce-650c-4558-9c1b-818f564293c5.json | 22 ++ ...-b40b1570-6b01-496a-a613-19d98443f1a3.json | 22 ++ ...-b46f35d5-a759-4d31-a732-89637be6229b.json | 22 ++ ...-b51b45f2-2fc6-40d1-8078-1e8c396b3510.json | 22 ++ ...-b68c835a-d5aa-4885-985e-1bd558a30610.json | 22 ++ ...-b7962680-89f7-405f-8324-26d9f71c918e.json | 22 ++ ...-b925914e-e6f5-46a9-aa46-1cd7dbfd4518.json | 22 ++ ...-ba908d66-cc37-4b63-9535-6ab10ea9e9bf.json | 22 ++ ...-bab5919e-c707-4183-bbd5-ef0f40bea99b.json | 22 ++ ...-bab8acd7-f159-480d-a49a-48d7d7ba9a67.json | 22 ++ ...-bb646117-2d16-4e80-ba98-b024285f737a.json | 22 ++ ...-bbea4377-7519-4a0b-8229-5cbb73d9c3b8.json | 22 ++ ...-bcd7f009-972c-48b5-b11c-0671a843c1b6.json | 22 ++ ...-bcd8c1b9-7724-45f5-b7d4-ecd375427ccd.json | 22 ++ ...-bd820712-3638-4597-9c33-196053fec9db.json | 22 ++ ...-bd960bdc-0e61-407a-9b23-8248175e3600.json | 22 ++ ...-be0bca73-51ce-4ce6-b6c1-1575f015df09.json | 22 ++ ...-be2e234b-0d19-4e8d-9ae6-1cda580939b5.json | 22 ++ ...-bfb918c7-02eb-454c-bd75-3ea201f5b832.json | 22 ++ ...-c471e26d-1892-4fbb-9657-ce3770ab3d71.json | 22 ++ ...-c4754f98-d326-4c7a-9924-94a35c260c4d.json | 22 ++ ...-c50932fe-80e5-4441-8478-1b0be8570367.json | 22 ++ ...-c566103e-619c-4bf5-919e-633ae21b5a2c.json | 22 ++ ...-c5e8778e-c00c-4125-83cb-a0f2bdfa3193.json | 22 ++ ...-c5fedf50-8e23-4c87-b54c-101884f35b54.json | 22 ++ ...-c6240f40-dc79-4800-be89-a19bda088744.json | 22 ++ ...-c6b96f49-cb1d-430d-9c24-309431714fdc.json | 22 ++ ...-c7b7fb1c-0789-4a31-b3db-4c12ba950013.json | 22 ++ ...-c84d6f87-d092-4a61-b20e-530a2c81e1a1.json | 22 ++ ...-c897949e-fee8-48f8-bb35-e463f6d51f14.json | 22 ++ ...-c8c2dbf7-6612-4ddf-ae04-5ffee0d3a550.json | 22 ++ ...-c9def297-8907-4888-bdd3-ca936a5e3c7e.json | 22 ++ ...-cad1bace-cabe-46f4-b57e-8c6a1c7c68ef.json | 22 ++ ...-cb84c350-ea87-4f35-a5ab-712504351d3a.json | 22 ++ ...-cbb70ff9-124f-4ea4-88f8-9cea9ddacbce.json | 22 ++ ...-ce30ac9a-df41-447b-9b45-8ebedb6b0b0d.json | 22 ++ ...-ceae359c-cc22-442f-a542-5e126f1b204e.json | 22 ++ ...-cf13d698-f37a-4663-841b-8b3eea074f9a.json | 22 ++ ...-d0e692b0-f1aa-4cb6-8717-d3b0b65e6a58.json | 22 ++ ...-d1145c42-7c2a-4f5d-889e-10de0bd236c9.json | 22 ++ ...-d13f5a46-62aa-4066-9da5-788a7c572e4b.json | 22 ++ ...-d4aef99d-da8d-47f4-b2e2-bac57bcec7ff.json | 22 ++ ...-d4b60e6c-6a33-4762-bc49-0b567bd87b76.json | 22 ++ ...-d5ddaad8-e133-4c11-96fc-30c55a2a0191.json | 22 ++ ...-d6cad59b-61d0-4d87-ab5c-1d2a99232340.json | 22 ++ ...-d73a97a5-9f3f-4c7d-a197-3177ade05a41.json | 22 ++ ...-d80340d7-0dbf-4f72-a991-e11859c10007.json | 22 ++ ...-d8968b18-2ca4-4342-82cb-57ca275c6d4c.json | 22 ++ ...-d8b825f0-bd90-484f-b6aa-52f5075d0cc3.json | 22 ++ ...-d9293001-ab4b-4ebf-b8fb-39960bbe3a8d.json | 22 ++ ...-d92d95f9-2c04-41c5-8c61-f98c5122b701.json | 22 ++ ...-da2b45f2-8fa8-44fc-bf71-9d61dff90b2d.json | 22 ++ ...-da8182cb-6ca3-47c7-956a-2f2466a94b8a.json | 22 ++ ...-dbcb7bdc-4394-4903-a4a6-ab41e7a76cb3.json | 22 ++ ...-dc01ba92-b64a-4d48-bd09-e42c0549a251.json | 22 ++ ...-dc212d2e-b914-4be6-a858-4e6197f0c3d5.json | 22 ++ ...-dc324211-511c-4b32-a9f6-d4a997fb2b7e.json | 22 ++ ...-dc408d81-cff8-4fe1-9cb1-447048555a72.json | 22 ++ ...-dd3c34cc-ae1e-4f89-949d-0f4c69d2017f.json | 22 ++ ...-ddd52939-e79b-450e-a85b-ed0694b4c702.json | 22 ++ ...-e07200a3-ad5e-4554-99f9-b6a5f26c213d.json | 22 ++ ...-e08d03dd-7866-41a2-af78-d75ba05af7c0.json | 22 ++ ...-e090ca1a-bddd-47ee-ad23-7798fb7614af.json | 22 ++ ...-e27a0369-262f-48c8-ab70-96b741a56be1.json | 22 ++ ...-e3270cf9-6ab9-4ae7-97fe-68117214729e.json | 22 ++ ...-e3947adc-25cb-40cd-b06a-e98b4c2ac1b4.json | 22 ++ ...-e40d0b4e-99f6-4927-ad9e-ff57e8f11310.json | 22 ++ ...-e528ddf5-b6bd-4455-b7c8-316a9617cd5a.json | 22 ++ ...-e568d228-dc55-4c15-b96f-79101da27ab7.json | 22 ++ ...-e6483c26-71b5-4aba-9985-62983c3bf045.json | 22 ++ ...-e7f09a49-10ab-4950-aeab-fba306860b1d.json | 22 ++ ...-e8ffcdf5-96c9-4524-8afe-603295c480ab.json | 22 ++ ...-e9259a3d-030c-47fd-81d5-a48694bade51.json | 22 ++ ...-e9b966b7-c438-41bf-b37e-3a3fdc32f5b2.json | 22 ++ ...-ea5eccd9-044d-4265-ae81-bd26b785125c.json | 22 ++ ...-ec0fed9d-f4fd-4bea-a82a-9b1e155addec.json | 22 ++ ...-ec368531-1131-4b3d-9bb8-16a04511a557.json | 22 ++ ...-ecc38d4a-ccd0-4594-9cce-b1320db57f2f.json | 22 ++ ...-eccb6415-a545-4335-9dea-c3fa772895d1.json | 22 ++ ...-ed752481-0158-44a1-9d35-96252991e611.json | 22 ++ ...-edabb666-64c9-4a8e-b63b-176a733c3387.json | 22 ++ ...-ef0c04e2-c20f-4b6d-bde9-36e59a9c6ccc.json | 22 ++ ...-ef6322cd-5620-41a1-a6b7-3d54e1c5bca8.json | 22 ++ ...-f1c0e401-cd81-4e4d-b583-0c7a01176691.json | 22 ++ ...-f1e663af-47f3-4fa2-bad1-e28dfb32f693.json | 22 ++ ...-f26db443-67df-4bcb-b865-f91eda81c3c0.json | 22 ++ ...-f33664b4-8e82-4d66-8db0-09537b805647.json | 22 ++ ...-f385a1d3-7704-40ea-9c72-760d45e7bd57.json | 22 ++ ...-f3a7ad26-3bb0-46ba-92ff-9beee62bf8ac.json | 22 ++ ...-f4847043-ba15-47a6-8e32-996cc2c8f8d0.json | 22 ++ ...-f4b0245c-75f4-4aa4-81e2-a17c3602f351.json | 22 ++ ...-f51253e6-2d7e-429b-a380-f05090e3b53b.json | 22 ++ ...-f58fbba1-23e9-4645-94eb-fd8355ffd2c2.json | 22 ++ ...-f688ce26-c5ad-4d59-b54c-849079f73c8f.json | 22 ++ ...-f709efd0-3a14-4e23-ad75-11513c5ba8e3.json | 22 ++ ...-f74f79bb-bc47-4534-886e-5c509a7f12e4.json | 22 ++ ...-f7a856f0-2596-417b-924c-88c630873d20.json | 22 ++ ...-f841ccf1-d10b-4d58-943e-14caa84ff4cb.json | 22 ++ ...-f87aac57-b256-4019-9063-535184b11eff.json | 22 ++ ...-fa3cf72b-a7d4-4dd1-8acb-1eb08bd2ddfa.json | 22 ++ ...-faeb4115-48ae-4d39-a065-099a7263a070.json | 22 ++ ...-fbc96916-45f1-4cc3-bdd2-d8c9ed5aff8d.json | 22 ++ ...-fc38c850-4133-49d1-9bf4-d0c9941becd1.json | 22 ++ ...-fde0f482-7365-4d21-a8c1-f2d1a2bbc49e.json | 22 ++ ...-fdfbc83d-0cd3-47ab-817c-444016d57d80.json | 22 ++ ...-fef2024f-4808-4b18-a224-be90742382c9.json | 22 ++ 342 files changed, 7843 insertions(+) create mode 100644 objects/vulnerability/vulnerability--001074ac-4ae3-4229-94ea-dace86c1c179.json create mode 100644 objects/vulnerability/vulnerability--0026fb67-9a3b-4598-a12d-d6052e3175ab.json create mode 100644 objects/vulnerability/vulnerability--0069fcab-3eb7-4cd2-b0b0-913740ab9f3f.json create mode 100644 objects/vulnerability/vulnerability--02ac4c98-8d6b-4d21-8c82-29b1be70402a.json create mode 100644 objects/vulnerability/vulnerability--03183130-b128-4f19-ace2-567986fc8183.json create mode 100644 objects/vulnerability/vulnerability--034644fc-1db3-4e2d-ad94-8a9bfcf9197f.json create mode 100644 objects/vulnerability/vulnerability--043627e3-59b0-44e8-b969-bfc0cd7dadad.json create mode 100644 objects/vulnerability/vulnerability--04755de4-fec8-4386-860d-6271c4bb7f4f.json create mode 100644 objects/vulnerability/vulnerability--04a48be3-c36d-4ea9-9632-eaef706c72cd.json create mode 100644 objects/vulnerability/vulnerability--050110ed-c513-4ad1-8c32-41a635c1b30c.json create mode 100644 objects/vulnerability/vulnerability--0524688a-e415-43c6-a443-a810b49e9b3c.json create mode 100644 objects/vulnerability/vulnerability--071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de.json create mode 100644 objects/vulnerability/vulnerability--08862ec1-e603-43e5-8c54-22c6f0512c34.json create mode 100644 objects/vulnerability/vulnerability--08cabef1-4df5-475c-9c1d-06acd67c271d.json create mode 100644 objects/vulnerability/vulnerability--093fd410-acd8-4182-acf3-fd125a0a5162.json create mode 100644 objects/vulnerability/vulnerability--0959809b-7889-4246-8da2-17e4fbe2ed2c.json create mode 100644 objects/vulnerability/vulnerability--0a04204e-fed1-4e73-a7a0-bd23d2c9bcdf.json create mode 100644 objects/vulnerability/vulnerability--0aa55ba3-e263-481e-bb79-a181d0cb7ba8.json create mode 100644 objects/vulnerability/vulnerability--0b599c25-3ee0-47de-8506-e609295ff1f6.json create mode 100644 objects/vulnerability/vulnerability--0c490060-a968-47a7-8df8-062df28db102.json create mode 100644 objects/vulnerability/vulnerability--0c801698-ee76-468a-b7d2-02dcd77e7305.json create mode 100644 objects/vulnerability/vulnerability--0ca4c694-65f3-4697-92a2-ed853dc948cf.json create mode 100644 objects/vulnerability/vulnerability--0d683d9d-d567-4793-85aa-8ab5e5d248d5.json create mode 100644 objects/vulnerability/vulnerability--0dfd86ae-c774-448a-80ff-75373c4759af.json create mode 100644 objects/vulnerability/vulnerability--0efa6760-f36b-44ca-b145-258613b5c95a.json create mode 100644 objects/vulnerability/vulnerability--0f53ba76-f1a0-4bc1-a83f-2e0b286dd3f3.json create mode 100644 objects/vulnerability/vulnerability--0f8f057d-5360-4527-91c3-eb6fe704cf3f.json create mode 100644 objects/vulnerability/vulnerability--0fddec66-8a26-4a1b-8efa-fea6cb753e47.json create mode 100644 objects/vulnerability/vulnerability--11ecff62-4c33-4ca3-88ed-ef18dcfc8206.json create mode 100644 objects/vulnerability/vulnerability--1212a1df-5b47-4bd4-99a8-bf152c79736b.json create mode 100644 objects/vulnerability/vulnerability--13266cd9-ab5f-4fd4-b309-516e4f2adb02.json create mode 100644 objects/vulnerability/vulnerability--148ef938-caec-4bb8-b0f0-1cda25ba8e88.json create mode 100644 objects/vulnerability/vulnerability--17edf8b4-fac9-49d8-a824-5cff6fd8b371.json create mode 100644 objects/vulnerability/vulnerability--18d19dd8-aec4-4197-83f4-e0a351e7ac0c.json create mode 100644 objects/vulnerability/vulnerability--1901f44f-d027-44cc-8d53-2ff75c7bc5b2.json create mode 100644 objects/vulnerability/vulnerability--19d52fc8-1f99-4cd8-ba01-2b6333023ba2.json create mode 100644 objects/vulnerability/vulnerability--1a1aea2d-a8ef-483c-9a4b-f2223771f281.json create mode 100644 objects/vulnerability/vulnerability--1a699dc2-8ea1-4c59-a585-f470059ae16c.json create mode 100644 objects/vulnerability/vulnerability--1ad39a48-420f-4943-a51a-832dca3d2fd0.json create mode 100644 objects/vulnerability/vulnerability--1c7ded7d-b681-4168-b753-ac8a98c45909.json create mode 100644 objects/vulnerability/vulnerability--1ce696f4-2b3f-40fc-bc46-466063b2ed34.json create mode 100644 objects/vulnerability/vulnerability--1cf5ed06-3f0a-4a88-9d49-742afccfd53d.json create mode 100644 objects/vulnerability/vulnerability--1d90b99a-cc17-4070-98b1-dd5d031d8cd6.json create mode 100644 objects/vulnerability/vulnerability--1d920cac-1aaa-47f2-91b1-ecebdc59fbaa.json create mode 100644 objects/vulnerability/vulnerability--1e242caa-9c8f-4729-9868-70611add1521.json create mode 100644 objects/vulnerability/vulnerability--1eb3e9ee-8bd7-4099-be90-87ce8fd03429.json create mode 100644 objects/vulnerability/vulnerability--1efa7430-123f-43c7-bf49-e01853941841.json create mode 100644 objects/vulnerability/vulnerability--21649b56-e027-4c04-8ee7-bf86c772db47.json create mode 100644 objects/vulnerability/vulnerability--218c6300-79e9-49fa-9bee-caec8c4852d2.json create mode 100644 objects/vulnerability/vulnerability--21d10593-03c4-42cd-90f3-2d66f7652481.json create mode 100644 objects/vulnerability/vulnerability--223a28db-7405-46cd-acd6-46261a4b8c57.json create mode 100644 objects/vulnerability/vulnerability--23fae757-590c-468e-9ab6-308f370ad5d7.json create mode 100644 objects/vulnerability/vulnerability--25cbc05b-265a-4188-b694-5193526e99fe.json create mode 100644 objects/vulnerability/vulnerability--25db4893-12ee-4f29-a74f-9910eb23d902.json create mode 100644 objects/vulnerability/vulnerability--2653f5f3-4ab3-4e18-8b64-567ef0d99605.json create mode 100644 objects/vulnerability/vulnerability--26e20b26-6d1b-4bfa-a65c-972c9a7403e1.json create mode 100644 objects/vulnerability/vulnerability--26fc905e-4a90-4649-aefa-527a1ebdd880.json create mode 100644 objects/vulnerability/vulnerability--27098a43-46cc-49bc-911c-24a5bb13b71d.json create mode 100644 objects/vulnerability/vulnerability--28a3b06d-7c73-47e7-b178-7b3e50ed5320.json create mode 100644 objects/vulnerability/vulnerability--290ec42d-8a9d-4eee-bc01-5115cb121310.json create mode 100644 objects/vulnerability/vulnerability--29cb0177-1c38-4441-9b90-a07b104748c8.json create mode 100644 objects/vulnerability/vulnerability--29e54b86-f0e2-4bb6-8057-fe1d3ec8e481.json create mode 100644 objects/vulnerability/vulnerability--2aea823b-c69b-4f51-be9c-2bc88ed7d835.json create mode 100644 objects/vulnerability/vulnerability--2b0d3baa-fb95-40f1-a00b-97515b0507ab.json create mode 100644 objects/vulnerability/vulnerability--2b2afed9-fedc-42fa-bac0-f004701f0f6d.json create mode 100644 objects/vulnerability/vulnerability--2d09203e-1b25-4916-b3e8-a6feb74a80ba.json create mode 100644 objects/vulnerability/vulnerability--2d51d367-bdf6-4e01-b93c-fb86dbab8e9d.json create mode 100644 objects/vulnerability/vulnerability--2f85d85c-a445-492f-a827-cd74d54eda05.json create mode 100644 objects/vulnerability/vulnerability--3045713a-135a-4f36-af7e-edf1e7add4ee.json create mode 100644 objects/vulnerability/vulnerability--30da3ad4-aedb-4ff5-bcd2-47261a9d13a5.json create mode 100644 objects/vulnerability/vulnerability--31b00ecf-1efc-4ed6-b221-0768beb6fb48.json create mode 100644 objects/vulnerability/vulnerability--32de0503-4718-4fdf-b618-b6375ebdddb1.json create mode 100644 objects/vulnerability/vulnerability--350dcff0-b0ee-4b50-b373-423bff935dd0.json create mode 100644 objects/vulnerability/vulnerability--3637b4ce-291c-43d7-8d0f-9dc1ba336f92.json create mode 100644 objects/vulnerability/vulnerability--3641e862-df09-4186-9884-ceacaafeaf8a.json create mode 100644 objects/vulnerability/vulnerability--37d80a4c-37a3-4e10-bff8-0b44f57f12fd.json create mode 100644 objects/vulnerability/vulnerability--3901419e-cf22-4c11-84cc-1bf3bbc1413f.json create mode 100644 objects/vulnerability/vulnerability--392b4d25-d353-497d-b05c-85ebebe37f29.json create mode 100644 objects/vulnerability/vulnerability--3946e5d3-3aac-4b52-987e-becce8b148c2.json create mode 100644 objects/vulnerability/vulnerability--3befe86a-316b-4990-abcd-ce306ebc91ef.json create mode 100644 objects/vulnerability/vulnerability--3ceb8d54-e4c2-47fe-affc-5648253d550a.json create mode 100644 objects/vulnerability/vulnerability--3d55683d-396f-40c6-8099-06f649478efe.json create mode 100644 objects/vulnerability/vulnerability--3e96e7f2-9978-4063-bbeb-a2a512ecfea5.json create mode 100644 objects/vulnerability/vulnerability--3fe84a4c-dd37-4fb1-b9f6-655f27ce9a8a.json create mode 100644 objects/vulnerability/vulnerability--40672686-b4de-428c-a36b-da06de10b2f4.json create mode 100644 objects/vulnerability/vulnerability--4226bfe8-cda3-49c1-80db-8bb8ac9b7154.json create mode 100644 objects/vulnerability/vulnerability--426856c3-ee11-462d-8be8-cfbc24b8f6d0.json create mode 100644 objects/vulnerability/vulnerability--43c0af8f-7e01-4435-af12-ec1716081748.json create mode 100644 objects/vulnerability/vulnerability--44a6fb28-44a9-4c1f-b978-3366fa216f22.json create mode 100644 objects/vulnerability/vulnerability--45409522-158f-44f5-b4e5-b2157aaf1249.json create mode 100644 objects/vulnerability/vulnerability--45ef9b02-c0fc-48e6-8542-2fb223d00383.json create mode 100644 objects/vulnerability/vulnerability--471e83d9-b6fc-4f5b-be7b-0f425fb4f63e.json create mode 100644 objects/vulnerability/vulnerability--47a65a05-7365-4a7c-b50b-86771e353d61.json create mode 100644 objects/vulnerability/vulnerability--47ad3cd5-dc11-4c79-9518-c4af3fb92aa0.json create mode 100644 objects/vulnerability/vulnerability--47c63eb6-5d06-4741-9f0e-cbefeea577be.json create mode 100644 objects/vulnerability/vulnerability--49de9927-6e42-42cf-8c81-f5b1721e8946.json create mode 100644 objects/vulnerability/vulnerability--4ab4b9d3-cb64-4e8c-9097-8a6756711846.json create mode 100644 objects/vulnerability/vulnerability--4b21d402-b716-4d2a-b3ad-d64e45ea991b.json create mode 100644 objects/vulnerability/vulnerability--4dbb895a-59d3-4fb3-b063-329d6ca3bffb.json create mode 100644 objects/vulnerability/vulnerability--4ee6b52f-7f47-4b7e-84b4-6c1456cb9c6e.json create mode 100644 objects/vulnerability/vulnerability--4f030a42-108d-4a11-ba80-166172d9172e.json create mode 100644 objects/vulnerability/vulnerability--4fe0881f-604e-403b-9553-11891be57d12.json create mode 100644 objects/vulnerability/vulnerability--504ddee3-8889-4007-a692-ecd7693c608f.json create mode 100644 objects/vulnerability/vulnerability--5051cc27-2d05-42fc-b703-5ce4d8092880.json create mode 100644 objects/vulnerability/vulnerability--515f577a-7bbe-47ef-9691-39b6b0a14687.json create mode 100644 objects/vulnerability/vulnerability--5230391b-6a31-472e-a0a6-d63dc3786edb.json create mode 100644 objects/vulnerability/vulnerability--53288a7e-3b87-4189-a3e3-9ab9f042abd9.json create mode 100644 objects/vulnerability/vulnerability--532b5a24-9ca7-4780-8012-62fb3ba5020b.json create mode 100644 objects/vulnerability/vulnerability--5380ee20-4896-487e-9c0e-0d97c0467cee.json create mode 100644 objects/vulnerability/vulnerability--5583c091-fc7b-4400-8cc4-973eba093eca.json create mode 100644 objects/vulnerability/vulnerability--55c99365-3cc5-40d4-8751-810107af0ffa.json create mode 100644 objects/vulnerability/vulnerability--55e8f969-21b5-4e42-914b-7ef04c62a74a.json create mode 100644 objects/vulnerability/vulnerability--55f2c19f-f22a-443b-b787-9cd2c188725f.json create mode 100644 objects/vulnerability/vulnerability--565a50ce-0cd7-4388-8883-f041366d502b.json create mode 100644 objects/vulnerability/vulnerability--5692012f-9b28-46cb-be41-e580f5c52587.json create mode 100644 objects/vulnerability/vulnerability--571e3b7d-c39b-47a6-bbd2-cf59a2fce1ba.json create mode 100644 objects/vulnerability/vulnerability--57eb971c-94bd-4433-9e3e-a082964aba1f.json create mode 100644 objects/vulnerability/vulnerability--580bc8ce-f115-424b-a2b3-3623dae09ef3.json create mode 100644 objects/vulnerability/vulnerability--58a3cf5a-5054-4129-848c-82201b1f8e49.json create mode 100644 objects/vulnerability/vulnerability--58ee2dd5-aa40-4a49-ae06-0a6ac483e17e.json create mode 100644 objects/vulnerability/vulnerability--5a76170b-670a-4f5d-b24f-2d822801b89a.json create mode 100644 objects/vulnerability/vulnerability--5aee4211-a639-4300-86d9-6f069d78c16a.json create mode 100644 objects/vulnerability/vulnerability--5c4e65b1-0606-43e6-ace2-e70cc673a939.json create mode 100644 objects/vulnerability/vulnerability--5cadbbc1-2f26-40a2-91bb-f441754eac22.json create mode 100644 objects/vulnerability/vulnerability--5f921813-1c75-4ead-82f6-afa94d76b73f.json create mode 100644 objects/vulnerability/vulnerability--622b163d-f40a-4b36-b46c-73d3ec21b464.json create mode 100644 objects/vulnerability/vulnerability--6266184b-be2b-47bb-b5a4-170cd3729425.json create mode 100644 objects/vulnerability/vulnerability--638315c0-a5a8-4430-81d7-1261ed030ec8.json create mode 100644 objects/vulnerability/vulnerability--647fd113-a933-4d1d-aa64-4f80a5022637.json create mode 100644 objects/vulnerability/vulnerability--64c805c9-d6b1-4c0f-bc14-9a9659b667ff.json create mode 100644 objects/vulnerability/vulnerability--6567d8cd-7981-4d4f-b6a5-9b6d098b4d4e.json create mode 100644 objects/vulnerability/vulnerability--661c4e92-68b0-4a79-8fc8-7e0082aaa24e.json create mode 100644 objects/vulnerability/vulnerability--66a1b6c0-023e-4b10-a926-debb3ed2be94.json create mode 100644 objects/vulnerability/vulnerability--66aa9cba-a743-46ec-86a1-e5ab6f84db19.json create mode 100644 objects/vulnerability/vulnerability--6707a637-018e-495f-a7fa-c407102696a2.json create mode 100644 objects/vulnerability/vulnerability--6791aabd-5fe1-489d-8beb-2118b16563aa.json create mode 100644 objects/vulnerability/vulnerability--68757a63-6721-45a5-bf6e-828849011ff4.json create mode 100644 objects/vulnerability/vulnerability--696833b1-005b-41b5-97dd-20a2f807008f.json create mode 100644 objects/vulnerability/vulnerability--6b97a85f-ad43-4466-a17e-a29bc91fc423.json create mode 100644 objects/vulnerability/vulnerability--6c945fcd-be54-46df-bb2f-4378c8c2c4a6.json create mode 100644 objects/vulnerability/vulnerability--6cb4dc67-0346-469d-8d30-e58c76ea881e.json create mode 100644 objects/vulnerability/vulnerability--6d8b6f41-7ed0-426a-bdcf-e148481a7527.json create mode 100644 objects/vulnerability/vulnerability--6e0974ba-a053-4e8a-8c63-ef9024152df6.json create mode 100644 objects/vulnerability/vulnerability--6e09d518-c1c4-457b-833e-9a0e4735f12a.json create mode 100644 objects/vulnerability/vulnerability--6e3510b0-2d02-44f4-a506-d5ded33236e0.json create mode 100644 objects/vulnerability/vulnerability--728c277a-710b-425f-9022-d94c73a4c055.json create mode 100644 objects/vulnerability/vulnerability--72a796f8-c6b5-4dab-b3df-9a85846189d5.json create mode 100644 objects/vulnerability/vulnerability--72b824c3-f3ff-4c15-9ac9-166819c0a979.json create mode 100644 objects/vulnerability/vulnerability--75133cdd-a7b6-468c-948e-1ab34b48e561.json create mode 100644 objects/vulnerability/vulnerability--763e1b20-7238-4e53-b6f4-53d4dc850a68.json create mode 100644 objects/vulnerability/vulnerability--76a91f49-1d17-4e12-958f-819975085abe.json create mode 100644 objects/vulnerability/vulnerability--772b9c18-af98-4823-9ff3-b46e88b7aa2f.json create mode 100644 objects/vulnerability/vulnerability--77813cc8-d3d8-490c-af24-41653a21f3fa.json create mode 100644 objects/vulnerability/vulnerability--784dcd38-c6d0-4df1-9f13-e2dba19edfb0.json create mode 100644 objects/vulnerability/vulnerability--785d5e66-460e-4001-80dd-58bb14e2f123.json create mode 100644 objects/vulnerability/vulnerability--7a7ac2b1-b7b6-4a00-b0d5-59097584a15b.json create mode 100644 objects/vulnerability/vulnerability--7bc09bcf-2cff-40a5-85ca-c8d83125da23.json create mode 100644 objects/vulnerability/vulnerability--7bef1c69-cde8-46c6-8618-c97935a17fc7.json create mode 100644 objects/vulnerability/vulnerability--7c2d8c17-dc26-4b13-b1ba-a15988d5cc6b.json create mode 100644 objects/vulnerability/vulnerability--7c5e23db-33be-48ca-a699-95a99bad9b52.json create mode 100644 objects/vulnerability/vulnerability--7cd68cda-35f2-47c7-9485-d510482e55d8.json create mode 100644 objects/vulnerability/vulnerability--7dac3159-1dcb-4e13-944a-f455de2e5d5d.json create mode 100644 objects/vulnerability/vulnerability--7e00e874-274c-4f23-aacc-fe2eb21c05bc.json create mode 100644 objects/vulnerability/vulnerability--7eb94e41-e2f9-425b-8235-e11a89a03f93.json create mode 100644 objects/vulnerability/vulnerability--7ebc731f-4f88-45bd-9ea6-5a1dbc8cfcfa.json create mode 100644 objects/vulnerability/vulnerability--7efc30ea-4076-439e-a7ac-0f92dd62263a.json create mode 100644 objects/vulnerability/vulnerability--7f908bc6-38d7-46c2-baf9-88f10d96c574.json create mode 100644 objects/vulnerability/vulnerability--802cc75f-cfbf-44c2-8355-a8244b04bc46.json create mode 100644 objects/vulnerability/vulnerability--80d28fca-113e-47f6-b17a-ec90f8730ca3.json create mode 100644 objects/vulnerability/vulnerability--819a8fc4-00bb-4854-81a4-a492a8905203.json create mode 100644 objects/vulnerability/vulnerability--820993d4-bd28-4fef-b98d-b89293f719f8.json create mode 100644 objects/vulnerability/vulnerability--8381f1af-05af-4eb4-afaf-578a7c49e3ca.json create mode 100644 objects/vulnerability/vulnerability--84104d42-849a-4bf9-9b76-ed68bc92b4a3.json create mode 100644 objects/vulnerability/vulnerability--856e0712-3654-427c-82fe-95f11312b9f7.json create mode 100644 objects/vulnerability/vulnerability--863ea478-12db-4d60-8860-94f6d45c6c5a.json create mode 100644 objects/vulnerability/vulnerability--8670f060-99d9-4638-bd00-ee9493459a66.json create mode 100644 objects/vulnerability/vulnerability--871fcc30-6821-40d7-8a7a-cfcf41fedaf3.json create mode 100644 objects/vulnerability/vulnerability--87e7b77e-2464-4ba2-8de2-2240ad122fc6.json create mode 100644 objects/vulnerability/vulnerability--8839773a-edc8-45fc-9c83-ecfe73f0ea24.json create mode 100644 objects/vulnerability/vulnerability--8a7d8d2d-dcee-4b5b-b1b5-f93a7fc977c3.json create mode 100644 objects/vulnerability/vulnerability--8abd24ab-182c-437a-8ddf-89d02b1ddbb6.json create mode 100644 objects/vulnerability/vulnerability--8ac4d058-2641-4849-ad75-c5daae42cb8a.json create mode 100644 objects/vulnerability/vulnerability--8aec430f-eade-43bf-aef1-7a350409ae56.json create mode 100644 objects/vulnerability/vulnerability--8b27fed4-17bd-42e1-b6e9-37c48ecb08c8.json create mode 100644 objects/vulnerability/vulnerability--8b4a7aa1-6afb-4ce9-ac47-f20ac055c5fa.json create mode 100644 objects/vulnerability/vulnerability--8b6d2730-0a53-4f58-a356-47cc666fddfe.json create mode 100644 objects/vulnerability/vulnerability--8ce73e56-6e05-4ec6-906d-54d6d3a8341d.json create mode 100644 objects/vulnerability/vulnerability--8f34405e-da8b-42c7-ac24-af4f3991935f.json create mode 100644 objects/vulnerability/vulnerability--8fb3e363-9f89-43db-bbc3-f024f7ac1d6f.json create mode 100644 objects/vulnerability/vulnerability--93b22c5a-b7e3-4742-8140-acd31412d5e9.json create mode 100644 objects/vulnerability/vulnerability--93cc7dc5-dd72-4abc-b2da-ee570f974acc.json create mode 100644 objects/vulnerability/vulnerability--94ef9454-fdb1-481c-984e-2c2131f72f46.json create mode 100644 objects/vulnerability/vulnerability--95357a53-5b6e-4c53-a6a2-27fc1f3bf17a.json create mode 100644 objects/vulnerability/vulnerability--95a7b821-0e17-466e-bf3c-8b82e14638c1.json create mode 100644 objects/vulnerability/vulnerability--95c45952-2cca-4d37-bdd0-6c0ffa533690.json create mode 100644 objects/vulnerability/vulnerability--95e0d916-7abc-49e3-83b7-76898d2f5f52.json create mode 100644 objects/vulnerability/vulnerability--960003f8-bc02-43dc-8965-54bd0f3221d6.json create mode 100644 objects/vulnerability/vulnerability--967b60b1-2be3-48b4-a4cf-b250e594e6b1.json create mode 100644 objects/vulnerability/vulnerability--975a0312-f028-47fc-8a28-270673c2b904.json create mode 100644 objects/vulnerability/vulnerability--97f7c328-c3e9-441a-b7d8-9c93efa38fee.json create mode 100644 objects/vulnerability/vulnerability--9817978c-f04a-49ac-aa74-07fdd5265012.json create mode 100644 objects/vulnerability/vulnerability--98b809b7-c734-45f7-a703-27f12c7686f0.json create mode 100644 objects/vulnerability/vulnerability--9990b9e0-6694-4d17-9a4d-aef4fefdc6b1.json create mode 100644 objects/vulnerability/vulnerability--9a99d717-d23f-45f2-8451-63826f334705.json create mode 100644 objects/vulnerability/vulnerability--9b5462f9-a3cb-4535-89d5-fa94007d3c87.json create mode 100644 objects/vulnerability/vulnerability--9d018067-8503-41a9-8b43-079dd789f084.json create mode 100644 objects/vulnerability/vulnerability--a0382dc0-e939-4ed5-a6a7-5559b3b1b03b.json create mode 100644 objects/vulnerability/vulnerability--a15ffed8-73c2-4f50-ac20-029012626791.json create mode 100644 objects/vulnerability/vulnerability--a21100ac-a25a-4842-9f29-a59cfc9a3b83.json create mode 100644 objects/vulnerability/vulnerability--a2dd819d-bcaa-4051-947f-3826e461c6c6.json create mode 100644 objects/vulnerability/vulnerability--a4e2153c-c538-4c1c-b2b8-e36d315ba946.json create mode 100644 objects/vulnerability/vulnerability--a4e9e35d-5e6b-4721-81c8-a802ff1b0385.json create mode 100644 objects/vulnerability/vulnerability--a4eb1201-23dd-44ee-bd9a-7371aa244c3a.json create mode 100644 objects/vulnerability/vulnerability--a55d2b54-4596-4bb7-8c6c-c1589b8293c8.json create mode 100644 objects/vulnerability/vulnerability--a57661d6-781c-4858-a4b4-d10991b12895.json create mode 100644 objects/vulnerability/vulnerability--a5cfa80e-6206-4c0d-a7e9-284c823149b9.json create mode 100644 objects/vulnerability/vulnerability--a62a92d2-5828-425d-a13f-f0daec89d9a4.json create mode 100644 objects/vulnerability/vulnerability--a7b2ccab-9767-4d8e-a4e5-7f7504c84712.json create mode 100644 objects/vulnerability/vulnerability--a7d37e21-73f7-4898-8c8d-00b8aab25947.json create mode 100644 objects/vulnerability/vulnerability--a7dc3f6d-fe26-4fad-82fc-da38ae0d3d94.json create mode 100644 objects/vulnerability/vulnerability--a9781eaf-72c9-4301-90db-8ba8c79d7068.json create mode 100644 objects/vulnerability/vulnerability--a9e468e8-111c-41f5-9831-caa27044f357.json create mode 100644 objects/vulnerability/vulnerability--ab0b4d08-6b2d-43e1-8daa-9b4986b001ff.json create mode 100644 objects/vulnerability/vulnerability--ab45a4ca-3692-45e5-8952-abdfdba95ca3.json create mode 100644 objects/vulnerability/vulnerability--abca7fdb-37b8-4043-b05d-ed9066ea5a33.json create mode 100644 objects/vulnerability/vulnerability--ac2eee53-b914-41f9-aeb6-b774445bd83e.json create mode 100644 objects/vulnerability/vulnerability--aca46458-9fc1-44de-a60c-634acb277029.json create mode 100644 objects/vulnerability/vulnerability--ae4fc22c-9b49-4ed2-ba55-1a0700625e6f.json create mode 100644 objects/vulnerability/vulnerability--ae9ae53f-d095-4af3-9037-04ab6505dfa3.json create mode 100644 objects/vulnerability/vulnerability--afd5f4fa-a03e-49c6-b3ea-2185bde7d575.json create mode 100644 objects/vulnerability/vulnerability--b00b8199-c7c6-4e84-9567-f1c3131e1157.json create mode 100644 objects/vulnerability/vulnerability--b0cc991e-e240-4023-b7b1-3e916fbb4a6d.json create mode 100644 objects/vulnerability/vulnerability--b1344162-71e1-4d3b-a782-570359eb51a1.json create mode 100644 objects/vulnerability/vulnerability--b1fda952-3945-4c67-a43f-15220f6732ab.json create mode 100644 objects/vulnerability/vulnerability--b2d17cf2-8a33-46f9-bf64-0b0504796cc7.json create mode 100644 objects/vulnerability/vulnerability--b3dd53ce-650c-4558-9c1b-818f564293c5.json create mode 100644 objects/vulnerability/vulnerability--b40b1570-6b01-496a-a613-19d98443f1a3.json create mode 100644 objects/vulnerability/vulnerability--b46f35d5-a759-4d31-a732-89637be6229b.json create mode 100644 objects/vulnerability/vulnerability--b51b45f2-2fc6-40d1-8078-1e8c396b3510.json create mode 100644 objects/vulnerability/vulnerability--b68c835a-d5aa-4885-985e-1bd558a30610.json create mode 100644 objects/vulnerability/vulnerability--b7962680-89f7-405f-8324-26d9f71c918e.json create mode 100644 objects/vulnerability/vulnerability--b925914e-e6f5-46a9-aa46-1cd7dbfd4518.json create mode 100644 objects/vulnerability/vulnerability--ba908d66-cc37-4b63-9535-6ab10ea9e9bf.json create mode 100644 objects/vulnerability/vulnerability--bab5919e-c707-4183-bbd5-ef0f40bea99b.json create mode 100644 objects/vulnerability/vulnerability--bab8acd7-f159-480d-a49a-48d7d7ba9a67.json create mode 100644 objects/vulnerability/vulnerability--bb646117-2d16-4e80-ba98-b024285f737a.json create mode 100644 objects/vulnerability/vulnerability--bbea4377-7519-4a0b-8229-5cbb73d9c3b8.json create mode 100644 objects/vulnerability/vulnerability--bcd7f009-972c-48b5-b11c-0671a843c1b6.json create mode 100644 objects/vulnerability/vulnerability--bcd8c1b9-7724-45f5-b7d4-ecd375427ccd.json create mode 100644 objects/vulnerability/vulnerability--bd820712-3638-4597-9c33-196053fec9db.json create mode 100644 objects/vulnerability/vulnerability--bd960bdc-0e61-407a-9b23-8248175e3600.json create mode 100644 objects/vulnerability/vulnerability--be0bca73-51ce-4ce6-b6c1-1575f015df09.json create mode 100644 objects/vulnerability/vulnerability--be2e234b-0d19-4e8d-9ae6-1cda580939b5.json create mode 100644 objects/vulnerability/vulnerability--bfb918c7-02eb-454c-bd75-3ea201f5b832.json create mode 100644 objects/vulnerability/vulnerability--c471e26d-1892-4fbb-9657-ce3770ab3d71.json create mode 100644 objects/vulnerability/vulnerability--c4754f98-d326-4c7a-9924-94a35c260c4d.json create mode 100644 objects/vulnerability/vulnerability--c50932fe-80e5-4441-8478-1b0be8570367.json create mode 100644 objects/vulnerability/vulnerability--c566103e-619c-4bf5-919e-633ae21b5a2c.json create mode 100644 objects/vulnerability/vulnerability--c5e8778e-c00c-4125-83cb-a0f2bdfa3193.json create mode 100644 objects/vulnerability/vulnerability--c5fedf50-8e23-4c87-b54c-101884f35b54.json create mode 100644 objects/vulnerability/vulnerability--c6240f40-dc79-4800-be89-a19bda088744.json create mode 100644 objects/vulnerability/vulnerability--c6b96f49-cb1d-430d-9c24-309431714fdc.json create mode 100644 objects/vulnerability/vulnerability--c7b7fb1c-0789-4a31-b3db-4c12ba950013.json create mode 100644 objects/vulnerability/vulnerability--c84d6f87-d092-4a61-b20e-530a2c81e1a1.json create mode 100644 objects/vulnerability/vulnerability--c897949e-fee8-48f8-bb35-e463f6d51f14.json create mode 100644 objects/vulnerability/vulnerability--c8c2dbf7-6612-4ddf-ae04-5ffee0d3a550.json create mode 100644 objects/vulnerability/vulnerability--c9def297-8907-4888-bdd3-ca936a5e3c7e.json create mode 100644 objects/vulnerability/vulnerability--cad1bace-cabe-46f4-b57e-8c6a1c7c68ef.json create mode 100644 objects/vulnerability/vulnerability--cb84c350-ea87-4f35-a5ab-712504351d3a.json create mode 100644 objects/vulnerability/vulnerability--cbb70ff9-124f-4ea4-88f8-9cea9ddacbce.json create mode 100644 objects/vulnerability/vulnerability--ce30ac9a-df41-447b-9b45-8ebedb6b0b0d.json create mode 100644 objects/vulnerability/vulnerability--ceae359c-cc22-442f-a542-5e126f1b204e.json create mode 100644 objects/vulnerability/vulnerability--cf13d698-f37a-4663-841b-8b3eea074f9a.json create mode 100644 objects/vulnerability/vulnerability--d0e692b0-f1aa-4cb6-8717-d3b0b65e6a58.json create mode 100644 objects/vulnerability/vulnerability--d1145c42-7c2a-4f5d-889e-10de0bd236c9.json create mode 100644 objects/vulnerability/vulnerability--d13f5a46-62aa-4066-9da5-788a7c572e4b.json create mode 100644 objects/vulnerability/vulnerability--d4aef99d-da8d-47f4-b2e2-bac57bcec7ff.json create mode 100644 objects/vulnerability/vulnerability--d4b60e6c-6a33-4762-bc49-0b567bd87b76.json create mode 100644 objects/vulnerability/vulnerability--d5ddaad8-e133-4c11-96fc-30c55a2a0191.json create mode 100644 objects/vulnerability/vulnerability--d6cad59b-61d0-4d87-ab5c-1d2a99232340.json create mode 100644 objects/vulnerability/vulnerability--d73a97a5-9f3f-4c7d-a197-3177ade05a41.json create mode 100644 objects/vulnerability/vulnerability--d80340d7-0dbf-4f72-a991-e11859c10007.json create mode 100644 objects/vulnerability/vulnerability--d8968b18-2ca4-4342-82cb-57ca275c6d4c.json create mode 100644 objects/vulnerability/vulnerability--d8b825f0-bd90-484f-b6aa-52f5075d0cc3.json create mode 100644 objects/vulnerability/vulnerability--d9293001-ab4b-4ebf-b8fb-39960bbe3a8d.json create mode 100644 objects/vulnerability/vulnerability--d92d95f9-2c04-41c5-8c61-f98c5122b701.json create mode 100644 objects/vulnerability/vulnerability--da2b45f2-8fa8-44fc-bf71-9d61dff90b2d.json create mode 100644 objects/vulnerability/vulnerability--da8182cb-6ca3-47c7-956a-2f2466a94b8a.json create mode 100644 objects/vulnerability/vulnerability--dbcb7bdc-4394-4903-a4a6-ab41e7a76cb3.json create mode 100644 objects/vulnerability/vulnerability--dc01ba92-b64a-4d48-bd09-e42c0549a251.json create mode 100644 objects/vulnerability/vulnerability--dc212d2e-b914-4be6-a858-4e6197f0c3d5.json create mode 100644 objects/vulnerability/vulnerability--dc324211-511c-4b32-a9f6-d4a997fb2b7e.json create mode 100644 objects/vulnerability/vulnerability--dc408d81-cff8-4fe1-9cb1-447048555a72.json create mode 100644 objects/vulnerability/vulnerability--dd3c34cc-ae1e-4f89-949d-0f4c69d2017f.json create mode 100644 objects/vulnerability/vulnerability--ddd52939-e79b-450e-a85b-ed0694b4c702.json create mode 100644 objects/vulnerability/vulnerability--e07200a3-ad5e-4554-99f9-b6a5f26c213d.json create mode 100644 objects/vulnerability/vulnerability--e08d03dd-7866-41a2-af78-d75ba05af7c0.json create mode 100644 objects/vulnerability/vulnerability--e090ca1a-bddd-47ee-ad23-7798fb7614af.json create mode 100644 objects/vulnerability/vulnerability--e27a0369-262f-48c8-ab70-96b741a56be1.json create mode 100644 objects/vulnerability/vulnerability--e3270cf9-6ab9-4ae7-97fe-68117214729e.json create mode 100644 objects/vulnerability/vulnerability--e3947adc-25cb-40cd-b06a-e98b4c2ac1b4.json create mode 100644 objects/vulnerability/vulnerability--e40d0b4e-99f6-4927-ad9e-ff57e8f11310.json create mode 100644 objects/vulnerability/vulnerability--e528ddf5-b6bd-4455-b7c8-316a9617cd5a.json create mode 100644 objects/vulnerability/vulnerability--e568d228-dc55-4c15-b96f-79101da27ab7.json create mode 100644 objects/vulnerability/vulnerability--e6483c26-71b5-4aba-9985-62983c3bf045.json create mode 100644 objects/vulnerability/vulnerability--e7f09a49-10ab-4950-aeab-fba306860b1d.json create mode 100644 objects/vulnerability/vulnerability--e8ffcdf5-96c9-4524-8afe-603295c480ab.json create mode 100644 objects/vulnerability/vulnerability--e9259a3d-030c-47fd-81d5-a48694bade51.json create mode 100644 objects/vulnerability/vulnerability--e9b966b7-c438-41bf-b37e-3a3fdc32f5b2.json create mode 100644 objects/vulnerability/vulnerability--ea5eccd9-044d-4265-ae81-bd26b785125c.json create mode 100644 objects/vulnerability/vulnerability--ec0fed9d-f4fd-4bea-a82a-9b1e155addec.json create mode 100644 objects/vulnerability/vulnerability--ec368531-1131-4b3d-9bb8-16a04511a557.json create mode 100644 objects/vulnerability/vulnerability--ecc38d4a-ccd0-4594-9cce-b1320db57f2f.json create mode 100644 objects/vulnerability/vulnerability--eccb6415-a545-4335-9dea-c3fa772895d1.json create mode 100644 objects/vulnerability/vulnerability--ed752481-0158-44a1-9d35-96252991e611.json create mode 100644 objects/vulnerability/vulnerability--edabb666-64c9-4a8e-b63b-176a733c3387.json create mode 100644 objects/vulnerability/vulnerability--ef0c04e2-c20f-4b6d-bde9-36e59a9c6ccc.json create mode 100644 objects/vulnerability/vulnerability--ef6322cd-5620-41a1-a6b7-3d54e1c5bca8.json create mode 100644 objects/vulnerability/vulnerability--f1c0e401-cd81-4e4d-b583-0c7a01176691.json create mode 100644 objects/vulnerability/vulnerability--f1e663af-47f3-4fa2-bad1-e28dfb32f693.json create mode 100644 objects/vulnerability/vulnerability--f26db443-67df-4bcb-b865-f91eda81c3c0.json create mode 100644 objects/vulnerability/vulnerability--f33664b4-8e82-4d66-8db0-09537b805647.json create mode 100644 objects/vulnerability/vulnerability--f385a1d3-7704-40ea-9c72-760d45e7bd57.json create mode 100644 objects/vulnerability/vulnerability--f3a7ad26-3bb0-46ba-92ff-9beee62bf8ac.json create mode 100644 objects/vulnerability/vulnerability--f4847043-ba15-47a6-8e32-996cc2c8f8d0.json create mode 100644 objects/vulnerability/vulnerability--f4b0245c-75f4-4aa4-81e2-a17c3602f351.json create mode 100644 objects/vulnerability/vulnerability--f51253e6-2d7e-429b-a380-f05090e3b53b.json create mode 100644 objects/vulnerability/vulnerability--f58fbba1-23e9-4645-94eb-fd8355ffd2c2.json create mode 100644 objects/vulnerability/vulnerability--f688ce26-c5ad-4d59-b54c-849079f73c8f.json create mode 100644 objects/vulnerability/vulnerability--f709efd0-3a14-4e23-ad75-11513c5ba8e3.json create mode 100644 objects/vulnerability/vulnerability--f74f79bb-bc47-4534-886e-5c509a7f12e4.json create mode 100644 objects/vulnerability/vulnerability--f7a856f0-2596-417b-924c-88c630873d20.json create mode 100644 objects/vulnerability/vulnerability--f841ccf1-d10b-4d58-943e-14caa84ff4cb.json create mode 100644 objects/vulnerability/vulnerability--f87aac57-b256-4019-9063-535184b11eff.json create mode 100644 objects/vulnerability/vulnerability--fa3cf72b-a7d4-4dd1-8acb-1eb08bd2ddfa.json create mode 100644 objects/vulnerability/vulnerability--faeb4115-48ae-4d39-a065-099a7263a070.json create mode 100644 objects/vulnerability/vulnerability--fbc96916-45f1-4cc3-bdd2-d8c9ed5aff8d.json create mode 100644 objects/vulnerability/vulnerability--fc38c850-4133-49d1-9bf4-d0c9941becd1.json create mode 100644 objects/vulnerability/vulnerability--fde0f482-7365-4d21-a8c1-f2d1a2bbc49e.json create mode 100644 objects/vulnerability/vulnerability--fdfbc83d-0cd3-47ab-817c-444016d57d80.json create mode 100644 objects/vulnerability/vulnerability--fef2024f-4808-4b18-a224-be90742382c9.json diff --git a/mapping.csv b/mapping.csv index 0855855f72a..116cdfa1476 100644 --- a/mapping.csv +++ b/mapping.csv @@ -255488,3 +255488,344 @@ vulnerability,CVE-2024-43432,vulnerability--855b8b07-f5ab-40c0-b56a-32917f153a3e vulnerability,CVE-2024-43439,vulnerability--b1f8be70-d7fc-4c2e-bb47-cdd586a9bf4c vulnerability,CVE-2024-43430,vulnerability--64714bf2-ff81-4b6d-8707-9ac9db4eeceb vulnerability,CVE-2024-43437,vulnerability--aac400e9-c8af-418e-bfc5-1aaff243cc90 +vulnerability,CVE-2024-51213,vulnerability--ab0b4d08-6b2d-43e1-8daa-9b4986b001ff +vulnerability,CVE-2024-51564,vulnerability--da2b45f2-8fa8-44fc-bf71-9d61dff90b2d +vulnerability,CVE-2024-51563,vulnerability--da8182cb-6ca3-47c7-956a-2f2466a94b8a +vulnerability,CVE-2024-51562,vulnerability--97f7c328-c3e9-441a-b7d8-9c93efa38fee +vulnerability,CVE-2024-51722,vulnerability--8abd24ab-182c-437a-8ddf-89d02b1ddbb6 +vulnerability,CVE-2024-51749,vulnerability--6b97a85f-ad43-4466-a17e-a29bc91fc423 +vulnerability,CVE-2024-51179,vulnerability--504ddee3-8889-4007-a692-ecd7693c608f +vulnerability,CVE-2024-51750,vulnerability--25cbc05b-265a-4188-b694-5193526e99fe +vulnerability,CVE-2024-51720,vulnerability--e9259a3d-030c-47fd-81d5-a48694bade51 +vulnerability,CVE-2024-51093,vulnerability--1ad39a48-420f-4943-a51a-832dca3d2fd0 +vulnerability,CVE-2024-51094,vulnerability--802cc75f-cfbf-44c2-8355-a8244b04bc46 +vulnerability,CVE-2024-51565,vulnerability--7f908bc6-38d7-46c2-baf9-88f10d96c574 +vulnerability,CVE-2024-51721,vulnerability--5f921813-1c75-4ead-82f6-afa94d76b73f +vulnerability,CVE-2024-51566,vulnerability--6791aabd-5fe1-489d-8beb-2118b16563aa +vulnerability,CVE-2024-48999,vulnerability--be2e234b-0d19-4e8d-9ae6-1cda580939b5 +vulnerability,CVE-2024-48995,vulnerability--728c277a-710b-425f-9022-d94c73a4c055 +vulnerability,CVE-2024-48837,vulnerability--08cabef1-4df5-475c-9c1d-06acd67c271d +vulnerability,CVE-2024-48997,vulnerability--dc408d81-cff8-4fe1-9cb1-447048555a72 +vulnerability,CVE-2024-48075,vulnerability--7dac3159-1dcb-4e13-944a-f455de2e5d5d +vulnerability,CVE-2024-48996,vulnerability--e7f09a49-10ab-4950-aeab-fba306860b1d +vulnerability,CVE-2024-48998,vulnerability--8b6d2730-0a53-4f58-a356-47cc666fddfe +vulnerability,CVE-2024-48993,vulnerability--55c99365-3cc5-40d4-8751-810107af0ffa +vulnerability,CVE-2024-48994,vulnerability--bd960bdc-0e61-407a-9b23-8248175e3600 +vulnerability,CVE-2024-48838,vulnerability--a55d2b54-4596-4bb7-8c6c-c1589b8293c8 +vulnerability,CVE-2024-30133,vulnerability--f688ce26-c5ad-4d59-b54c-849079f73c8f +vulnerability,CVE-2024-52533,vulnerability--68757a63-6721-45a5-bf6e-828849011ff4 +vulnerability,CVE-2024-52010,vulnerability--94ef9454-fdb1-481c-984e-2c2131f72f46 +vulnerability,CVE-2024-52296,vulnerability--c7b7fb1c-0789-4a31-b3db-4c12ba950013 +vulnerability,CVE-2024-52301,vulnerability--edabb666-64c9-4a8e-b63b-176a733c3387 +vulnerability,CVE-2024-52297,vulnerability--a57661d6-781c-4858-a4b4-d10991b12895 +vulnerability,CVE-2024-45147,vulnerability--8ce73e56-6e05-4ec6-906d-54d6d3a8341d +vulnerability,CVE-2024-45114,vulnerability--218c6300-79e9-49fa-9bee-caec8c4852d2 +vulnerability,CVE-2024-45289,vulnerability--d92d95f9-2c04-41c5-8c61-f98c5122b701 +vulnerability,CVE-2024-45827,vulnerability--392b4d25-d353-497d-b05c-85ebebe37f29 +vulnerability,CVE-2024-10945,vulnerability--3ceb8d54-e4c2-47fe-affc-5648253d550a +vulnerability,CVE-2024-10179,vulnerability--1ce696f4-2b3f-40fc-bc46-466063b2ed34 +vulnerability,CVE-2024-10218,vulnerability--8fb3e363-9f89-43db-bbc3-f024f7ac1d6f +vulnerability,CVE-2024-10685,vulnerability--cf13d698-f37a-4663-841b-8b3eea074f9a +vulnerability,CVE-2024-10245,vulnerability--5230391b-6a31-472e-a0a6-d63dc3786edb +vulnerability,CVE-2024-10538,vulnerability--cad1bace-cabe-46f4-b57e-8c6a1c7c68ef +vulnerability,CVE-2024-10790,vulnerability--6e0974ba-a053-4e8a-8c63-ef9024152df6 +vulnerability,CVE-2024-10943,vulnerability--0026fb67-9a3b-4598-a12d-d6052e3175ab +vulnerability,CVE-2024-10695,vulnerability--b46f35d5-a759-4d31-a732-89637be6229b +vulnerability,CVE-2024-10971,vulnerability--c5e8778e-c00c-4125-83cb-a0f2bdfa3193 +vulnerability,CVE-2024-10923,vulnerability--2b2afed9-fedc-42fa-bac0-f004701f0f6d +vulnerability,CVE-2024-10323,vulnerability--95c45952-2cca-4d37-bdd0-6c0ffa533690 +vulnerability,CVE-2024-10672,vulnerability--8f34405e-da8b-42c7-ac24-af4f3991935f +vulnerability,CVE-2024-10944,vulnerability--e568d228-dc55-4c15-b96f-79101da27ab7 +vulnerability,CVE-2024-10217,vulnerability--18d19dd8-aec4-4197-83f4-e0a351e7ac0c +vulnerability,CVE-2024-9357,vulnerability--8ac4d058-2641-4849-ad75-c5daae42cb8a +vulnerability,CVE-2024-9836,vulnerability--25db4893-12ee-4f29-a74f-9910eb23d902 +vulnerability,CVE-2024-9999,vulnerability--40672686-b4de-428c-a36b-da06de10b2f4 +vulnerability,CVE-2024-9843,vulnerability--034644fc-1db3-4e2d-ad94-8a9bfcf9197f +vulnerability,CVE-2024-9835,vulnerability--5583c091-fc7b-4400-8cc4-973eba093eca +vulnerability,CVE-2024-9420,vulnerability--47c63eb6-5d06-4741-9f0e-cbefeea577be +vulnerability,CVE-2024-9842,vulnerability--622b163d-f40a-4b36-b46c-73d3ec21b464 +vulnerability,CVE-2024-39281,vulnerability--0f53ba76-f1a0-4bc1-a83f-2e0b286dd3f3 +vulnerability,CVE-2024-47458,vulnerability--a0382dc0-e939-4ed5-a6a7-5559b3b1b03b +vulnerability,CVE-2024-47430,vulnerability--95e0d916-7abc-49e3-83b7-76898d2f5f52 +vulnerability,CVE-2024-47455,vulnerability--bfb918c7-02eb-454c-bd75-3ea201f5b832 +vulnerability,CVE-2024-47587,vulnerability--ce30ac9a-df41-447b-9b45-8ebedb6b0b0d +vulnerability,CVE-2024-47440,vulnerability--cb84c350-ea87-4f35-a5ab-712504351d3a +vulnerability,CVE-2024-47444,vulnerability--c8c2dbf7-6612-4ddf-ae04-5ffee0d3a550 +vulnerability,CVE-2024-47446,vulnerability--fc38c850-4133-49d1-9bf4-d0c9941becd1 +vulnerability,CVE-2024-47588,vulnerability--5a76170b-670a-4f5d-b24f-2d822801b89a +vulnerability,CVE-2024-47592,vulnerability--0b599c25-3ee0-47de-8506-e609295ff1f6 +vulnerability,CVE-2024-47439,vulnerability--3641e862-df09-4186-9884-ceacaafeaf8a +vulnerability,CVE-2024-47905,vulnerability--5cadbbc1-2f26-40a2-91bb-f441754eac22 +vulnerability,CVE-2024-47942,vulnerability--03183130-b128-4f19-ace2-567986fc8183 +vulnerability,CVE-2024-47457,vulnerability--a4eb1201-23dd-44ee-bd9a-7371aa244c3a +vulnerability,CVE-2024-47454,vulnerability--a7d37e21-73f7-4898-8c8d-00b8aab25947 +vulnerability,CVE-2024-47907,vulnerability--04755de4-fec8-4386-860d-6271c4bb7f4f +vulnerability,CVE-2024-47586,vulnerability--1901f44f-d027-44cc-8d53-2ff75c7bc5b2 +vulnerability,CVE-2024-47436,vulnerability--e3947adc-25cb-40cd-b06a-e98b4c2ac1b4 +vulnerability,CVE-2024-47449,vulnerability--ac2eee53-b914-41f9-aeb6-b774445bd83e +vulnerability,CVE-2024-47431,vulnerability--29cb0177-1c38-4441-9b90-a07b104748c8 +vulnerability,CVE-2024-47940,vulnerability--d8b825f0-bd90-484f-b6aa-52f5075d0cc3 +vulnerability,CVE-2024-47435,vulnerability--b925914e-e6f5-46a9-aa46-1cd7dbfd4518 +vulnerability,CVE-2024-47451,vulnerability--bcd8c1b9-7724-45f5-b7d4-ecd375427ccd +vulnerability,CVE-2024-47441,vulnerability--e528ddf5-b6bd-4455-b7c8-316a9617cd5a +vulnerability,CVE-2024-47452,vulnerability--1a1aea2d-a8ef-483c-9a4b-f2223771f281 +vulnerability,CVE-2024-47906,vulnerability--95357a53-5b6e-4c53-a6a2-27fc1f3bf17a +vulnerability,CVE-2024-47427,vulnerability--28a3b06d-7c73-47e7-b178-7b3e50ed5320 +vulnerability,CVE-2024-47434,vulnerability--6e09d518-c1c4-457b-833e-9a0e4735f12a +vulnerability,CVE-2024-47443,vulnerability--19d52fc8-1f99-4cd8-ba01-2b6333023ba2 +vulnerability,CVE-2024-47429,vulnerability--fef2024f-4808-4b18-a224-be90742382c9 +vulnerability,CVE-2024-47445,vulnerability--04a48be3-c36d-4ea9-9632-eaef706c72cd +vulnerability,CVE-2024-47941,vulnerability--26fc905e-4a90-4649-aefa-527a1ebdd880 +vulnerability,CVE-2024-47432,vulnerability--c5fedf50-8e23-4c87-b54c-101884f35b54 +vulnerability,CVE-2024-47428,vulnerability--dc01ba92-b64a-4d48-bd09-e42c0549a251 +vulnerability,CVE-2024-47426,vulnerability--565a50ce-0cd7-4388-8883-f041366d502b +vulnerability,CVE-2024-47437,vulnerability--d73a97a5-9f3f-4c7d-a197-3177ade05a41 +vulnerability,CVE-2024-47450,vulnerability--8a7d8d2d-dcee-4b5b-b1b5-f93a7fc977c3 +vulnerability,CVE-2024-47909,vulnerability--223a28db-7405-46cd-acd6-46261a4b8c57 +vulnerability,CVE-2024-47535,vulnerability--e27a0369-262f-48c8-ab70-96b741a56be1 +vulnerability,CVE-2024-47783,vulnerability--148ef938-caec-4bb8-b0f0-1cda25ba8e88 +vulnerability,CVE-2024-47799,vulnerability--a7dc3f6d-fe26-4fad-82fc-da38ae0d3d94 +vulnerability,CVE-2024-47442,vulnerability--fa3cf72b-a7d4-4dd1-8acb-1eb08bd2ddfa +vulnerability,CVE-2024-47456,vulnerability--be0bca73-51ce-4ce6-b6c1-1575f015df09 +vulnerability,CVE-2024-47453,vulnerability--2d09203e-1b25-4916-b3e8-a6feb74a80ba +vulnerability,CVE-2024-47438,vulnerability--29e54b86-f0e2-4bb6-8057-fe1d3ec8e481 +vulnerability,CVE-2024-47595,vulnerability--21649b56-e027-4c04-8ee7-bf86c772db47 +vulnerability,CVE-2024-47808,vulnerability--9d018067-8503-41a9-8b43-079dd789f084 +vulnerability,CVE-2024-47593,vulnerability--ef0c04e2-c20f-4b6d-bde9-36e59a9c6ccc +vulnerability,CVE-2024-47590,vulnerability--3e96e7f2-9978-4063-bbeb-a2a512ecfea5 +vulnerability,CVE-2024-47433,vulnerability--30da3ad4-aedb-4ff5-bcd2-47261a9d13a5 +vulnerability,CVE-2024-50328,vulnerability--95a7b821-0e17-466e-bf3c-8b82e14638c1 +vulnerability,CVE-2024-50323,vulnerability--d4b60e6c-6a33-4762-bc49-0b567bd87b76 +vulnerability,CVE-2024-50318,vulnerability--4226bfe8-cda3-49c1-80db-8bb8ac9b7154 +vulnerability,CVE-2024-50317,vulnerability--050110ed-c513-4ad1-8c32-41a635c1b30c +vulnerability,CVE-2024-50559,vulnerability--871fcc30-6821-40d7-8a7a-cfcf41fedaf3 +vulnerability,CVE-2024-50601,vulnerability--02ac4c98-8d6b-4d21-8c82-29b1be70402a +vulnerability,CVE-2024-50310,vulnerability--a5cfa80e-6206-4c0d-a7e9-284c823149b9 +vulnerability,CVE-2024-50572,vulnerability--47ad3cd5-dc11-4c79-9518-c4af3fb92aa0 +vulnerability,CVE-2024-50331,vulnerability--7cd68cda-35f2-47c7-9485-d510482e55d8 +vulnerability,CVE-2024-50561,vulnerability--580bc8ce-f115-424b-a2b3-3623dae09ef3 +vulnerability,CVE-2024-50313,vulnerability--960003f8-bc02-43dc-8965-54bd0f3221d6 +vulnerability,CVE-2024-50321,vulnerability--ec0fed9d-f4fd-4bea-a82a-9b1e155addec +vulnerability,CVE-2024-50636,vulnerability--a2dd819d-bcaa-4051-947f-3826e461c6c6 +vulnerability,CVE-2024-50558,vulnerability--4f030a42-108d-4a11-ba80-166172d9172e +vulnerability,CVE-2024-50557,vulnerability--e9b966b7-c438-41bf-b37e-3a3fdc32f5b2 +vulnerability,CVE-2024-50327,vulnerability--1212a1df-5b47-4bd4-99a8-bf152c79736b +vulnerability,CVE-2024-50329,vulnerability--6cb4dc67-0346-469d-8d30-e58c76ea881e +vulnerability,CVE-2024-50324,vulnerability--696833b1-005b-41b5-97dd-20a2f807008f +vulnerability,CVE-2024-50320,vulnerability--7e00e874-274c-4f23-aacc-fe2eb21c05bc +vulnerability,CVE-2024-50336,vulnerability--72a796f8-c6b5-4dab-b3df-9a85846189d5 +vulnerability,CVE-2024-50386,vulnerability--b68c835a-d5aa-4885-985e-1bd558a30610 +vulnerability,CVE-2024-50326,vulnerability--0f8f057d-5360-4527-91c3-eb6fe704cf3f +vulnerability,CVE-2024-50319,vulnerability--6d8b6f41-7ed0-426a-bdcf-e148481a7527 +vulnerability,CVE-2024-50330,vulnerability--45409522-158f-44f5-b4e5-b2157aaf1249 +vulnerability,CVE-2024-50560,vulnerability--1a699dc2-8ea1-4c59-a585-f470059ae16c +vulnerability,CVE-2024-50322,vulnerability--093fd410-acd8-4182-acf3-fd125a0a5162 +vulnerability,CVE-2024-26011,vulnerability--dd3c34cc-ae1e-4f89-949d-0f4c69d2017f +vulnerability,CVE-2024-7571,vulnerability--27098a43-46cc-49bc-911c-24a5bb13b71d +vulnerability,CVE-2024-7516,vulnerability--e3270cf9-6ab9-4ae7-97fe-68117214729e +vulnerability,CVE-2024-25254,vulnerability--a7b2ccab-9767-4d8e-a4e5-7f7504c84712 +vulnerability,CVE-2024-25255,vulnerability--4fe0881f-604e-403b-9553-11891be57d12 +vulnerability,CVE-2024-25253,vulnerability--863ea478-12db-4d60-8860-94f6d45c6c5a +vulnerability,CVE-2024-11110,vulnerability--e40d0b4e-99f6-4927-ad9e-ff57e8f11310 +vulnerability,CVE-2024-11126,vulnerability--a4e2153c-c538-4c1c-b2b8-e36d315ba946 +vulnerability,CVE-2024-11125,vulnerability--1d920cac-1aaa-47f2-91b1-ecebdc59fbaa +vulnerability,CVE-2024-11114,vulnerability--dc212d2e-b914-4be6-a858-4e6197f0c3d5 +vulnerability,CVE-2024-11007,vulnerability--1e242caa-9c8f-4729-9868-70611add1521 +vulnerability,CVE-2024-11111,vulnerability--d4aef99d-da8d-47f4-b2e2-bac57bcec7ff +vulnerability,CVE-2024-11100,vulnerability--b40b1570-6b01-496a-a613-19d98443f1a3 +vulnerability,CVE-2024-11097,vulnerability--80d28fca-113e-47f6-b17a-ec90f8730ca3 +vulnerability,CVE-2024-11006,vulnerability--5380ee20-4896-487e-9c0e-0d97c0467cee +vulnerability,CVE-2024-11113,vulnerability--d8968b18-2ca4-4342-82cb-57ca275c6d4c +vulnerability,CVE-2024-11102,vulnerability--e6483c26-71b5-4aba-9985-62983c3bf045 +vulnerability,CVE-2024-11168,vulnerability--0c801698-ee76-468a-b7d2-02dcd77e7305 +vulnerability,CVE-2024-11127,vulnerability--290ec42d-8a9d-4eee-bc01-5115cb121310 +vulnerability,CVE-2024-11099,vulnerability--9b5462f9-a3cb-4535-89d5-fa94007d3c87 +vulnerability,CVE-2024-11101,vulnerability--2d51d367-bdf6-4e01-b93c-fb86dbab8e9d +vulnerability,CVE-2024-11112,vulnerability--dc324211-511c-4b32-a9f6-d4a997fb2b7e +vulnerability,CVE-2024-11079,vulnerability--58ee2dd5-aa40-4a49-ae06-0a6ac483e17e +vulnerability,CVE-2024-11123,vulnerability--3637b4ce-291c-43d7-8d0f-9dc1ba336f92 +vulnerability,CVE-2024-11005,vulnerability--8670f060-99d9-4638-bd00-ee9493459a66 +vulnerability,CVE-2024-11121,vulnerability--13266cd9-ab5f-4fd4-b309-516e4f2adb02 +vulnerability,CVE-2024-11138,vulnerability--64c805c9-d6b1-4c0f-bc14-9a9659b667ff +vulnerability,CVE-2024-11130,vulnerability--f385a1d3-7704-40ea-9c72-760d45e7bd57 +vulnerability,CVE-2024-11096,vulnerability--afd5f4fa-a03e-49c6-b3ea-2185bde7d575 +vulnerability,CVE-2024-11122,vulnerability--0ca4c694-65f3-4697-92a2-ed853dc948cf +vulnerability,CVE-2024-11124,vulnerability--c9def297-8907-4888-bdd3-ca936a5e3c7e +vulnerability,CVE-2024-11116,vulnerability--bbea4377-7519-4a0b-8229-5cbb73d9c3b8 +vulnerability,CVE-2024-11117,vulnerability--e090ca1a-bddd-47ee-ad23-7798fb7614af +vulnerability,CVE-2024-11115,vulnerability--f58fbba1-23e9-4645-94eb-fd8355ffd2c2 +vulnerability,CVE-2024-11004,vulnerability--7a7ac2b1-b7b6-4a00-b0d5-59097584a15b +vulnerability,CVE-2024-44102,vulnerability--f4b0245c-75f4-4aa4-81e2-a17c3602f351 +vulnerability,CVE-2024-33505,vulnerability--5051cc27-2d05-42fc-b703-5ce4d8092880 +vulnerability,CVE-2024-33510,vulnerability--8b27fed4-17bd-42e1-b6e9-37c48ecb08c8 +vulnerability,CVE-2024-33660,vulnerability--d13f5a46-62aa-4066-9da5-788a7c572e4b +vulnerability,CVE-2024-33658,vulnerability--d1145c42-7c2a-4f5d-889e-10de0bd236c9 +vulnerability,CVE-2024-8068,vulnerability--e08d03dd-7866-41a2-af78-d75ba05af7c0 +vulnerability,CVE-2024-8069,vulnerability--d80340d7-0dbf-4f72-a991-e11859c10007 +vulnerability,CVE-2024-8535,vulnerability--0aa55ba3-e263-481e-bb79-a181d0cb7ba8 +vulnerability,CVE-2024-8881,vulnerability--6707a637-018e-495f-a7fa-c407102696a2 +vulnerability,CVE-2024-8534,vulnerability--c4754f98-d326-4c7a-9924-94a35c260c4d +vulnerability,CVE-2024-8882,vulnerability--5aee4211-a639-4300-86d9-6f069d78c16a +vulnerability,CVE-2024-8074,vulnerability--8aec430f-eade-43bf-aef1-7a350409ae56 +vulnerability,CVE-2024-8539,vulnerability--0fddec66-8a26-4a1b-8efa-fea6cb753e47 +vulnerability,CVE-2024-8495,vulnerability--7ebc731f-4f88-45bd-9ea6-5a1dbc8cfcfa +vulnerability,CVE-2024-38255,vulnerability--647fd113-a933-4d1d-aa64-4f80a5022637 +vulnerability,CVE-2024-38264,vulnerability--49de9927-6e42-42cf-8c81-f5b1721e8946 +vulnerability,CVE-2024-38203,vulnerability--31b00ecf-1efc-4ed6-b221-0768beb6fb48 +vulnerability,CVE-2024-40592,vulnerability--66a1b6c0-023e-4b10-a926-debb3ed2be94 +vulnerability,CVE-2024-31496,vulnerability--c6b96f49-cb1d-430d-9c24-309431714fdc +vulnerability,CVE-2024-21976,vulnerability--a15ffed8-73c2-4f50-ac20-029012626791 +vulnerability,CVE-2024-21975,vulnerability--93b22c5a-b7e3-4742-8140-acd31412d5e9 +vulnerability,CVE-2024-21937,vulnerability--ecc38d4a-ccd0-4594-9cce-b1320db57f2f +vulnerability,CVE-2024-21939,vulnerability--b7962680-89f7-405f-8324-26d9f71c918e +vulnerability,CVE-2024-21945,vulnerability--9990b9e0-6694-4d17-9a4d-aef4fefdc6b1 +vulnerability,CVE-2024-21946,vulnerability--e07200a3-ad5e-4554-99f9-b6a5f26c213d +vulnerability,CVE-2024-21974,vulnerability--ba908d66-cc37-4b63-9535-6ab10ea9e9bf +vulnerability,CVE-2024-21958,vulnerability--1eb3e9ee-8bd7-4099-be90-87ce8fd03429 +vulnerability,CVE-2024-21957,vulnerability--ed752481-0158-44a1-9d35-96252991e611 +vulnerability,CVE-2024-21949,vulnerability--43c0af8f-7e01-4435-af12-ec1716081748 +vulnerability,CVE-2024-21938,vulnerability--7eb94e41-e2f9-425b-8235-e11a89a03f93 +vulnerability,CVE-2024-37365,vulnerability--f4847043-ba15-47a6-8e32-996cc2c8f8d0 +vulnerability,CVE-2024-35274,vulnerability--47a65a05-7365-4a7c-b50b-86771e353d61 +vulnerability,CVE-2024-49016,vulnerability--aca46458-9fc1-44de-a60c-634acb277029 +vulnerability,CVE-2024-49525,vulnerability--4dbb895a-59d3-4fb3-b063-329d6ca3bffb +vulnerability,CVE-2024-49009,vulnerability--c566103e-619c-4bf5-919e-633ae21b5a2c +vulnerability,CVE-2024-49014,vulnerability--2b0d3baa-fb95-40f1-a00b-97515b0507ab +vulnerability,CVE-2024-49042,vulnerability--f3a7ad26-3bb0-46ba-92ff-9beee62bf8ac +vulnerability,CVE-2024-49528,vulnerability--2653f5f3-4ab3-4e18-8b64-567ef0d99605 +vulnerability,CVE-2024-49029,vulnerability--32de0503-4718-4fdf-b618-b6375ebdddb1 +vulnerability,CVE-2024-49015,vulnerability--784dcd38-c6d0-4df1-9f13-e2dba19edfb0 +vulnerability,CVE-2024-49005,vulnerability--f87aac57-b256-4019-9063-535184b11eff +vulnerability,CVE-2024-49395,vulnerability--f26db443-67df-4bcb-b865-f91eda81c3c0 +vulnerability,CVE-2024-49560,vulnerability--23fae757-590c-468e-9ab6-308f370ad5d7 +vulnerability,CVE-2024-49527,vulnerability--532b5a24-9ca7-4780-8012-62fb3ba5020b +vulnerability,CVE-2024-49514,vulnerability--6e3510b0-2d02-44f4-a506-d5ded33236e0 +vulnerability,CVE-2024-49044,vulnerability--e8ffcdf5-96c9-4524-8afe-603295c480ab +vulnerability,CVE-2024-49369,vulnerability--4b21d402-b716-4d2a-b3ad-d64e45ea991b +vulnerability,CVE-2024-49033,vulnerability--426856c3-ee11-462d-8be8-cfbc24b8f6d0 +vulnerability,CVE-2024-49012,vulnerability--37d80a4c-37a3-4e10-bff8-0b44f57f12fd +vulnerability,CVE-2024-49018,vulnerability--0dfd86ae-c774-448a-80ff-75373c4759af +vulnerability,CVE-2024-49032,vulnerability--763e1b20-7238-4e53-b6f4-53d4dc850a68 +vulnerability,CVE-2024-49056,vulnerability--fdfbc83d-0cd3-47ab-817c-444016d57d80 +vulnerability,CVE-2024-49051,vulnerability--661c4e92-68b0-4a79-8fc8-7e0082aaa24e +vulnerability,CVE-2024-49030,vulnerability--b00b8199-c7c6-4e84-9567-f1c3131e1157 +vulnerability,CVE-2024-49048,vulnerability--8839773a-edc8-45fc-9c83-ecfe73f0ea24 +vulnerability,CVE-2024-49003,vulnerability--ae9ae53f-d095-4af3-9037-04ab6505dfa3 +vulnerability,CVE-2024-49517,vulnerability--bd820712-3638-4597-9c33-196053fec9db +vulnerability,CVE-2024-49027,vulnerability--c6240f40-dc79-4800-be89-a19bda088744 +vulnerability,CVE-2024-49393,vulnerability--1c7ded7d-b681-4168-b753-ac8a98c45909 +vulnerability,CVE-2024-49000,vulnerability--c897949e-fee8-48f8-bb35-e463f6d51f14 +vulnerability,CVE-2024-49518,vulnerability--d9293001-ab4b-4ebf-b8fb-39960bbe3a8d +vulnerability,CVE-2024-49050,vulnerability--8b4a7aa1-6afb-4ce9-ac47-f20ac055c5fa +vulnerability,CVE-2024-49004,vulnerability--772b9c18-af98-4823-9ff3-b46e88b7aa2f +vulnerability,CVE-2024-49512,vulnerability--3045713a-135a-4f36-af7e-edf1e7add4ee +vulnerability,CVE-2024-49007,vulnerability--1efa7430-123f-43c7-bf49-e01853941841 +vulnerability,CVE-2024-49013,vulnerability--55e8f969-21b5-4e42-914b-7ef04c62a74a +vulnerability,CVE-2024-49002,vulnerability--a9781eaf-72c9-4301-90db-8ba8c79d7068 +vulnerability,CVE-2024-49017,vulnerability--0959809b-7889-4246-8da2-17e4fbe2ed2c +vulnerability,CVE-2024-49521,vulnerability--a4e9e35d-5e6b-4721-81c8-a802ff1b0385 +vulnerability,CVE-2024-49046,vulnerability--6266184b-be2b-47bb-b5a4-170cd3729425 +vulnerability,CVE-2024-49011,vulnerability--9a99d717-d23f-45f2-8451-63826f334705 +vulnerability,CVE-2024-49006,vulnerability--45ef9b02-c0fc-48e6-8542-2fb223d00383 +vulnerability,CVE-2024-49558,vulnerability--c50932fe-80e5-4441-8478-1b0be8570367 +vulnerability,CVE-2024-49520,vulnerability--4ee6b52f-7f47-4b7e-84b4-6c1456cb9c6e +vulnerability,CVE-2024-49001,vulnerability--820993d4-bd28-4fef-b98d-b89293f719f8 +vulnerability,CVE-2024-49515,vulnerability--bcd7f009-972c-48b5-b11c-0671a843c1b6 +vulnerability,CVE-2024-49557,vulnerability--d0e692b0-f1aa-4cb6-8717-d3b0b65e6a58 +vulnerability,CVE-2024-49031,vulnerability--77813cc8-d3d8-490c-af24-41653a21f3fa +vulnerability,CVE-2024-49039,vulnerability--76a91f49-1d17-4e12-958f-819975085abe +vulnerability,CVE-2024-49049,vulnerability--98b809b7-c734-45f7-a703-27f12c7686f0 +vulnerability,CVE-2024-49508,vulnerability--fde0f482-7365-4d21-a8c1-f2d1a2bbc49e +vulnerability,CVE-2024-49019,vulnerability--5692012f-9b28-46cb-be41-e580f5c52587 +vulnerability,CVE-2024-49516,vulnerability--0a04204e-fed1-4e73-a7a0-bd23d2c9bcdf +vulnerability,CVE-2024-49026,vulnerability--ceae359c-cc22-442f-a542-5e126f1b204e +vulnerability,CVE-2024-49519,vulnerability--3fe84a4c-dd37-4fb1-b9f6-655f27ce9a8a +vulnerability,CVE-2024-49043,vulnerability--dbcb7bdc-4394-4903-a4a6-ab41e7a76cb3 +vulnerability,CVE-2024-49394,vulnerability--856e0712-3654-427c-82fe-95f11312b9f7 +vulnerability,CVE-2024-49510,vulnerability--75133cdd-a7b6-468c-948e-1ab34b48e561 +vulnerability,CVE-2024-49526,vulnerability--bb646117-2d16-4e80-ba98-b024285f737a +vulnerability,CVE-2024-49511,vulnerability--84104d42-849a-4bf9-9b76-ed68bc92b4a3 +vulnerability,CVE-2024-49507,vulnerability--a9e468e8-111c-41f5-9831-caa27044f357 +vulnerability,CVE-2024-49021,vulnerability--7bef1c69-cde8-46c6-8618-c97935a17fc7 +vulnerability,CVE-2024-49509,vulnerability--87e7b77e-2464-4ba2-8de2-2240ad122fc6 +vulnerability,CVE-2024-49008,vulnerability--eccb6415-a545-4335-9dea-c3fa772895d1 +vulnerability,CVE-2024-49010,vulnerability--571e3b7d-c39b-47a6-bbd2-cf59a2fce1ba +vulnerability,CVE-2024-49040,vulnerability--66aa9cba-a743-46ec-86a1-e5ab6f84db19 +vulnerability,CVE-2024-49028,vulnerability--f7a856f0-2596-417b-924c-88c630873d20 +vulnerability,CVE-2024-23983,vulnerability--0069fcab-3eb7-4cd2-b0b0-913740ab9f3f +vulnerability,CVE-2024-23666,vulnerability--0524688a-e415-43c6-a443-a810b49e9b3c +vulnerability,CVE-2024-2207,vulnerability--ea5eccd9-044d-4265-ae81-bd26b785125c +vulnerability,CVE-2024-2208,vulnerability--0c490060-a968-47a7-8df8-062df28db102 +vulnerability,CVE-2024-2315,vulnerability--350dcff0-b0ee-4b50-b373-423bff935dd0 +vulnerability,CVE-2024-36140,vulnerability--d5ddaad8-e133-4c11-96fc-30c55a2a0191 +vulnerability,CVE-2024-36513,vulnerability--b2d17cf2-8a33-46f9-bf64-0b0504796cc7 +vulnerability,CVE-2024-36507,vulnerability--471e83d9-b6fc-4f5b-be7b-0f425fb4f63e +vulnerability,CVE-2024-36509,vulnerability--7efc30ea-4076-439e-a7ac-0f92dd62263a +vulnerability,CVE-2024-46894,vulnerability--819a8fc4-00bb-4854-81a4-a492a8905203 +vulnerability,CVE-2024-46890,vulnerability--21d10593-03c4-42cd-90f3-2d66f7652481 +vulnerability,CVE-2024-46888,vulnerability--58a3cf5a-5054-4129-848c-82201b1f8e49 +vulnerability,CVE-2024-46891,vulnerability--7c5e23db-33be-48ca-a699-95a99bad9b52 +vulnerability,CVE-2024-46892,vulnerability--071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de +vulnerability,CVE-2024-46889,vulnerability--f51253e6-2d7e-429b-a380-f05090e3b53b +vulnerability,CVE-2024-42442,vulnerability--c471e26d-1892-4fbb-9657-ce3770ab3d71 +vulnerability,CVE-2024-42372,vulnerability--b3dd53ce-650c-4558-9c1b-818f564293c5 +vulnerability,CVE-2024-32117,vulnerability--a21100ac-a25a-4842-9f29-a59cfc9a3b83 +vulnerability,CVE-2024-32116,vulnerability--785d5e66-460e-4001-80dd-58bb14e2f123 +vulnerability,CVE-2024-32118,vulnerability--515f577a-7bbe-47ef-9691-39b6b0a14687 +vulnerability,CVE-2024-28728,vulnerability--55f2c19f-f22a-443b-b787-9cd2c188725f +vulnerability,CVE-2024-28731,vulnerability--ab45a4ca-3692-45e5-8952-abdfdba95ca3 +vulnerability,CVE-2024-28730,vulnerability--638315c0-a5a8-4430-81d7-1261ed030ec8 +vulnerability,CVE-2024-28729,vulnerability--44a6fb28-44a9-4c1f-b978-3366fa216f22 +vulnerability,CVE-2024-28726,vulnerability--f841ccf1-d10b-4d58-943e-14caa84ff4cb +vulnerability,CVE-2024-29075,vulnerability--26e20b26-6d1b-4bfa-a65c-972c9a7403e1 +vulnerability,CVE-2024-29119,vulnerability--6c945fcd-be54-46df-bb2f-4378c8c2c4a6 +vulnerability,CVE-2024-43621,vulnerability--ddd52939-e79b-450e-a85b-ed0694b4c702 +vulnerability,CVE-2024-43625,vulnerability--f709efd0-3a14-4e23-ad75-11513c5ba8e3 +vulnerability,CVE-2024-43620,vulnerability--6567d8cd-7981-4d4f-b6a5-9b6d098b4d4e +vulnerability,CVE-2024-43634,vulnerability--bab5919e-c707-4183-bbd5-ef0f40bea99b +vulnerability,CVE-2024-43635,vulnerability--b1344162-71e1-4d3b-a782-570359eb51a1 +vulnerability,CVE-2024-43449,vulnerability--57eb971c-94bd-4433-9e3e-a082964aba1f +vulnerability,CVE-2024-43624,vulnerability--8381f1af-05af-4eb4-afaf-578a7c49e3ca +vulnerability,CVE-2024-43646,vulnerability--1cf5ed06-3f0a-4a88-9d49-742afccfd53d +vulnerability,CVE-2024-43642,vulnerability--967b60b1-2be3-48b4-a4cf-b250e594e6b1 +vulnerability,CVE-2024-43627,vulnerability--abca7fdb-37b8-4043-b05d-ed9066ea5a33 +vulnerability,CVE-2024-43447,vulnerability--7c2d8c17-dc26-4b13-b1ba-a15988d5cc6b +vulnerability,CVE-2024-43451,vulnerability--ef6322cd-5620-41a1-a6b7-3d54e1c5bca8 +vulnerability,CVE-2024-43598,vulnerability--1d90b99a-cc17-4070-98b1-dd5d031d8cd6 +vulnerability,CVE-2024-43450,vulnerability--17edf8b4-fac9-49d8-a824-5cff6fd8b371 +vulnerability,CVE-2024-43639,vulnerability--f74f79bb-bc47-4534-886e-5c509a7f12e4 +vulnerability,CVE-2024-43628,vulnerability--f1e663af-47f3-4fa2-bad1-e28dfb32f693 +vulnerability,CVE-2024-43643,vulnerability--faeb4115-48ae-4d39-a065-099a7263a070 +vulnerability,CVE-2024-43613,vulnerability--b1fda952-3945-4c67-a43f-15220f6732ab +vulnerability,CVE-2024-43631,vulnerability--cbb70ff9-124f-4ea4-88f8-9cea9ddacbce +vulnerability,CVE-2024-43637,vulnerability--53288a7e-3b87-4189-a3e3-9ab9f042abd9 +vulnerability,CVE-2024-43498,vulnerability--b0cc991e-e240-4023-b7b1-3e916fbb4a6d +vulnerability,CVE-2024-43623,vulnerability--c84d6f87-d092-4a61-b20e-530a2c81e1a1 +vulnerability,CVE-2024-43630,vulnerability--93cc7dc5-dd72-4abc-b2da-ee570f974acc +vulnerability,CVE-2024-43602,vulnerability--f1c0e401-cd81-4e4d-b583-0c7a01176691 +vulnerability,CVE-2024-43530,vulnerability--975a0312-f028-47fc-8a28-270673c2b904 +vulnerability,CVE-2024-43641,vulnerability--d6cad59b-61d0-4d87-ab5c-1d2a99232340 +vulnerability,CVE-2024-43626,vulnerability--7bc09bcf-2cff-40a5-85ca-c8d83125da23 +vulnerability,CVE-2024-43638,vulnerability--0efa6760-f36b-44ca-b145-258613b5c95a +vulnerability,CVE-2024-43644,vulnerability--fbc96916-45f1-4cc3-bdd2-d8c9ed5aff8d +vulnerability,CVE-2024-43452,vulnerability--9817978c-f04a-49ac-aa74-07fdd5265012 +vulnerability,CVE-2024-43629,vulnerability--72b824c3-f3ff-4c15-9ac9-166819c0a979 +vulnerability,CVE-2024-43459,vulnerability--b51b45f2-2fc6-40d1-8078-1e8c396b3510 +vulnerability,CVE-2024-43645,vulnerability--4ab4b9d3-cb64-4e8c-9097-8a6756711846 +vulnerability,CVE-2024-43633,vulnerability--f33664b4-8e82-4d66-8db0-09537b805647 +vulnerability,CVE-2024-43462,vulnerability--08862ec1-e603-43e5-8c54-22c6f0512c34 +vulnerability,CVE-2024-43499,vulnerability--3d55683d-396f-40c6-8099-06f649478efe +vulnerability,CVE-2024-43640,vulnerability--a62a92d2-5828-425d-a13f-f0daec89d9a4 +vulnerability,CVE-2024-43622,vulnerability--3946e5d3-3aac-4b52-987e-becce8b148c2 +vulnerability,CVE-2024-43636,vulnerability--ec368531-1131-4b3d-9bb8-16a04511a557 +vulnerability,CVE-2024-43415,vulnerability--0d683d9d-d567-4793-85aa-8ab5e5d248d5 +vulnerability,CVE-2021-27701,vulnerability--001074ac-4ae3-4229-94ea-dace86c1c179 +vulnerability,CVE-2021-27700,vulnerability--5c4e65b1-0606-43e6-ace2-e70cc673a939 +vulnerability,CVE-2021-27702,vulnerability--043627e3-59b0-44e8-b969-bfc0cd7dadad +vulnerability,CVE-2021-27704,vulnerability--2aea823b-c69b-4f51-be9c-2bc88ed7d835 +vulnerability,CVE-2021-27703,vulnerability--2f85d85c-a445-492f-a827-cd74d54eda05 +vulnerability,CVE-2023-52268,vulnerability--3befe86a-316b-4990-abcd-ce306ebc91ef +vulnerability,CVE-2023-47543,vulnerability--ae4fc22c-9b49-4ed2-ba55-1a0700625e6f +vulnerability,CVE-2023-50176,vulnerability--bab8acd7-f159-480d-a49a-48d7d7ba9a67 +vulnerability,CVE-2023-44255,vulnerability--3901419e-cf22-4c11-84cc-1bf3bbc1413f +vulnerability,CVE-2023-32736,vulnerability--11ecff62-4c33-4ca3-88ed-ef18dcfc8206 diff --git a/objects/vulnerability/vulnerability--001074ac-4ae3-4229-94ea-dace86c1c179.json b/objects/vulnerability/vulnerability--001074ac-4ae3-4229-94ea-dace86c1c179.json new file mode 100644 index 00000000000..3eb392abb80 --- /dev/null +++ b/objects/vulnerability/vulnerability--001074ac-4ae3-4229-94ea-dace86c1c179.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9df06a27-1d3a-4a0e-a256-8c55953a2940", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--001074ac-4ae3-4229-94ea-dace86c1c179", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:50.078478Z", + "modified": "2024-11-13T00:20:50.078478Z", + "name": "CVE-2021-27701", + "description": "SOCIFI Socifi Guest wifi as SAAS is affected by Cross Site Request Forgery (CSRF) via the Socifi wifi portal. The application does not contain a CSRF token and request validation. An attacker can Add/Modify any random user data by sending a crafted CSRF request.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2021-27701" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0026fb67-9a3b-4598-a12d-d6052e3175ab.json b/objects/vulnerability/vulnerability--0026fb67-9a3b-4598-a12d-d6052e3175ab.json new file mode 100644 index 00000000000..e8f85a9554c --- /dev/null +++ b/objects/vulnerability/vulnerability--0026fb67-9a3b-4598-a12d-d6052e3175ab.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2ae17d2c-b174-425c-89d3-1e24053ae2d0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0026fb67-9a3b-4598-a12d-d6052e3175ab", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.500303Z", + "modified": "2024-11-13T00:20:44.500303Z", + "name": "CVE-2024-10943", + "description": "An\nauthentication bypass vulnerability exists in the affected product. The\nvulnerability exists due to shared secrets across accounts and could allow a threat\nactor to impersonate a user if the threat actor is able to enumerate additional\ninformation required during authentication.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10943" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0069fcab-3eb7-4cd2-b0b0-913740ab9f3f.json b/objects/vulnerability/vulnerability--0069fcab-3eb7-4cd2-b0b0-913740ab9f3f.json new file mode 100644 index 00000000000..9f1198e5c5b --- /dev/null +++ b/objects/vulnerability/vulnerability--0069fcab-3eb7-4cd2-b0b0-913740ab9f3f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b18d07a4-88a8-458a-9f00-42676ee321d2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0069fcab-3eb7-4cd2-b0b0-913740ab9f3f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.1002Z", + "modified": "2024-11-13T00:20:46.1002Z", + "name": "CVE-2024-23983", + "description": "Improper handling of canonical URL-encoding may lead to bypass not properly constrained by request rules.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-23983" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--02ac4c98-8d6b-4d21-8c82-29b1be70402a.json b/objects/vulnerability/vulnerability--02ac4c98-8d6b-4d21-8c82-29b1be70402a.json new file mode 100644 index 00000000000..81384311cca --- /dev/null +++ b/objects/vulnerability/vulnerability--02ac4c98-8d6b-4d21-8c82-29b1be70402a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1c19884f-b3b7-420b-896e-b6b74ee607b0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--02ac4c98-8d6b-4d21-8c82-29b1be70402a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.775306Z", + "modified": "2024-11-13T00:20:44.775306Z", + "name": "CVE-2024-50601", + "description": "Persistent and reflected XSS vulnerabilities in the themeMode cookie and _h URL parameter of Axigen Mail Server up to version 10.5.28 allow attackers to execute arbitrary Javascript. Exploitation could lead to session hijacking, data leakage, and further exploitation via a multi-stage attack. Fixed in versions 10.3.3.67, 10.4.42, and 10.5.29.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50601" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--03183130-b128-4f19-ace2-567986fc8183.json b/objects/vulnerability/vulnerability--03183130-b128-4f19-ace2-567986fc8183.json new file mode 100644 index 00000000000..d90d1059c58 --- /dev/null +++ b/objects/vulnerability/vulnerability--03183130-b128-4f19-ace2-567986fc8183.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f11adbb5-31e1-48dc-beb7-2a30a0329e98", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--03183130-b128-4f19-ace2-567986fc8183", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.683803Z", + "modified": "2024-11-13T00:20:44.683803Z", + "name": "CVE-2024-47942", + "description": "A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 9). The affected applications suffer from a DLL hijacking vulnerability. This could allow an attacker to execute arbitrary code via placing a crafted DLL file on the system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47942" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--034644fc-1db3-4e2d-ad94-8a9bfcf9197f.json b/objects/vulnerability/vulnerability--034644fc-1db3-4e2d-ad94-8a9bfcf9197f.json new file mode 100644 index 00000000000..ed4c97d9ef5 --- /dev/null +++ b/objects/vulnerability/vulnerability--034644fc-1db3-4e2d-ad94-8a9bfcf9197f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d33f7df1-39d0-474f-89e9-579b1e3079c0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--034644fc-1db3-4e2d-ad94-8a9bfcf9197f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.582031Z", + "modified": "2024-11-13T00:20:44.582031Z", + "name": "CVE-2024-9843", + "description": "A buffer over-read in Ivanti Secure Access Client before 22.7R4 allows a local unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9843" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--043627e3-59b0-44e8-b969-bfc0cd7dadad.json b/objects/vulnerability/vulnerability--043627e3-59b0-44e8-b969-bfc0cd7dadad.json new file mode 100644 index 00000000000..b390578a165 --- /dev/null +++ b/objects/vulnerability/vulnerability--043627e3-59b0-44e8-b969-bfc0cd7dadad.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3afaab1f-8253-4214-b838-0f40ab6125ed", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--043627e3-59b0-44e8-b969-bfc0cd7dadad", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:50.118745Z", + "modified": "2024-11-13T00:20:50.118745Z", + "name": "CVE-2021-27702", + "description": "Sercomm Router Etisalat Model S3- AC2100 is affected by Incorrect Access Control via the diagnostic utility in the router dashboard.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2021-27702" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--04755de4-fec8-4386-860d-6271c4bb7f4f.json b/objects/vulnerability/vulnerability--04755de4-fec8-4386-860d-6271c4bb7f4f.json new file mode 100644 index 00000000000..0356f4b4839 --- /dev/null +++ b/objects/vulnerability/vulnerability--04755de4-fec8-4386-860d-6271c4bb7f4f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--700c0e89-ede0-4103-a620-360083686ce1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--04755de4-fec8-4386-860d-6271c4bb7f4f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.688843Z", + "modified": "2024-11-13T00:20:44.688843Z", + "name": "CVE-2024-47907", + "description": "A stack-based buffer overflow in IPsec of Ivanti Connect Secure before version 22.7R2.3 allows a remote unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47907" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--04a48be3-c36d-4ea9-9632-eaef706c72cd.json b/objects/vulnerability/vulnerability--04a48be3-c36d-4ea9-9632-eaef706c72cd.json new file mode 100644 index 00000000000..af848d65574 --- /dev/null +++ b/objects/vulnerability/vulnerability--04a48be3-c36d-4ea9-9632-eaef706c72cd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8428ecb3-f4ab-4949-b7fd-a504879b9a2a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--04a48be3-c36d-4ea9-9632-eaef706c72cd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.722081Z", + "modified": "2024-11-13T00:20:44.722081Z", + "name": "CVE-2024-47445", + "description": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47445" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--050110ed-c513-4ad1-8c32-41a635c1b30c.json b/objects/vulnerability/vulnerability--050110ed-c513-4ad1-8c32-41a635c1b30c.json new file mode 100644 index 00000000000..d13f364e5b7 --- /dev/null +++ b/objects/vulnerability/vulnerability--050110ed-c513-4ad1-8c32-41a635c1b30c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--47840c25-2cea-4731-a680-2e4c5ab2bce4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--050110ed-c513-4ad1-8c32-41a635c1b30c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.767708Z", + "modified": "2024-11-13T00:20:44.767708Z", + "name": "CVE-2024-50317", + "description": "A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50317" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0524688a-e415-43c6-a443-a810b49e9b3c.json b/objects/vulnerability/vulnerability--0524688a-e415-43c6-a443-a810b49e9b3c.json new file mode 100644 index 00000000000..6c5a0dbfab5 --- /dev/null +++ b/objects/vulnerability/vulnerability--0524688a-e415-43c6-a443-a810b49e9b3c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9ba32f62-caeb-49d4-9bd4-2581e9a4c70d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0524688a-e415-43c6-a443-a810b49e9b3c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.115037Z", + "modified": "2024-11-13T00:20:46.115037Z", + "name": "CVE-2024-23666", + "description": "A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData \r\nat least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiManager version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14 allows attacker to improper access control via crafted requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-23666" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de.json b/objects/vulnerability/vulnerability--071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de.json new file mode 100644 index 00000000000..6fc43d0dfb8 --- /dev/null +++ b/objects/vulnerability/vulnerability--071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--91d39f6a-a311-42a3-ae44-d8aabcc2a5fb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--071d26c0-a5fe-4dc1-bb4f-7776e9e3e8de", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.313854Z", + "modified": "2024-11-13T00:20:46.313854Z", + "name": "CVE-2024-46892", + "description": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly invalidate sessions when the associated user is deleted or disabled or their permissions are modified. This could allow an authenticated attacker to continue performing malicious actions even after their user account has been disabled.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46892" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--08862ec1-e603-43e5-8c54-22c6f0512c34.json b/objects/vulnerability/vulnerability--08862ec1-e603-43e5-8c54-22c6f0512c34.json new file mode 100644 index 00000000000..da478fd7bcf --- /dev/null +++ b/objects/vulnerability/vulnerability--08862ec1-e603-43e5-8c54-22c6f0512c34.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--426c674e-3ffa-4840-83fd-af3a48d4568c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--08862ec1-e603-43e5-8c54-22c6f0512c34", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.953034Z", + "modified": "2024-11-13T00:20:46.953034Z", + "name": "CVE-2024-43462", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43462" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--08cabef1-4df5-475c-9c1d-06acd67c271d.json b/objects/vulnerability/vulnerability--08cabef1-4df5-475c-9c1d-06acd67c271d.json new file mode 100644 index 00000000000..fa8a09ae9ee --- /dev/null +++ b/objects/vulnerability/vulnerability--08cabef1-4df5-475c-9c1d-06acd67c271d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f82a8319-bd20-4e52-b1bb-42084ad7ecc1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--08cabef1-4df5-475c-9c1d-06acd67c271d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.259306Z", + "modified": "2024-11-13T00:20:44.259306Z", + "name": "CVE-2024-48837", + "description": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48837" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--093fd410-acd8-4182-acf3-fd125a0a5162.json b/objects/vulnerability/vulnerability--093fd410-acd8-4182-acf3-fd125a0a5162.json new file mode 100644 index 00000000000..9c777b28e76 --- /dev/null +++ b/objects/vulnerability/vulnerability--093fd410-acd8-4182-acf3-fd125a0a5162.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a9933373-486d-4763-8e2f-f6ccd8869e80", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--093fd410-acd8-4182-acf3-fd125a0a5162", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.837388Z", + "modified": "2024-11-13T00:20:44.837388Z", + "name": "CVE-2024-50322", + "description": "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50322" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0959809b-7889-4246-8da2-17e4fbe2ed2c.json b/objects/vulnerability/vulnerability--0959809b-7889-4246-8da2-17e4fbe2ed2c.json new file mode 100644 index 00000000000..da758fae255 --- /dev/null +++ b/objects/vulnerability/vulnerability--0959809b-7889-4246-8da2-17e4fbe2ed2c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--56a053e1-6d08-405b-a468-8efb59b8cd03", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0959809b-7889-4246-8da2-17e4fbe2ed2c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.040715Z", + "modified": "2024-11-13T00:20:46.040715Z", + "name": "CVE-2024-49017", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49017" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0a04204e-fed1-4e73-a7a0-bd23d2c9bcdf.json b/objects/vulnerability/vulnerability--0a04204e-fed1-4e73-a7a0-bd23d2c9bcdf.json new file mode 100644 index 00000000000..20859e0373a --- /dev/null +++ b/objects/vulnerability/vulnerability--0a04204e-fed1-4e73-a7a0-bd23d2c9bcdf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6ecd233f-cafd-4a92-a2f5-d50afe2745f8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0a04204e-fed1-4e73-a7a0-bd23d2c9bcdf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.06349Z", + "modified": "2024-11-13T00:20:46.06349Z", + "name": "CVE-2024-49516", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49516" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0aa55ba3-e263-481e-bb79-a181d0cb7ba8.json b/objects/vulnerability/vulnerability--0aa55ba3-e263-481e-bb79-a181d0cb7ba8.json new file mode 100644 index 00000000000..0846ad8d449 --- /dev/null +++ b/objects/vulnerability/vulnerability--0aa55ba3-e263-481e-bb79-a181d0cb7ba8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--379c1b6c-7c25-46cc-847d-6c4474a2b07b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0aa55ba3-e263-481e-bb79-a181d0cb7ba8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.291184Z", + "modified": "2024-11-13T00:20:45.291184Z", + "name": "CVE-2024-8535", + "description": "Authenticated user can access unintended user capabilities in NetScaler ADC and NetScaler Gateway if the appliance must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) with KCDAccount configuration for Kerberos SSO to access backend resources OR the appliance must be configured as an Auth Server (AAA Vserver) with KCDAccount configuration for Kerberos SSO to access backend resources", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8535" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0b599c25-3ee0-47de-8506-e609295ff1f6.json b/objects/vulnerability/vulnerability--0b599c25-3ee0-47de-8506-e609295ff1f6.json new file mode 100644 index 00000000000..0594f739909 --- /dev/null +++ b/objects/vulnerability/vulnerability--0b599c25-3ee0-47de-8506-e609295ff1f6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--84d32d19-aca5-4232-b6a7-95c795f3318b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0b599c25-3ee0-47de-8506-e609295ff1f6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.678196Z", + "modified": "2024-11-13T00:20:44.678196Z", + "name": "CVE-2024-47592", + "description": "SAP NetWeaver AS Java allows an unauthenticated attacker to brute force the login functionality in order to identify the legitimate user IDs. This has an impact on confidentiality but not on integrity or availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47592" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0c490060-a968-47a7-8df8-062df28db102.json b/objects/vulnerability/vulnerability--0c490060-a968-47a7-8df8-062df28db102.json new file mode 100644 index 00000000000..3e9d4340ec5 --- /dev/null +++ b/objects/vulnerability/vulnerability--0c490060-a968-47a7-8df8-062df28db102.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--04a33780-e40e-4c6b-9d73-42ce19720afc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0c490060-a968-47a7-8df8-062df28db102", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.183857Z", + "modified": "2024-11-13T00:20:46.183857Z", + "name": "CVE-2024-2208", + "description": "Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. Sound Research has released driver updates to mitigate the potential vulnerabilities.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-2208" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0c801698-ee76-468a-b7d2-02dcd77e7305.json b/objects/vulnerability/vulnerability--0c801698-ee76-468a-b7d2-02dcd77e7305.json new file mode 100644 index 00000000000..46f6e07d8eb --- /dev/null +++ b/objects/vulnerability/vulnerability--0c801698-ee76-468a-b7d2-02dcd77e7305.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e15779ea-abb2-4171-a9ed-6bee851c541b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0c801698-ee76-468a-b7d2-02dcd77e7305", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.03314Z", + "modified": "2024-11-13T00:20:45.03314Z", + "name": "CVE-2024-11168", + "description": "The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11168" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0ca4c694-65f3-4697-92a2-ed853dc948cf.json b/objects/vulnerability/vulnerability--0ca4c694-65f3-4697-92a2-ed853dc948cf.json new file mode 100644 index 00000000000..b1a8f975e8f --- /dev/null +++ b/objects/vulnerability/vulnerability--0ca4c694-65f3-4697-92a2-ed853dc948cf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a16dd3de-8822-4655-accd-e583654d69a4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0ca4c694-65f3-4697-92a2-ed853dc948cf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.049533Z", + "modified": "2024-11-13T00:20:45.049533Z", + "name": "CVE-2024-11122", + "description": "A vulnerability, which was classified as critical, has been found in 上海灵当信息科技有限公司 Lingdang CRM up to 8.6.4.3. Affected by this issue is some unknown functionality of the file /crm/wechatSession/index.php?msgid=1&operation=upload. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11122" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0d683d9d-d567-4793-85aa-8ab5e5d248d5.json b/objects/vulnerability/vulnerability--0d683d9d-d567-4793-85aa-8ab5e5d248d5.json new file mode 100644 index 00000000000..b23259c24f1 --- /dev/null +++ b/objects/vulnerability/vulnerability--0d683d9d-d567-4793-85aa-8ab5e5d248d5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--669f5faa-69df-4c74-a207-c8b76014850a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0d683d9d-d567-4793-85aa-8ab5e5d248d5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.964792Z", + "modified": "2024-11-13T00:20:46.964792Z", + "name": "CVE-2024-43415", + "description": "An improper neutralization of special elements used in an SQL command in the papertrail/version- model of the decidim_awesome-module <= v0.11.1 (> 0.9.0) allows an authenticated admin user to manipulate sql queries to disclose information, read and write files or execute commands.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43415" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0dfd86ae-c774-448a-80ff-75373c4759af.json b/objects/vulnerability/vulnerability--0dfd86ae-c774-448a-80ff-75373c4759af.json new file mode 100644 index 00000000000..49a74145b1a --- /dev/null +++ b/objects/vulnerability/vulnerability--0dfd86ae-c774-448a-80ff-75373c4759af.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ffb80e71-65e1-4113-9cfa-10f8c090aa17", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0dfd86ae-c774-448a-80ff-75373c4759af", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.924982Z", + "modified": "2024-11-13T00:20:45.924982Z", + "name": "CVE-2024-49018", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49018" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0efa6760-f36b-44ca-b145-258613b5c95a.json b/objects/vulnerability/vulnerability--0efa6760-f36b-44ca-b145-258613b5c95a.json new file mode 100644 index 00000000000..fa689cb098c --- /dev/null +++ b/objects/vulnerability/vulnerability--0efa6760-f36b-44ca-b145-258613b5c95a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e2866699-3b93-474c-89f3-c69e8c9a4f49", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0efa6760-f36b-44ca-b145-258613b5c95a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.939371Z", + "modified": "2024-11-13T00:20:46.939371Z", + "name": "CVE-2024-43638", + "description": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43638" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0f53ba76-f1a0-4bc1-a83f-2e0b286dd3f3.json b/objects/vulnerability/vulnerability--0f53ba76-f1a0-4bc1-a83f-2e0b286dd3f3.json new file mode 100644 index 00000000000..08ad36f0048 --- /dev/null +++ b/objects/vulnerability/vulnerability--0f53ba76-f1a0-4bc1-a83f-2e0b286dd3f3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--58c2285f-4951-4ee2-aaa6-9a35ce6aa070", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0f53ba76-f1a0-4bc1-a83f-2e0b286dd3f3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.62002Z", + "modified": "2024-11-13T00:20:44.62002Z", + "name": "CVE-2024-39281", + "description": "The command ctl_persistent_reserve_out allows the caller to specify an arbitrary size which will be passed to the kernel's memory allocator.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-39281" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0f8f057d-5360-4527-91c3-eb6fe704cf3f.json b/objects/vulnerability/vulnerability--0f8f057d-5360-4527-91c3-eb6fe704cf3f.json new file mode 100644 index 00000000000..c3a267d150f --- /dev/null +++ b/objects/vulnerability/vulnerability--0f8f057d-5360-4527-91c3-eb6fe704cf3f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b8dbf15e-542b-4c57-ae20-212b6f2236e5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0f8f057d-5360-4527-91c3-eb6fe704cf3f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.826148Z", + "modified": "2024-11-13T00:20:44.826148Z", + "name": "CVE-2024-50326", + "description": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50326" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0fddec66-8a26-4a1b-8efa-fea6cb753e47.json b/objects/vulnerability/vulnerability--0fddec66-8a26-4a1b-8efa-fea6cb753e47.json new file mode 100644 index 00000000000..49a90a276ee --- /dev/null +++ b/objects/vulnerability/vulnerability--0fddec66-8a26-4a1b-8efa-fea6cb753e47.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--27e9f89e-0a30-4e8c-96a0-2ea404a011cc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0fddec66-8a26-4a1b-8efa-fea6cb753e47", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.330214Z", + "modified": "2024-11-13T00:20:45.330214Z", + "name": "CVE-2024-8539", + "description": "Improper authorization in Ivanti Secure Access Client before version 22.7R3 allows a local authenticated attacker to modify sensitive configuration files.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8539" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--11ecff62-4c33-4ca3-88ed-ef18dcfc8206.json b/objects/vulnerability/vulnerability--11ecff62-4c33-4ca3-88ed-ef18dcfc8206.json new file mode 100644 index 00000000000..ea632e6eb56 --- /dev/null +++ b/objects/vulnerability/vulnerability--11ecff62-4c33-4ca3-88ed-ef18dcfc8206.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--308d64c0-c6af-4ee9-8136-d2a6732d750f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--11ecff62-4c33-4ca3-88ed-ef18dcfc8206", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:56.022342Z", + "modified": "2024-11-13T00:20:56.022342Z", + "name": "CVE-2023-32736", + "description": "A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All versions), SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 Safety V16 (All versions), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 8), SIMATIC STEP 7 Safety V18 (All versions < V18 Update 5), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions < V17 Update 8), SIMATIC STEP 7 V18 (All versions < V18 Update 5), SIMATIC WinCC Unified V16 (All versions), SIMATIC WinCC Unified V17 (All versions < V17 Update 8), SIMATIC WinCC Unified V18 (All versions < V18 Update 5), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions < V17 Update 8), SIMATIC WinCC V18 (All versions < V18 Update 5), SIMOCODE ES V16 (All versions), SIMOCODE ES V17 (All versions < V17 Update 8), SIMOCODE ES V18 (All versions), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions < V17 Update 8), SIRIUS Safety ES V18 (All versions), SIRIUS Soft Starter ES V17 (All versions < V17 Update 8), SIRIUS Soft Starter ES V18 (All versions), TIA Portal Cloud V16 (All versions), TIA Portal Cloud V17 (All versions < V4.6.0.1), TIA Portal Cloud V18 (All versions < V4.6.1.0). Affected products do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-32736" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1212a1df-5b47-4bd4-99a8-bf152c79736b.json b/objects/vulnerability/vulnerability--1212a1df-5b47-4bd4-99a8-bf152c79736b.json new file mode 100644 index 00000000000..e76ff130540 --- /dev/null +++ b/objects/vulnerability/vulnerability--1212a1df-5b47-4bd4-99a8-bf152c79736b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e9eb2756-e0ec-4063-97bb-b1a14f0f9a64", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1212a1df-5b47-4bd4-99a8-bf152c79736b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.808069Z", + "modified": "2024-11-13T00:20:44.808069Z", + "name": "CVE-2024-50327", + "description": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50327" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--13266cd9-ab5f-4fd4-b309-516e4f2adb02.json b/objects/vulnerability/vulnerability--13266cd9-ab5f-4fd4-b309-516e4f2adb02.json new file mode 100644 index 00000000000..cd114ba5d00 --- /dev/null +++ b/objects/vulnerability/vulnerability--13266cd9-ab5f-4fd4-b309-516e4f2adb02.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e1d4451a-8abb-4076-ba2b-a091fb47580e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--13266cd9-ab5f-4fd4-b309-516e4f2adb02", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.04426Z", + "modified": "2024-11-13T00:20:45.04426Z", + "name": "CVE-2024-11121", + "description": "A vulnerability classified as critical was found in 上海灵当信息科技有限公司 Lingdang CRM up to 8.6.4.3. Affected by this vulnerability is an unknown functionality of the file /crm/WeiXinApp/marketing/index.php?module=Users&action=getActionList. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11121" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--148ef938-caec-4bb8-b0f0-1cda25ba8e88.json b/objects/vulnerability/vulnerability--148ef938-caec-4bb8-b0f0-1cda25ba8e88.json new file mode 100644 index 00000000000..df04317da2d --- /dev/null +++ b/objects/vulnerability/vulnerability--148ef938-caec-4bb8-b0f0-1cda25ba8e88.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9703a9a2-a038-4e1f-a561-93f3bb99b77e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--148ef938-caec-4bb8-b0f0-1cda25ba8e88", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.741496Z", + "modified": "2024-11-13T00:20:44.741496Z", + "name": "CVE-2024-47783", + "description": "A vulnerability has been identified in SIPORT (All versions < V3.4.0). The affected application improperly assigns file permissions to installation folders.\r\n\r\nThis could allow a local attacker with an unprivileged account to override or modify the service executables and subsequently gain elevated privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47783" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--17edf8b4-fac9-49d8-a824-5cff6fd8b371.json b/objects/vulnerability/vulnerability--17edf8b4-fac9-49d8-a824-5cff6fd8b371.json new file mode 100644 index 00000000000..27ba9d67ac2 --- /dev/null +++ b/objects/vulnerability/vulnerability--17edf8b4-fac9-49d8-a824-5cff6fd8b371.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ed0f7398-fae5-4131-aa71-c2f8546fc05f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--17edf8b4-fac9-49d8-a824-5cff6fd8b371", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.904359Z", + "modified": "2024-11-13T00:20:46.904359Z", + "name": "CVE-2024-43450", + "description": "Windows DNS Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43450" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--18d19dd8-aec4-4197-83f4-e0a351e7ac0c.json b/objects/vulnerability/vulnerability--18d19dd8-aec4-4197-83f4-e0a351e7ac0c.json new file mode 100644 index 00000000000..290b141211b --- /dev/null +++ b/objects/vulnerability/vulnerability--18d19dd8-aec4-4197-83f4-e0a351e7ac0c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--77d58e79-876c-4b67-a78d-45833ad60a38", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--18d19dd8-aec4-4197-83f4-e0a351e7ac0c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.533592Z", + "modified": "2024-11-13T00:20:44.533592Z", + "name": "CVE-2024-10217", + "description": "XSS Attack in mar.jar, Monitoring Archive Utility (MAR Utility), monitoringconsolecommon.jar in TIBCO Software Inc TIBCO Hawk and TIBCO Operational Intelligence", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10217" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1901f44f-d027-44cc-8d53-2ff75c7bc5b2.json b/objects/vulnerability/vulnerability--1901f44f-d027-44cc-8d53-2ff75c7bc5b2.json new file mode 100644 index 00000000000..614ef7d334f --- /dev/null +++ b/objects/vulnerability/vulnerability--1901f44f-d027-44cc-8d53-2ff75c7bc5b2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b78d5cb1-e246-4518-96dc-3e3ecd61286f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1901f44f-d027-44cc-8d53-2ff75c7bc5b2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.690448Z", + "modified": "2024-11-13T00:20:44.690448Z", + "name": "CVE-2024-47586", + "description": "SAP NetWeaver Application Server for ABAP and ABAP Platform allows an unauthenticated attacker to send a maliciously crafted http request which could cause a null pointer dereference in the kernel. This dereference will result in the system crashing and rebooting, causing the system to be temporarily unavailable. There is no impact on Confidentiality or Integrity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47586" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--19d52fc8-1f99-4cd8-ba01-2b6333023ba2.json b/objects/vulnerability/vulnerability--19d52fc8-1f99-4cd8-ba01-2b6333023ba2.json new file mode 100644 index 00000000000..3bc5d40dc8e --- /dev/null +++ b/objects/vulnerability/vulnerability--19d52fc8-1f99-4cd8-ba01-2b6333023ba2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--227f46b5-fcc6-448f-9883-9740759bb5bc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--19d52fc8-1f99-4cd8-ba01-2b6333023ba2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.719794Z", + "modified": "2024-11-13T00:20:44.719794Z", + "name": "CVE-2024-47443", + "description": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47443" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1a1aea2d-a8ef-483c-9a4b-f2223771f281.json b/objects/vulnerability/vulnerability--1a1aea2d-a8ef-483c-9a4b-f2223771f281.json new file mode 100644 index 00000000000..ec051970a8b --- /dev/null +++ b/objects/vulnerability/vulnerability--1a1aea2d-a8ef-483c-9a4b-f2223771f281.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--16862734-c00c-4a58-afeb-f19b04792f9a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1a1aea2d-a8ef-483c-9a4b-f2223771f281", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.709038Z", + "modified": "2024-11-13T00:20:44.709038Z", + "name": "CVE-2024-47452", + "description": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47452" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1a699dc2-8ea1-4c59-a585-f470059ae16c.json b/objects/vulnerability/vulnerability--1a699dc2-8ea1-4c59-a585-f470059ae16c.json new file mode 100644 index 00000000000..f8eab7800f4 --- /dev/null +++ b/objects/vulnerability/vulnerability--1a699dc2-8ea1-4c59-a585-f470059ae16c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0cc9d7e8-e93e-4b9e-b8eb-b2956291babd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1a699dc2-8ea1-4c59-a585-f470059ae16c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.83561Z", + "modified": "2024-11-13T00:20:44.83561Z", + "name": "CVE-2024-50560", + "description": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices truncates usernames longer than 15 characters when accessed via SSH or Telnet. This could allow an attacker to compromise system integrity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50560" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1ad39a48-420f-4943-a51a-832dca3d2fd0.json b/objects/vulnerability/vulnerability--1ad39a48-420f-4943-a51a-832dca3d2fd0.json new file mode 100644 index 00000000000..b160dd7f240 --- /dev/null +++ b/objects/vulnerability/vulnerability--1ad39a48-420f-4943-a51a-832dca3d2fd0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b134fe77-82ee-4295-a599-8324045bd58d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1ad39a48-420f-4943-a51a-832dca3d2fd0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.198139Z", + "modified": "2024-11-13T00:20:44.198139Z", + "name": "CVE-2024-51093", + "description": "Cross Site Scripting vulnerability in Snipe-IT v.7.0.13 allows a remote attacker to escalate privileges via an unknown part of the file /users/{{user-id}}/#files.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51093" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1c7ded7d-b681-4168-b753-ac8a98c45909.json b/objects/vulnerability/vulnerability--1c7ded7d-b681-4168-b753-ac8a98c45909.json new file mode 100644 index 00000000000..87b5f1346d9 --- /dev/null +++ b/objects/vulnerability/vulnerability--1c7ded7d-b681-4168-b753-ac8a98c45909.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d8990f8b-4e01-44fb-8a3f-f031fd6e7880", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1c7ded7d-b681-4168-b753-ac8a98c45909", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.01482Z", + "modified": "2024-11-13T00:20:46.01482Z", + "name": "CVE-2024-49393", + "description": "In neomutt and mutt, the To and Cc email headers are not validated by cryptographic signing which allows an attacker that intercepts a message to change their value and include himself as a one of the recipients to compromise message confidentiality.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49393" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1ce696f4-2b3f-40fc-bc46-466063b2ed34.json b/objects/vulnerability/vulnerability--1ce696f4-2b3f-40fc-bc46-466063b2ed34.json new file mode 100644 index 00000000000..099749e4b57 --- /dev/null +++ b/objects/vulnerability/vulnerability--1ce696f4-2b3f-40fc-bc46-466063b2ed34.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--21515d13-cbcc-4c1d-b8bc-b546676d88e2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1ce696f4-2b3f-40fc-bc46-466063b2ed34", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.476412Z", + "modified": "2024-11-13T00:20:44.476412Z", + "name": "CVE-2024-10179", + "description": "The Slickstream: Engagement and Conversions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's slick-grid shortcode in all versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10179" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1cf5ed06-3f0a-4a88-9d49-742afccfd53d.json b/objects/vulnerability/vulnerability--1cf5ed06-3f0a-4a88-9d49-742afccfd53d.json new file mode 100644 index 00000000000..61fb9844aa1 --- /dev/null +++ b/objects/vulnerability/vulnerability--1cf5ed06-3f0a-4a88-9d49-742afccfd53d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--457c61da-1a64-464d-9142-d05c3c063233", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1cf5ed06-3f0a-4a88-9d49-742afccfd53d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.885046Z", + "modified": "2024-11-13T00:20:46.885046Z", + "name": "CVE-2024-43646", + "description": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43646" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1d90b99a-cc17-4070-98b1-dd5d031d8cd6.json b/objects/vulnerability/vulnerability--1d90b99a-cc17-4070-98b1-dd5d031d8cd6.json new file mode 100644 index 00000000000..6069eddf139 --- /dev/null +++ b/objects/vulnerability/vulnerability--1d90b99a-cc17-4070-98b1-dd5d031d8cd6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--653adf7a-e37a-4612-a9de-e7dd2760b7b2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1d90b99a-cc17-4070-98b1-dd5d031d8cd6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.901578Z", + "modified": "2024-11-13T00:20:46.901578Z", + "name": "CVE-2024-43598", + "description": "LightGBM Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43598" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1d920cac-1aaa-47f2-91b1-ecebdc59fbaa.json b/objects/vulnerability/vulnerability--1d920cac-1aaa-47f2-91b1-ecebdc59fbaa.json new file mode 100644 index 00000000000..2c3c696a078 --- /dev/null +++ b/objects/vulnerability/vulnerability--1d920cac-1aaa-47f2-91b1-ecebdc59fbaa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d08041f4-9bb0-468e-83c4-176e55d73e5f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1d920cac-1aaa-47f2-91b1-ecebdc59fbaa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.021658Z", + "modified": "2024-11-13T00:20:45.021658Z", + "name": "CVE-2024-11125", + "description": "A vulnerability was found in GetSimpleCMS 3.3.16 and classified as problematic. This issue affects some unknown processing of the file /admin/profile.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11125" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1e242caa-9c8f-4729-9868-70611add1521.json b/objects/vulnerability/vulnerability--1e242caa-9c8f-4729-9868-70611add1521.json new file mode 100644 index 00000000000..9fa49e5829d --- /dev/null +++ b/objects/vulnerability/vulnerability--1e242caa-9c8f-4729-9868-70611add1521.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4fa43b84-553a-4775-a2da-d3a8c40b6472", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1e242caa-9c8f-4729-9868-70611add1521", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.024243Z", + "modified": "2024-11-13T00:20:45.024243Z", + "name": "CVE-2024-11007", + "description": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11007" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1eb3e9ee-8bd7-4099-be90-87ce8fd03429.json b/objects/vulnerability/vulnerability--1eb3e9ee-8bd7-4099-be90-87ce8fd03429.json new file mode 100644 index 00000000000..d2e1996ace3 --- /dev/null +++ b/objects/vulnerability/vulnerability--1eb3e9ee-8bd7-4099-be90-87ce8fd03429.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b5508592-1da7-4e78-86f1-3769987c7d4a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1eb3e9ee-8bd7-4099-be90-87ce8fd03429", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.672216Z", + "modified": "2024-11-13T00:20:45.672216Z", + "name": "CVE-2024-21958", + "description": "Incorrect default permissions in the AMD Provisioning Console installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21958" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1efa7430-123f-43c7-bf49-e01853941841.json b/objects/vulnerability/vulnerability--1efa7430-123f-43c7-bf49-e01853941841.json new file mode 100644 index 00000000000..790591246b8 --- /dev/null +++ b/objects/vulnerability/vulnerability--1efa7430-123f-43c7-bf49-e01853941841.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--97230aac-838b-4db1-849d-4e1c092e5079", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1efa7430-123f-43c7-bf49-e01853941841", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.034116Z", + "modified": "2024-11-13T00:20:46.034116Z", + "name": "CVE-2024-49007", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49007" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--21649b56-e027-4c04-8ee7-bf86c772db47.json b/objects/vulnerability/vulnerability--21649b56-e027-4c04-8ee7-bf86c772db47.json new file mode 100644 index 00000000000..7a471d4d80f --- /dev/null +++ b/objects/vulnerability/vulnerability--21649b56-e027-4c04-8ee7-bf86c772db47.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--adf8b834-69ff-4574-ab79-92efce6e631b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--21649b56-e027-4c04-8ee7-bf86c772db47", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.751539Z", + "modified": "2024-11-13T00:20:44.751539Z", + "name": "CVE-2024-47595", + "description": "An attacker who gains local membership to sapsys group could replace local files usually protected by privileged access. On successful exploitation the attacker could cause high impact on confidentiality and integrity of the application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47595" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--218c6300-79e9-49fa-9bee-caec8c4852d2.json b/objects/vulnerability/vulnerability--218c6300-79e9-49fa-9bee-caec8c4852d2.json new file mode 100644 index 00000000000..abfb60b9d11 --- /dev/null +++ b/objects/vulnerability/vulnerability--218c6300-79e9-49fa-9bee-caec8c4852d2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1ab0cea7-0f7b-4e9e-b4b0-9cc09b275855", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--218c6300-79e9-49fa-9bee-caec8c4852d2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.436327Z", + "modified": "2024-11-13T00:20:44.436327Z", + "name": "CVE-2024-45114", + "description": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45114" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--21d10593-03c4-42cd-90f3-2d66f7652481.json b/objects/vulnerability/vulnerability--21d10593-03c4-42cd-90f3-2d66f7652481.json new file mode 100644 index 00000000000..06d10201f5e --- /dev/null +++ b/objects/vulnerability/vulnerability--21d10593-03c4-42cd-90f3-2d66f7652481.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9e49e631-0db2-406a-bf87-0370ef466f18", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--21d10593-03c4-42cd-90f3-2d66f7652481", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.286838Z", + "modified": "2024-11-13T00:20:46.286838Z", + "name": "CVE-2024-46890", + "description": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate input sent to specific endpoints of its web API. This could allow an authenticated remote attacker with high privileges on the application to execute arbitrary code on the underlying OS.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46890" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--223a28db-7405-46cd-acd6-46261a4b8c57.json b/objects/vulnerability/vulnerability--223a28db-7405-46cd-acd6-46261a4b8c57.json new file mode 100644 index 00000000000..685473ab67e --- /dev/null +++ b/objects/vulnerability/vulnerability--223a28db-7405-46cd-acd6-46261a4b8c57.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--611fdcc7-406e-425d-80da-a7cd9957f4d3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--223a28db-7405-46cd-acd6-46261a4b8c57", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.738893Z", + "modified": "2024-11-13T00:20:44.738893Z", + "name": "CVE-2024-47909", + "description": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47909" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--23fae757-590c-468e-9ab6-308f370ad5d7.json b/objects/vulnerability/vulnerability--23fae757-590c-468e-9ab6-308f370ad5d7.json new file mode 100644 index 00000000000..d4267c243f9 --- /dev/null +++ b/objects/vulnerability/vulnerability--23fae757-590c-468e-9ab6-308f370ad5d7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0def79a0-d412-432c-b696-3ced139ac1ac", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--23fae757-590c-468e-9ab6-308f370ad5d7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.912378Z", + "modified": "2024-11-13T00:20:45.912378Z", + "name": "CVE-2024-49560", + "description": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) a command injection vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49560" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--25cbc05b-265a-4188-b694-5193526e99fe.json b/objects/vulnerability/vulnerability--25cbc05b-265a-4188-b694-5193526e99fe.json new file mode 100644 index 00000000000..d2dda942645 --- /dev/null +++ b/objects/vulnerability/vulnerability--25cbc05b-265a-4188-b694-5193526e99fe.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1639e072-2f19-4b46-b024-aaf55993d26b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--25cbc05b-265a-4188-b694-5193526e99fe", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.188931Z", + "modified": "2024-11-13T00:20:44.188931Z", + "name": "CVE-2024-51750", + "description": "Element is a Matrix web client built using the Matrix React SDK. A malicious homeserver can send invalid messages over federation which can prevent Element Web and Desktop from rendering single messages or the entire room containing them. This was patched in Element Web and Desktop 1.11.85.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51750" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--25db4893-12ee-4f29-a74f-9910eb23d902.json b/objects/vulnerability/vulnerability--25db4893-12ee-4f29-a74f-9910eb23d902.json new file mode 100644 index 00000000000..b18838836f8 --- /dev/null +++ b/objects/vulnerability/vulnerability--25db4893-12ee-4f29-a74f-9910eb23d902.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7144628d-1850-4033-8eb8-a6631b777de6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--25db4893-12ee-4f29-a74f-9910eb23d902", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.553836Z", + "modified": "2024-11-13T00:20:44.553836Z", + "name": "CVE-2024-9836", + "description": "The RSS Feed Widget WordPress plugin before 3.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9836" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2653f5f3-4ab3-4e18-8b64-567ef0d99605.json b/objects/vulnerability/vulnerability--2653f5f3-4ab3-4e18-8b64-567ef0d99605.json new file mode 100644 index 00000000000..1c84c0c37dc --- /dev/null +++ b/objects/vulnerability/vulnerability--2653f5f3-4ab3-4e18-8b64-567ef0d99605.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4d997b6d-78df-4c99-9d3d-dd952016607c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2653f5f3-4ab3-4e18-8b64-567ef0d99605", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.904056Z", + "modified": "2024-11-13T00:20:45.904056Z", + "name": "CVE-2024-49528", + "description": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49528" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--26e20b26-6d1b-4bfa-a65c-972c9a7403e1.json b/objects/vulnerability/vulnerability--26e20b26-6d1b-4bfa-a65c-972c9a7403e1.json new file mode 100644 index 00000000000..b6dde6e8605 --- /dev/null +++ b/objects/vulnerability/vulnerability--26e20b26-6d1b-4bfa-a65c-972c9a7403e1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fbede34d-69d2-4318-9bd9-c788d5dbfa11", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--26e20b26-6d1b-4bfa-a65c-972c9a7403e1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.770231Z", + "modified": "2024-11-13T00:20:46.770231Z", + "name": "CVE-2024-29075", + "description": "Active debug code vulnerability exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may obtain or alter the settings of the device .", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-29075" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--26fc905e-4a90-4649-aefa-527a1ebdd880.json b/objects/vulnerability/vulnerability--26fc905e-4a90-4649-aefa-527a1ebdd880.json new file mode 100644 index 00000000000..10b46777f65 --- /dev/null +++ b/objects/vulnerability/vulnerability--26fc905e-4a90-4649-aefa-527a1ebdd880.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bf74d7df-8c15-41fe-84ae-efddfa20ce97", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--26fc905e-4a90-4649-aefa-527a1ebdd880", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.724517Z", + "modified": "2024-11-13T00:20:44.724517Z", + "name": "CVE-2024-47941", + "description": "A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 9). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47941" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--27098a43-46cc-49bc-911c-24a5bb13b71d.json b/objects/vulnerability/vulnerability--27098a43-46cc-49bc-911c-24a5bb13b71d.json new file mode 100644 index 00000000000..8d2f1f21f9b --- /dev/null +++ b/objects/vulnerability/vulnerability--27098a43-46cc-49bc-911c-24a5bb13b71d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--87cd6308-afcb-4c03-9277-e5419765aa70", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--27098a43-46cc-49bc-911c-24a5bb13b71d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.914922Z", + "modified": "2024-11-13T00:20:44.914922Z", + "name": "CVE-2024-7571", + "description": "Incorrect permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-7571" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--28a3b06d-7c73-47e7-b178-7b3e50ed5320.json b/objects/vulnerability/vulnerability--28a3b06d-7c73-47e7-b178-7b3e50ed5320.json new file mode 100644 index 00000000000..c2838918709 --- /dev/null +++ b/objects/vulnerability/vulnerability--28a3b06d-7c73-47e7-b178-7b3e50ed5320.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--03e4a20d-b14f-47c4-8b71-be6cb2c7f87e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--28a3b06d-7c73-47e7-b178-7b3e50ed5320", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.713375Z", + "modified": "2024-11-13T00:20:44.713375Z", + "name": "CVE-2024-47427", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47427" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--290ec42d-8a9d-4eee-bc01-5115cb121310.json b/objects/vulnerability/vulnerability--290ec42d-8a9d-4eee-bc01-5115cb121310.json new file mode 100644 index 00000000000..3c0fccdf3b0 --- /dev/null +++ b/objects/vulnerability/vulnerability--290ec42d-8a9d-4eee-bc01-5115cb121310.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--190e8837-6b23-4975-b1a1-ee1ed7ee7ecf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--290ec42d-8a9d-4eee-bc01-5115cb121310", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.03455Z", + "modified": "2024-11-13T00:20:45.03455Z", + "name": "CVE-2024-11127", + "description": "A vulnerability was found in code-projects Job Recruitment up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin.php. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11127" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--29cb0177-1c38-4441-9b90-a07b104748c8.json b/objects/vulnerability/vulnerability--29cb0177-1c38-4441-9b90-a07b104748c8.json new file mode 100644 index 00000000000..483dc8b4b62 --- /dev/null +++ b/objects/vulnerability/vulnerability--29cb0177-1c38-4441-9b90-a07b104748c8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d70d7cf6-e19c-4885-b747-c4e19dfd9e46", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--29cb0177-1c38-4441-9b90-a07b104748c8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.701845Z", + "modified": "2024-11-13T00:20:44.701845Z", + "name": "CVE-2024-47431", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47431" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--29e54b86-f0e2-4bb6-8057-fe1d3ec8e481.json b/objects/vulnerability/vulnerability--29e54b86-f0e2-4bb6-8057-fe1d3ec8e481.json new file mode 100644 index 00000000000..8737622c85e --- /dev/null +++ b/objects/vulnerability/vulnerability--29e54b86-f0e2-4bb6-8057-fe1d3ec8e481.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--45bc3135-7a91-476a-af2e-a74b39dc72b5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--29e54b86-f0e2-4bb6-8057-fe1d3ec8e481", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.750426Z", + "modified": "2024-11-13T00:20:44.750426Z", + "name": "CVE-2024-47438", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Write-what-where Condition vulnerability that could lead to a memory leak. This vulnerability allows an attacker to write a controlled value at a controlled memory location, which could result in the disclosure of sensitive memory content. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47438" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2aea823b-c69b-4f51-be9c-2bc88ed7d835.json b/objects/vulnerability/vulnerability--2aea823b-c69b-4f51-be9c-2bc88ed7d835.json new file mode 100644 index 00000000000..b7ae449176f --- /dev/null +++ b/objects/vulnerability/vulnerability--2aea823b-c69b-4f51-be9c-2bc88ed7d835.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--336e81e6-9fe3-4a8a-adf0-195031c308bb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2aea823b-c69b-4f51-be9c-2bc88ed7d835", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:50.123367Z", + "modified": "2024-11-13T00:20:50.123367Z", + "name": "CVE-2021-27704", + "description": "Appspace 6.2.4 is affected by Incorrect Access Control via the Appspace Web Portal password reset page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2021-27704" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2b0d3baa-fb95-40f1-a00b-97515b0507ab.json b/objects/vulnerability/vulnerability--2b0d3baa-fb95-40f1-a00b-97515b0507ab.json new file mode 100644 index 00000000000..42b568010db --- /dev/null +++ b/objects/vulnerability/vulnerability--2b0d3baa-fb95-40f1-a00b-97515b0507ab.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--97294987-fa9c-49fe-9153-87863960ee5c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2b0d3baa-fb95-40f1-a00b-97515b0507ab", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.899311Z", + "modified": "2024-11-13T00:20:45.899311Z", + "name": "CVE-2024-49014", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49014" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2b2afed9-fedc-42fa-bac0-f004701f0f6d.json b/objects/vulnerability/vulnerability--2b2afed9-fedc-42fa-bac0-f004701f0f6d.json new file mode 100644 index 00000000000..53e72521bb0 --- /dev/null +++ b/objects/vulnerability/vulnerability--2b2afed9-fedc-42fa-bac0-f004701f0f6d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9e8920a4-d7d8-47ef-90da-c058ea196ed6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2b2afed9-fedc-42fa-bac0-f004701f0f6d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.517008Z", + "modified": "2024-11-13T00:20:44.517008Z", + "name": "CVE-2024-10923", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText™ ALM Octane Management allows Stored XSS. The vulnerability could result in a remote code execution attack. \n\nThis issue affects ALM Octane Management: from 16.2.100 through 24.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10923" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2d09203e-1b25-4916-b3e8-a6feb74a80ba.json b/objects/vulnerability/vulnerability--2d09203e-1b25-4916-b3e8-a6feb74a80ba.json new file mode 100644 index 00000000000..a9775cf83cc --- /dev/null +++ b/objects/vulnerability/vulnerability--2d09203e-1b25-4916-b3e8-a6feb74a80ba.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--63a2de77-6b49-4774-8be4-ce0f62576dd7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2d09203e-1b25-4916-b3e8-a6feb74a80ba", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.749217Z", + "modified": "2024-11-13T00:20:44.749217Z", + "name": "CVE-2024-47453", + "description": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47453" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2d51d367-bdf6-4e01-b93c-fb86dbab8e9d.json b/objects/vulnerability/vulnerability--2d51d367-bdf6-4e01-b93c-fb86dbab8e9d.json new file mode 100644 index 00000000000..208e6311002 --- /dev/null +++ b/objects/vulnerability/vulnerability--2d51d367-bdf6-4e01-b93c-fb86dbab8e9d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5badd95f-f21a-4f59-b6dc-52b4b4e64245", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2d51d367-bdf6-4e01-b93c-fb86dbab8e9d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.037323Z", + "modified": "2024-11-13T00:20:45.037323Z", + "name": "CVE-2024-11101", + "description": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/search-invoices.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11101" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2f85d85c-a445-492f-a827-cd74d54eda05.json b/objects/vulnerability/vulnerability--2f85d85c-a445-492f-a827-cd74d54eda05.json new file mode 100644 index 00000000000..b4def92286a --- /dev/null +++ b/objects/vulnerability/vulnerability--2f85d85c-a445-492f-a827-cd74d54eda05.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3d794936-b25a-4dc6-8674-9a7f33385256", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2f85d85c-a445-492f-a827-cd74d54eda05", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:50.127124Z", + "modified": "2024-11-13T00:20:50.127124Z", + "name": "CVE-2021-27703", + "description": "Sercomm Model Etisalat Model S3- AC2100 is affected by Cross Site Scripting (XSS) via the firmware update page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2021-27703" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3045713a-135a-4f36-af7e-edf1e7add4ee.json b/objects/vulnerability/vulnerability--3045713a-135a-4f36-af7e-edf1e7add4ee.json new file mode 100644 index 00000000000..e2802662867 --- /dev/null +++ b/objects/vulnerability/vulnerability--3045713a-135a-4f36-af7e-edf1e7add4ee.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d3a74523-aaa1-42b3-9a99-fdbd880dbc8b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3045713a-135a-4f36-af7e-edf1e7add4ee", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.03112Z", + "modified": "2024-11-13T00:20:46.03112Z", + "name": "CVE-2024-49512", + "description": "InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49512" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--30da3ad4-aedb-4ff5-bcd2-47261a9d13a5.json b/objects/vulnerability/vulnerability--30da3ad4-aedb-4ff5-bcd2-47261a9d13a5.json new file mode 100644 index 00000000000..87cef23ec3e --- /dev/null +++ b/objects/vulnerability/vulnerability--30da3ad4-aedb-4ff5-bcd2-47261a9d13a5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--411cfdd7-4fb2-43bd-8b61-45852e077ae6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--30da3ad4-aedb-4ff5-bcd2-47261a9d13a5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.758337Z", + "modified": "2024-11-13T00:20:44.758337Z", + "name": "CVE-2024-47433", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47433" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--31b00ecf-1efc-4ed6-b221-0768beb6fb48.json b/objects/vulnerability/vulnerability--31b00ecf-1efc-4ed6-b221-0768beb6fb48.json new file mode 100644 index 00000000000..de35590b22f --- /dev/null +++ b/objects/vulnerability/vulnerability--31b00ecf-1efc-4ed6-b221-0768beb6fb48.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f352a0e2-487f-44c9-99f4-e8792f55cb93", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--31b00ecf-1efc-4ed6-b221-0768beb6fb48", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.382273Z", + "modified": "2024-11-13T00:20:45.382273Z", + "name": "CVE-2024-38203", + "description": "Windows Package Library Manager Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-38203" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--32de0503-4718-4fdf-b618-b6375ebdddb1.json b/objects/vulnerability/vulnerability--32de0503-4718-4fdf-b618-b6375ebdddb1.json new file mode 100644 index 00000000000..b2db73e6e0e --- /dev/null +++ b/objects/vulnerability/vulnerability--32de0503-4718-4fdf-b618-b6375ebdddb1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0d1fe99a-7c2a-44a1-a443-d17a15b143f7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--32de0503-4718-4fdf-b618-b6375ebdddb1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.904981Z", + "modified": "2024-11-13T00:20:45.904981Z", + "name": "CVE-2024-49029", + "description": "Microsoft Excel Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49029" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--350dcff0-b0ee-4b50-b373-423bff935dd0.json b/objects/vulnerability/vulnerability--350dcff0-b0ee-4b50-b373-423bff935dd0.json new file mode 100644 index 00000000000..c6bbdf00446 --- /dev/null +++ b/objects/vulnerability/vulnerability--350dcff0-b0ee-4b50-b373-423bff935dd0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--03d02ef8-a77d-458f-a6f1-71e541a40001", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--350dcff0-b0ee-4b50-b373-423bff935dd0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.207223Z", + "modified": "2024-11-13T00:20:46.207223Z", + "name": "CVE-2024-2315", + "description": "APTIOV contains a vulnerability in BIOS where may cause Improper Access Control by a local attacker. Successful exploitation of this vulnerability may lead to unexpected SPI flash modifications and BIOS boot kit launches, also impacting the availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-2315" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3637b4ce-291c-43d7-8d0f-9dc1ba336f92.json b/objects/vulnerability/vulnerability--3637b4ce-291c-43d7-8d0f-9dc1ba336f92.json new file mode 100644 index 00000000000..1a86f1e055b --- /dev/null +++ b/objects/vulnerability/vulnerability--3637b4ce-291c-43d7-8d0f-9dc1ba336f92.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--312b28d6-1f60-4354-8fbe-cffb2ed97a77", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3637b4ce-291c-43d7-8d0f-9dc1ba336f92", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.04104Z", + "modified": "2024-11-13T00:20:45.04104Z", + "name": "CVE-2024-11123", + "description": "A vulnerability, which was classified as problematic, was found in 上海灵当信息科技有限公司 Lingdang CRM up to 8.6.4.3. This affects an unknown part of the file /crm/data/pdf.php. The manipulation of the argument url with the input ../config.inc.php leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11123" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3641e862-df09-4186-9884-ceacaafeaf8a.json b/objects/vulnerability/vulnerability--3641e862-df09-4186-9884-ceacaafeaf8a.json new file mode 100644 index 00000000000..1e5419e4fa7 --- /dev/null +++ b/objects/vulnerability/vulnerability--3641e862-df09-4186-9884-ceacaafeaf8a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e0837743-40ba-4010-a05e-103047f76841", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3641e862-df09-4186-9884-ceacaafeaf8a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.681575Z", + "modified": "2024-11-13T00:20:44.681575Z", + "name": "CVE-2024-47439", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47439" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--37d80a4c-37a3-4e10-bff8-0b44f57f12fd.json b/objects/vulnerability/vulnerability--37d80a4c-37a3-4e10-bff8-0b44f57f12fd.json new file mode 100644 index 00000000000..9b7eddb4da0 --- /dev/null +++ b/objects/vulnerability/vulnerability--37d80a4c-37a3-4e10-bff8-0b44f57f12fd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--11bb9ab6-9a38-45b9-b494-430291662c94", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--37d80a4c-37a3-4e10-bff8-0b44f57f12fd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.924078Z", + "modified": "2024-11-13T00:20:45.924078Z", + "name": "CVE-2024-49012", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49012" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3901419e-cf22-4c11-84cc-1bf3bbc1413f.json b/objects/vulnerability/vulnerability--3901419e-cf22-4c11-84cc-1bf3bbc1413f.json new file mode 100644 index 00000000000..c2edc8cba7c --- /dev/null +++ b/objects/vulnerability/vulnerability--3901419e-cf22-4c11-84cc-1bf3bbc1413f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--314afd04-aa7f-4d18-b390-942c8f487906", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3901419e-cf22-4c11-84cc-1bf3bbc1413f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:54.681757Z", + "modified": "2024-11-13T00:20:54.681757Z", + "name": "CVE-2023-44255", + "description": "An exposure of sensitive information to an unauthorized actor [CWE-200] in Fortinet FortiManager before 7.4.2, FortiAnalyzer before 7.4.2 and FortiAnalyzer-BigData before 7.2.5 may allow a privileged attacker with administrative read permissions to read event logs of another adom via crafted HTTP or HTTPs requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-44255" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--392b4d25-d353-497d-b05c-85ebebe37f29.json b/objects/vulnerability/vulnerability--392b4d25-d353-497d-b05c-85ebebe37f29.json new file mode 100644 index 00000000000..3f5f7b7022f --- /dev/null +++ b/objects/vulnerability/vulnerability--392b4d25-d353-497d-b05c-85ebebe37f29.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--43b1a9da-86a9-4952-8019-ee036056652a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--392b4d25-d353-497d-b05c-85ebebe37f29", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.453488Z", + "modified": "2024-11-13T00:20:44.453488Z", + "name": "CVE-2024-45827", + "description": "Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may execute an arbitrary OS command.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45827" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3946e5d3-3aac-4b52-987e-becce8b148c2.json b/objects/vulnerability/vulnerability--3946e5d3-3aac-4b52-987e-becce8b148c2.json new file mode 100644 index 00000000000..b9cf5b6c891 --- /dev/null +++ b/objects/vulnerability/vulnerability--3946e5d3-3aac-4b52-987e-becce8b148c2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--28049cc9-8688-45eb-90da-46741a8aaeb5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3946e5d3-3aac-4b52-987e-becce8b148c2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.959306Z", + "modified": "2024-11-13T00:20:46.959306Z", + "name": "CVE-2024-43622", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43622" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3befe86a-316b-4990-abcd-ce306ebc91ef.json b/objects/vulnerability/vulnerability--3befe86a-316b-4990-abcd-ce306ebc91ef.json new file mode 100644 index 00000000000..d55c66724f3 --- /dev/null +++ b/objects/vulnerability/vulnerability--3befe86a-316b-4990-abcd-ce306ebc91ef.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5ff58de3-6672-4eb0-a5a2-e1ff7046afb2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3befe86a-316b-4990-abcd-ce306ebc91ef", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:54.21631Z", + "modified": "2024-11-13T00:20:54.21631Z", + "name": "CVE-2023-52268", + "description": "The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-52268" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3ceb8d54-e4c2-47fe-affc-5648253d550a.json b/objects/vulnerability/vulnerability--3ceb8d54-e4c2-47fe-affc-5648253d550a.json new file mode 100644 index 00000000000..c98b77e8278 --- /dev/null +++ b/objects/vulnerability/vulnerability--3ceb8d54-e4c2-47fe-affc-5648253d550a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--583684ef-994e-493b-9987-1c5a733a6486", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3ceb8d54-e4c2-47fe-affc-5648253d550a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.473292Z", + "modified": "2024-11-13T00:20:44.473292Z", + "name": "CVE-2024-10945", + "description": "A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10945" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3d55683d-396f-40c6-8099-06f649478efe.json b/objects/vulnerability/vulnerability--3d55683d-396f-40c6-8099-06f649478efe.json new file mode 100644 index 00000000000..9cc95631934 --- /dev/null +++ b/objects/vulnerability/vulnerability--3d55683d-396f-40c6-8099-06f649478efe.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--16b63bd0-dc52-4869-8a62-2bced6d3a6b9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3d55683d-396f-40c6-8099-06f649478efe", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.956788Z", + "modified": "2024-11-13T00:20:46.956788Z", + "name": "CVE-2024-43499", + "description": ".NET and Visual Studio Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43499" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3e96e7f2-9978-4063-bbeb-a2a512ecfea5.json b/objects/vulnerability/vulnerability--3e96e7f2-9978-4063-bbeb-a2a512ecfea5.json new file mode 100644 index 00000000000..84840a05893 --- /dev/null +++ b/objects/vulnerability/vulnerability--3e96e7f2-9978-4063-bbeb-a2a512ecfea5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--33b6abe0-dad3-45e1-936f-5b27f2919867", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3e96e7f2-9978-4063-bbeb-a2a512ecfea5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.756184Z", + "modified": "2024-11-13T00:20:44.756184Z", + "name": "CVE-2024-47590", + "description": "An unauthenticated attacker can create a malicious link which they can make publicly available. When an authenticated victim clicks on this malicious link, input data will be used by the web site page generation to create content which when executed in the victim's browser (XXS) or transmitted to another server (SSRF) gives the attacker the ability to execute arbitrary code on the server fully compromising confidentiality, integrity and availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47590" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3fe84a4c-dd37-4fb1-b9f6-655f27ce9a8a.json b/objects/vulnerability/vulnerability--3fe84a4c-dd37-4fb1-b9f6-655f27ce9a8a.json new file mode 100644 index 00000000000..00520498797 --- /dev/null +++ b/objects/vulnerability/vulnerability--3fe84a4c-dd37-4fb1-b9f6-655f27ce9a8a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f2034c71-fa21-44e9-bb54-09f03f51299b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3fe84a4c-dd37-4fb1-b9f6-655f27ce9a8a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.066629Z", + "modified": "2024-11-13T00:20:46.066629Z", + "name": "CVE-2024-49519", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49519" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--40672686-b4de-428c-a36b-da06de10b2f4.json b/objects/vulnerability/vulnerability--40672686-b4de-428c-a36b-da06de10b2f4.json new file mode 100644 index 00000000000..1900f65b49c --- /dev/null +++ b/objects/vulnerability/vulnerability--40672686-b4de-428c-a36b-da06de10b2f4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--83a320d7-252d-462d-8d37-f4c081a7608d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--40672686-b4de-428c-a36b-da06de10b2f4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.569556Z", + "modified": "2024-11-13T00:20:44.569556Z", + "name": "CVE-2024-9999", + "description": "In WS_FTP Server versions before 8.8.9 (2022.0.9), an Incorrect Implementation of Authentication Algorithm in the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9999" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4226bfe8-cda3-49c1-80db-8bb8ac9b7154.json b/objects/vulnerability/vulnerability--4226bfe8-cda3-49c1-80db-8bb8ac9b7154.json new file mode 100644 index 00000000000..feac0066b9e --- /dev/null +++ b/objects/vulnerability/vulnerability--4226bfe8-cda3-49c1-80db-8bb8ac9b7154.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ef5e9c55-1ea0-4c59-b974-fc38021df222", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4226bfe8-cda3-49c1-80db-8bb8ac9b7154", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.766211Z", + "modified": "2024-11-13T00:20:44.766211Z", + "name": "CVE-2024-50318", + "description": "A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50318" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--426856c3-ee11-462d-8be8-cfbc24b8f6d0.json b/objects/vulnerability/vulnerability--426856c3-ee11-462d-8be8-cfbc24b8f6d0.json new file mode 100644 index 00000000000..bbd4d6186fc --- /dev/null +++ b/objects/vulnerability/vulnerability--426856c3-ee11-462d-8be8-cfbc24b8f6d0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--adc9b327-b5b2-4d8e-8d0b-54049840c324", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--426856c3-ee11-462d-8be8-cfbc24b8f6d0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.922317Z", + "modified": "2024-11-13T00:20:45.922317Z", + "name": "CVE-2024-49033", + "description": "Microsoft Word Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49033" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--43c0af8f-7e01-4435-af12-ec1716081748.json b/objects/vulnerability/vulnerability--43c0af8f-7e01-4435-af12-ec1716081748.json new file mode 100644 index 00000000000..8d4047ed4b0 --- /dev/null +++ b/objects/vulnerability/vulnerability--43c0af8f-7e01-4435-af12-ec1716081748.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c528eb08-ec54-4539-9c5f-69216aa2e4e6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--43c0af8f-7e01-4435-af12-ec1716081748", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.685597Z", + "modified": "2024-11-13T00:20:45.685597Z", + "name": "CVE-2024-21949", + "description": "Improper validation of user input in the NPU driver could allow an attacker to provide a buffer with unexpected size, potentially leading to system crash.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21949" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--44a6fb28-44a9-4c1f-b978-3366fa216f22.json b/objects/vulnerability/vulnerability--44a6fb28-44a9-4c1f-b978-3366fa216f22.json new file mode 100644 index 00000000000..fd4cde4e381 --- /dev/null +++ b/objects/vulnerability/vulnerability--44a6fb28-44a9-4c1f-b978-3366fa216f22.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6c43a91e-4069-4b16-b165-fba2b98a8bb1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--44a6fb28-44a9-4c1f-b978-3366fa216f22", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.607348Z", + "modified": "2024-11-13T00:20:46.607348Z", + "name": "CVE-2024-28729", + "description": "An issue in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to execute arbitrary code via a crafted request.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28729" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--45409522-158f-44f5-b4e5-b2157aaf1249.json b/objects/vulnerability/vulnerability--45409522-158f-44f5-b4e5-b2157aaf1249.json new file mode 100644 index 00000000000..e03d400bb88 --- /dev/null +++ b/objects/vulnerability/vulnerability--45409522-158f-44f5-b4e5-b2157aaf1249.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ba8c7d49-dce3-4717-927a-4b2161e463b8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--45409522-158f-44f5-b4e5-b2157aaf1249", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.831034Z", + "modified": "2024-11-13T00:20:44.831034Z", + "name": "CVE-2024-50330", + "description": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50330" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--45ef9b02-c0fc-48e6-8542-2fb223d00383.json b/objects/vulnerability/vulnerability--45ef9b02-c0fc-48e6-8542-2fb223d00383.json new file mode 100644 index 00000000000..84369e995ba --- /dev/null +++ b/objects/vulnerability/vulnerability--45ef9b02-c0fc-48e6-8542-2fb223d00383.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f29b73e7-7221-4b01-93ec-64487d4deadf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--45ef9b02-c0fc-48e6-8542-2fb223d00383", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.046065Z", + "modified": "2024-11-13T00:20:46.046065Z", + "name": "CVE-2024-49006", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49006" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--471e83d9-b6fc-4f5b-be7b-0f425fb4f63e.json b/objects/vulnerability/vulnerability--471e83d9-b6fc-4f5b-be7b-0f425fb4f63e.json new file mode 100644 index 00000000000..f8d037769f1 --- /dev/null +++ b/objects/vulnerability/vulnerability--471e83d9-b6fc-4f5b-be7b-0f425fb4f63e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--11e6535a-db5f-4568-bfe8-0cc5c687fca9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--471e83d9-b6fc-4f5b-be7b-0f425fb4f63e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.240243Z", + "modified": "2024-11-13T00:20:46.240243Z", + "name": "CVE-2024-36507", + "description": "A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-36507" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--47a65a05-7365-4a7c-b50b-86771e353d61.json b/objects/vulnerability/vulnerability--47a65a05-7365-4a7c-b50b-86771e353d61.json new file mode 100644 index 00000000000..e3bb592a5ef --- /dev/null +++ b/objects/vulnerability/vulnerability--47a65a05-7365-4a7c-b50b-86771e353d61.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--97ad9e5b-d344-4e39-8d6a-f43cb4b48e25", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--47a65a05-7365-4a7c-b50b-86771e353d61", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.877946Z", + "modified": "2024-11-13T00:20:45.877946Z", + "name": "CVE-2024-35274", + "description": "An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiAnalyzer versions below 7.4.2, Fortinet FortiManager versions below 7.4.2 and Fortinet FortiAnalyzer-BigData version 7.4.0 and below 7.2.7 allows a privileged attacker with read write administrative privileges to create non-arbitrary files on a chosen directory via crafted CLI requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-35274" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--47ad3cd5-dc11-4c79-9518-c4af3fb92aa0.json b/objects/vulnerability/vulnerability--47ad3cd5-dc11-4c79-9518-c4af3fb92aa0.json new file mode 100644 index 00000000000..f881106f176 --- /dev/null +++ b/objects/vulnerability/vulnerability--47ad3cd5-dc11-4c79-9518-c4af3fb92aa0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e7cd14b6-7c80-45be-a8cf-bdb9a71595f8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--47ad3cd5-dc11-4c79-9518-c4af3fb92aa0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.778258Z", + "modified": "2024-11-13T00:20:44.778258Z", + "name": "CVE-2024-50572", + "description": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50572" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--47c63eb6-5d06-4741-9f0e-cbefeea577be.json b/objects/vulnerability/vulnerability--47c63eb6-5d06-4741-9f0e-cbefeea577be.json new file mode 100644 index 00000000000..8e3cf5b105b --- /dev/null +++ b/objects/vulnerability/vulnerability--47c63eb6-5d06-4741-9f0e-cbefeea577be.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--83f8977b-048b-45af-9a39-e61e0756f9e7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--47c63eb6-5d06-4741-9f0e-cbefeea577be", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.592342Z", + "modified": "2024-11-13T00:20:44.592342Z", + "name": "CVE-2024-9420", + "description": "A use-after-free in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9420" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--49de9927-6e42-42cf-8c81-f5b1721e8946.json b/objects/vulnerability/vulnerability--49de9927-6e42-42cf-8c81-f5b1721e8946.json new file mode 100644 index 00000000000..263716f9a71 --- /dev/null +++ b/objects/vulnerability/vulnerability--49de9927-6e42-42cf-8c81-f5b1721e8946.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f05e988c-19c0-46d2-bb4b-1aca62d50771", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--49de9927-6e42-42cf-8c81-f5b1721e8946", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.37461Z", + "modified": "2024-11-13T00:20:45.37461Z", + "name": "CVE-2024-38264", + "description": "Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-38264" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4ab4b9d3-cb64-4e8c-9097-8a6756711846.json b/objects/vulnerability/vulnerability--4ab4b9d3-cb64-4e8c-9097-8a6756711846.json new file mode 100644 index 00000000000..3801ad1e957 --- /dev/null +++ b/objects/vulnerability/vulnerability--4ab4b9d3-cb64-4e8c-9097-8a6756711846.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4a622ad8-8200-4dda-b68c-39f28daa2619", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4ab4b9d3-cb64-4e8c-9097-8a6756711846", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.950118Z", + "modified": "2024-11-13T00:20:46.950118Z", + "name": "CVE-2024-43645", + "description": "Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43645" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4b21d402-b716-4d2a-b3ad-d64e45ea991b.json b/objects/vulnerability/vulnerability--4b21d402-b716-4d2a-b3ad-d64e45ea991b.json new file mode 100644 index 00000000000..8cde17c22ce --- /dev/null +++ b/objects/vulnerability/vulnerability--4b21d402-b716-4d2a-b3ad-d64e45ea991b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--547b64a4-0489-47db-8a97-2256cb23f569", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4b21d402-b716-4d2a-b3ad-d64e45ea991b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.921395Z", + "modified": "2024-11-13T00:20:45.921395Z", + "name": "CVE-2024-49369", + "description": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49369" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4dbb895a-59d3-4fb3-b063-329d6ca3bffb.json b/objects/vulnerability/vulnerability--4dbb895a-59d3-4fb3-b063-329d6ca3bffb.json new file mode 100644 index 00000000000..1f84ea79776 --- /dev/null +++ b/objects/vulnerability/vulnerability--4dbb895a-59d3-4fb3-b063-329d6ca3bffb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8b09473b-6e0b-495c-b933-2848ec040c08", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4dbb895a-59d3-4fb3-b063-329d6ca3bffb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.895537Z", + "modified": "2024-11-13T00:20:45.895537Z", + "name": "CVE-2024-49525", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49525" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4ee6b52f-7f47-4b7e-84b4-6c1456cb9c6e.json b/objects/vulnerability/vulnerability--4ee6b52f-7f47-4b7e-84b4-6c1456cb9c6e.json new file mode 100644 index 00000000000..cbcbaccb6dd --- /dev/null +++ b/objects/vulnerability/vulnerability--4ee6b52f-7f47-4b7e-84b4-6c1456cb9c6e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b630c9ce-0014-4f53-954d-f9ac50eb2bbf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4ee6b52f-7f47-4b7e-84b4-6c1456cb9c6e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.049887Z", + "modified": "2024-11-13T00:20:46.049887Z", + "name": "CVE-2024-49520", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49520" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4f030a42-108d-4a11-ba80-166172d9172e.json b/objects/vulnerability/vulnerability--4f030a42-108d-4a11-ba80-166172d9172e.json new file mode 100644 index 00000000000..acbee3c3466 --- /dev/null +++ b/objects/vulnerability/vulnerability--4f030a42-108d-4a11-ba80-166172d9172e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5855826f-2b9c-4015-8e25-d7922e04275c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4f030a42-108d-4a11-ba80-166172d9172e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.79738Z", + "modified": "2024-11-13T00:20:44.79738Z", + "name": "CVE-2024-50558", + "description": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices improperly manage access control for read-only users. This could allow an attacker to cause a temporary denial of service condition.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50558" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4fe0881f-604e-403b-9553-11891be57d12.json b/objects/vulnerability/vulnerability--4fe0881f-604e-403b-9553-11891be57d12.json new file mode 100644 index 00000000000..6b0a12e670d --- /dev/null +++ b/objects/vulnerability/vulnerability--4fe0881f-604e-403b-9553-11891be57d12.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--16db051a-ff0e-4b94-b992-64eede3013b8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4fe0881f-604e-403b-9553-11891be57d12", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.985518Z", + "modified": "2024-11-13T00:20:44.985518Z", + "name": "CVE-2024-25255", + "description": "Sublime Text 4 was discovered to contain a command injection vulnerability via the New Build System module.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-25255" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--504ddee3-8889-4007-a692-ecd7693c608f.json b/objects/vulnerability/vulnerability--504ddee3-8889-4007-a692-ecd7693c608f.json new file mode 100644 index 00000000000..dfd7276e793 --- /dev/null +++ b/objects/vulnerability/vulnerability--504ddee3-8889-4007-a692-ecd7693c608f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--879bf27c-112e-4f03-83de-1fa99fd8376b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--504ddee3-8889-4007-a692-ecd7693c608f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.181679Z", + "modified": "2024-11-13T00:20:44.181679Z", + "name": "CVE-2024-51179", + "description": "An issue in Open 5GS v.2.7.1 allows a remote attacker to cause a denial of service via the Network Function Virtualizations (NFVs) such as the User Plane Function (UPF) and the Session Management Function (SMF), The Packet Data Unit (PDU) session establishment process.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51179" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5051cc27-2d05-42fc-b703-5ce4d8092880.json b/objects/vulnerability/vulnerability--5051cc27-2d05-42fc-b703-5ce4d8092880.json new file mode 100644 index 00000000000..45c265bccd5 --- /dev/null +++ b/objects/vulnerability/vulnerability--5051cc27-2d05-42fc-b703-5ce4d8092880.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--849b7a33-d624-4df4-8fe3-88f120606701", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5051cc27-2d05-42fc-b703-5ce4d8092880", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.222282Z", + "modified": "2024-11-13T00:20:45.222282Z", + "name": "CVE-2024-33505", + "description": "A heap-based buffer overflow in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to escalation of privilege via specially crafted http requests", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-33505" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--515f577a-7bbe-47ef-9691-39b6b0a14687.json b/objects/vulnerability/vulnerability--515f577a-7bbe-47ef-9691-39b6b0a14687.json new file mode 100644 index 00000000000..6375206f92e --- /dev/null +++ b/objects/vulnerability/vulnerability--515f577a-7bbe-47ef-9691-39b6b0a14687.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e13d11c5-72f2-4bd2-85e3-5cec3387197a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--515f577a-7bbe-47ef-9691-39b6b0a14687", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.439731Z", + "modified": "2024-11-13T00:20:46.439731Z", + "name": "CVE-2024-32118", + "description": "Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and Fortinet FortiAnalyzer-BigData before 7.4.0 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-32118" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5230391b-6a31-472e-a0a6-d63dc3786edb.json b/objects/vulnerability/vulnerability--5230391b-6a31-472e-a0a6-d63dc3786edb.json new file mode 100644 index 00000000000..845cf55ae15 --- /dev/null +++ b/objects/vulnerability/vulnerability--5230391b-6a31-472e-a0a6-d63dc3786edb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--79bfb5b0-3064-4e9f-a5a7-9acd74516230", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5230391b-6a31-472e-a0a6-d63dc3786edb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.489916Z", + "modified": "2024-11-13T00:20:44.489916Z", + "name": "CVE-2024-10245", + "description": "The Relais 2FA plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0. This is due to incorrect authentication and capability checking in the 'rl_do_ajax' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10245" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--53288a7e-3b87-4189-a3e3-9ab9f042abd9.json b/objects/vulnerability/vulnerability--53288a7e-3b87-4189-a3e3-9ab9f042abd9.json new file mode 100644 index 00000000000..13639663a37 --- /dev/null +++ b/objects/vulnerability/vulnerability--53288a7e-3b87-4189-a3e3-9ab9f042abd9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c12fcc20-b01f-4abc-8bc0-b4e2e375b463", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--53288a7e-3b87-4189-a3e3-9ab9f042abd9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.91361Z", + "modified": "2024-11-13T00:20:46.91361Z", + "name": "CVE-2024-43637", + "description": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43637" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--532b5a24-9ca7-4780-8012-62fb3ba5020b.json b/objects/vulnerability/vulnerability--532b5a24-9ca7-4780-8012-62fb3ba5020b.json new file mode 100644 index 00000000000..3213423d9cc --- /dev/null +++ b/objects/vulnerability/vulnerability--532b5a24-9ca7-4780-8012-62fb3ba5020b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b62e5c38-3dc1-4ba6-aa4c-1da790ff8cf3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--532b5a24-9ca7-4780-8012-62fb3ba5020b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.915742Z", + "modified": "2024-11-13T00:20:45.915742Z", + "name": "CVE-2024-49527", + "description": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49527" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5380ee20-4896-487e-9c0e-0d97c0467cee.json b/objects/vulnerability/vulnerability--5380ee20-4896-487e-9c0e-0d97c0467cee.json new file mode 100644 index 00000000000..593ca3a11c8 --- /dev/null +++ b/objects/vulnerability/vulnerability--5380ee20-4896-487e-9c0e-0d97c0467cee.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3909efb7-b4c8-4855-b393-6b7c5d9ea6b3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5380ee20-4896-487e-9c0e-0d97c0467cee", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.029646Z", + "modified": "2024-11-13T00:20:45.029646Z", + "name": "CVE-2024-11006", + "description": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11006" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5583c091-fc7b-4400-8cc4-973eba093eca.json b/objects/vulnerability/vulnerability--5583c091-fc7b-4400-8cc4-973eba093eca.json new file mode 100644 index 00000000000..a8bfad40c90 --- /dev/null +++ b/objects/vulnerability/vulnerability--5583c091-fc7b-4400-8cc4-973eba093eca.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fcbb1abb-1be6-49ec-8ed4-bf76b85fff54", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5583c091-fc7b-4400-8cc4-973eba093eca", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.586505Z", + "modified": "2024-11-13T00:20:44.586505Z", + "name": "CVE-2024-9835", + "description": "The RSS Feed Widget WordPress plugin before 3.0.1 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9835" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--55c99365-3cc5-40d4-8751-810107af0ffa.json b/objects/vulnerability/vulnerability--55c99365-3cc5-40d4-8751-810107af0ffa.json new file mode 100644 index 00000000000..c7edcd5bb41 --- /dev/null +++ b/objects/vulnerability/vulnerability--55c99365-3cc5-40d4-8751-810107af0ffa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d25a107d-3f12-487a-aea9-2edeb4a92597", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--55c99365-3cc5-40d4-8751-810107af0ffa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.283997Z", + "modified": "2024-11-13T00:20:44.283997Z", + "name": "CVE-2024-48993", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48993" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--55e8f969-21b5-4e42-914b-7ef04c62a74a.json b/objects/vulnerability/vulnerability--55e8f969-21b5-4e42-914b-7ef04c62a74a.json new file mode 100644 index 00000000000..2d8f336250b --- /dev/null +++ b/objects/vulnerability/vulnerability--55e8f969-21b5-4e42-914b-7ef04c62a74a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b55d4ca9-d147-4886-98f1-f6175d64ea70", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--55e8f969-21b5-4e42-914b-7ef04c62a74a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.036779Z", + "modified": "2024-11-13T00:20:46.036779Z", + "name": "CVE-2024-49013", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49013" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--55f2c19f-f22a-443b-b787-9cd2c188725f.json b/objects/vulnerability/vulnerability--55f2c19f-f22a-443b-b787-9cd2c188725f.json new file mode 100644 index 00000000000..7b4249e71d5 --- /dev/null +++ b/objects/vulnerability/vulnerability--55f2c19f-f22a-443b-b787-9cd2c188725f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5cbc37a3-67ef-4b66-a09c-35f99d3927bb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--55f2c19f-f22a-443b-b787-9cd2c188725f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.57825Z", + "modified": "2024-11-13T00:20:46.57825Z", + "name": "CVE-2024-28728", + "description": "Cross Site Scripting vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via a crafted payload to the WiFi SSID Name field.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28728" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--565a50ce-0cd7-4388-8883-f041366d502b.json b/objects/vulnerability/vulnerability--565a50ce-0cd7-4388-8883-f041366d502b.json new file mode 100644 index 00000000000..93d9a03ee67 --- /dev/null +++ b/objects/vulnerability/vulnerability--565a50ce-0cd7-4388-8883-f041366d502b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c466d93e-1c21-4431-bd76-fd8c54a761a6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--565a50ce-0cd7-4388-8883-f041366d502b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.735535Z", + "modified": "2024-11-13T00:20:44.735535Z", + "name": "CVE-2024-47426", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Double Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47426" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5692012f-9b28-46cb-be41-e580f5c52587.json b/objects/vulnerability/vulnerability--5692012f-9b28-46cb-be41-e580f5c52587.json new file mode 100644 index 00000000000..fe4c6cb0d55 --- /dev/null +++ b/objects/vulnerability/vulnerability--5692012f-9b28-46cb-be41-e580f5c52587.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e379b1e6-e335-42f5-96cf-b6226ae4476b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5692012f-9b28-46cb-be41-e580f5c52587", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.062184Z", + "modified": "2024-11-13T00:20:46.062184Z", + "name": "CVE-2024-49019", + "description": "Active Directory Certificate Services Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49019" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--571e3b7d-c39b-47a6-bbd2-cf59a2fce1ba.json b/objects/vulnerability/vulnerability--571e3b7d-c39b-47a6-bbd2-cf59a2fce1ba.json new file mode 100644 index 00000000000..e4356459883 --- /dev/null +++ b/objects/vulnerability/vulnerability--571e3b7d-c39b-47a6-bbd2-cf59a2fce1ba.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d4a7f9b3-82ff-451f-82e5-c80771b1d990", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--571e3b7d-c39b-47a6-bbd2-cf59a2fce1ba", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.082359Z", + "modified": "2024-11-13T00:20:46.082359Z", + "name": "CVE-2024-49010", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49010" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--57eb971c-94bd-4433-9e3e-a082964aba1f.json b/objects/vulnerability/vulnerability--57eb971c-94bd-4433-9e3e-a082964aba1f.json new file mode 100644 index 00000000000..3aa4ba56fba --- /dev/null +++ b/objects/vulnerability/vulnerability--57eb971c-94bd-4433-9e3e-a082964aba1f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b4478aba-6a17-4d1a-a0c8-461ecbc7ac3d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--57eb971c-94bd-4433-9e3e-a082964aba1f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.880949Z", + "modified": "2024-11-13T00:20:46.880949Z", + "name": "CVE-2024-43449", + "description": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43449" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--580bc8ce-f115-424b-a2b3-3623dae09ef3.json b/objects/vulnerability/vulnerability--580bc8ce-f115-424b-a2b3-3623dae09ef3.json new file mode 100644 index 00000000000..e6c2b048858 --- /dev/null +++ b/objects/vulnerability/vulnerability--580bc8ce-f115-424b-a2b3-3623dae09ef3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fa02c970-c9fa-4d42-b3c2-c0d9d54e3d80", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--580bc8ce-f115-424b-a2b3-3623dae09ef3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.783015Z", + "modified": "2024-11-13T00:20:44.783015Z", + "name": "CVE-2024-50561", + "description": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly sanitize the filenames before uploading. This could allow an authenticated remote attacker to compromise of integrity of the system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50561" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--58a3cf5a-5054-4129-848c-82201b1f8e49.json b/objects/vulnerability/vulnerability--58a3cf5a-5054-4129-848c-82201b1f8e49.json new file mode 100644 index 00000000000..1d29b88d555 --- /dev/null +++ b/objects/vulnerability/vulnerability--58a3cf5a-5054-4129-848c-82201b1f8e49.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--feeb9f17-5d78-4aad-ac4c-8fa5055352e8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--58a3cf5a-5054-4129-848c-82201b1f8e49", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.300627Z", + "modified": "2024-11-13T00:20:46.300627Z", + "name": "CVE-2024-46888", + "description": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly sanitize user provided paths for SFTP-based file up- and downloads. This could allow an authenticated remote attacker to manipulate arbitrary files on the filesystem and achieve arbitrary code execution on the device.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46888" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--58ee2dd5-aa40-4a49-ae06-0a6ac483e17e.json b/objects/vulnerability/vulnerability--58ee2dd5-aa40-4a49-ae06-0a6ac483e17e.json new file mode 100644 index 00000000000..58b3e858774 --- /dev/null +++ b/objects/vulnerability/vulnerability--58ee2dd5-aa40-4a49-ae06-0a6ac483e17e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1b74c4a9-49d6-4b1b-822d-6bb651199e61", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--58ee2dd5-aa40-4a49-ae06-0a6ac483e17e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.039859Z", + "modified": "2024-11-13T00:20:45.039859Z", + "name": "CVE-2024-11079", + "description": "A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11079" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5a76170b-670a-4f5d-b24f-2d822801b89a.json b/objects/vulnerability/vulnerability--5a76170b-670a-4f5d-b24f-2d822801b89a.json new file mode 100644 index 00000000000..e5850aad971 --- /dev/null +++ b/objects/vulnerability/vulnerability--5a76170b-670a-4f5d-b24f-2d822801b89a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f2a160f3-a924-4b87-a758-7eba776e93f9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5a76170b-670a-4f5d-b24f-2d822801b89a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.672726Z", + "modified": "2024-11-13T00:20:44.672726Z", + "name": "CVE-2024-47588", + "description": "In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47588" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5aee4211-a639-4300-86d9-6f069d78c16a.json b/objects/vulnerability/vulnerability--5aee4211-a639-4300-86d9-6f069d78c16a.json new file mode 100644 index 00000000000..0d886a1a033 --- /dev/null +++ b/objects/vulnerability/vulnerability--5aee4211-a639-4300-86d9-6f069d78c16a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f07bbbb6-c881-439f-875e-d64d64c79d5e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5aee4211-a639-4300-86d9-6f069d78c16a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.328328Z", + "modified": "2024-11-13T00:20:45.328328Z", + "name": "CVE-2024-8882", + "description": "A buffer overflow vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to cause denial of service (DoS) conditions via a crafted URL.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8882" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5c4e65b1-0606-43e6-ace2-e70cc673a939.json b/objects/vulnerability/vulnerability--5c4e65b1-0606-43e6-ace2-e70cc673a939.json new file mode 100644 index 00000000000..c4d8450b4bd --- /dev/null +++ b/objects/vulnerability/vulnerability--5c4e65b1-0606-43e6-ace2-e70cc673a939.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fd0ee5dc-2e9c-405a-bc52-d8fe9abfacb5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5c4e65b1-0606-43e6-ace2-e70cc673a939", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:50.102763Z", + "modified": "2024-11-13T00:20:50.102763Z", + "name": "CVE-2021-27700", + "description": "SOCIFI Socifi Guest wifi as SAAS wifi portal is affected by Insecure Permissions. Any authorized customer with partner mode can switch to another customer dashboard and perform actions like modify user, delete user, etc.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2021-27700" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5cadbbc1-2f26-40a2-91bb-f441754eac22.json b/objects/vulnerability/vulnerability--5cadbbc1-2f26-40a2-91bb-f441754eac22.json new file mode 100644 index 00000000000..6c28ba4eb0d --- /dev/null +++ b/objects/vulnerability/vulnerability--5cadbbc1-2f26-40a2-91bb-f441754eac22.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d6753390-b563-4474-9435-593c0b8481a4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5cadbbc1-2f26-40a2-91bb-f441754eac22", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.682622Z", + "modified": "2024-11-13T00:20:44.682622Z", + "name": "CVE-2024-47905", + "description": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47905" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5f921813-1c75-4ead-82f6-afa94d76b73f.json b/objects/vulnerability/vulnerability--5f921813-1c75-4ead-82f6-afa94d76b73f.json new file mode 100644 index 00000000000..18258c5b065 --- /dev/null +++ b/objects/vulnerability/vulnerability--5f921813-1c75-4ead-82f6-afa94d76b73f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0d69384a-8a59-4b34-8faf-d23cedfec8f3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5f921813-1c75-4ead-82f6-afa94d76b73f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.219041Z", + "modified": "2024-11-13T00:20:44.219041Z", + "name": "CVE-2024-51721", + "description": "A code injection vulnerability in the SecuSUITE Server Web Administration Portal of SecuSUITE versions 5.0.420 and earlier could allow an attacker to potentially inject script commands or other executable content into the server that would run with root privilege.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51721" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--622b163d-f40a-4b36-b46c-73d3ec21b464.json b/objects/vulnerability/vulnerability--622b163d-f40a-4b36-b46c-73d3ec21b464.json new file mode 100644 index 00000000000..0b9af0d7fb9 --- /dev/null +++ b/objects/vulnerability/vulnerability--622b163d-f40a-4b36-b46c-73d3ec21b464.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--47e0218e-5788-466f-bade-9b9b7f95b92d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--622b163d-f40a-4b36-b46c-73d3ec21b464", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.598051Z", + "modified": "2024-11-13T00:20:44.598051Z", + "name": "CVE-2024-9842", + "description": "Incorrect permissions in Ivanti Secure Access Client before version 22.7R4 allows a local authenticated attacker to create arbitrary folders.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9842" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6266184b-be2b-47bb-b5a4-170cd3729425.json b/objects/vulnerability/vulnerability--6266184b-be2b-47bb-b5a4-170cd3729425.json new file mode 100644 index 00000000000..1f7d20b141d --- /dev/null +++ b/objects/vulnerability/vulnerability--6266184b-be2b-47bb-b5a4-170cd3729425.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7166d28a-60f3-4705-8f15-697a76a3f1bc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6266184b-be2b-47bb-b5a4-170cd3729425", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.043209Z", + "modified": "2024-11-13T00:20:46.043209Z", + "name": "CVE-2024-49046", + "description": "Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49046" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--638315c0-a5a8-4430-81d7-1261ed030ec8.json b/objects/vulnerability/vulnerability--638315c0-a5a8-4430-81d7-1261ed030ec8.json new file mode 100644 index 00000000000..036c7a54e4e --- /dev/null +++ b/objects/vulnerability/vulnerability--638315c0-a5a8-4430-81d7-1261ed030ec8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6a55d249-8def-4272-a277-bac84590673c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--638315c0-a5a8-4430-81d7-1261ed030ec8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.59654Z", + "modified": "2024-11-13T00:20:46.59654Z", + "name": "CVE-2024-28730", + "description": "Cross Site Scripting vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via the file upload feature of the VPN configuration module.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28730" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--647fd113-a933-4d1d-aa64-4f80a5022637.json b/objects/vulnerability/vulnerability--647fd113-a933-4d1d-aa64-4f80a5022637.json new file mode 100644 index 00000000000..98f7529a630 --- /dev/null +++ b/objects/vulnerability/vulnerability--647fd113-a933-4d1d-aa64-4f80a5022637.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0775176c-c1f9-4aa3-8279-8eaf7fd786cb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--647fd113-a933-4d1d-aa64-4f80a5022637", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.366842Z", + "modified": "2024-11-13T00:20:45.366842Z", + "name": "CVE-2024-38255", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-38255" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--64c805c9-d6b1-4c0f-bc14-9a9659b667ff.json b/objects/vulnerability/vulnerability--64c805c9-d6b1-4c0f-bc14-9a9659b667ff.json new file mode 100644 index 00000000000..ccefc33d094 --- /dev/null +++ b/objects/vulnerability/vulnerability--64c805c9-d6b1-4c0f-bc14-9a9659b667ff.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--649cb720-5064-4ac2-9902-9352ece6ce5b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--64c805c9-d6b1-4c0f-bc14-9a9659b667ff", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.045684Z", + "modified": "2024-11-13T00:20:45.045684Z", + "name": "CVE-2024-11138", + "description": "A vulnerability classified as problematic has been found in DedeCMS 5.7.116. This affects an unknown part of the file /dede/uploads/dede/friendlink_add.php. The manipulation of the argument logoimg leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11138" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6567d8cd-7981-4d4f-b6a5-9b6d098b4d4e.json b/objects/vulnerability/vulnerability--6567d8cd-7981-4d4f-b6a5-9b6d098b4d4e.json new file mode 100644 index 00000000000..418ce27f0eb --- /dev/null +++ b/objects/vulnerability/vulnerability--6567d8cd-7981-4d4f-b6a5-9b6d098b4d4e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--267e6a8d-3e17-403d-9ccc-c40ad480a6ae", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6567d8cd-7981-4d4f-b6a5-9b6d098b4d4e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.874033Z", + "modified": "2024-11-13T00:20:46.874033Z", + "name": "CVE-2024-43620", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43620" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--661c4e92-68b0-4a79-8fc8-7e0082aaa24e.json b/objects/vulnerability/vulnerability--661c4e92-68b0-4a79-8fc8-7e0082aaa24e.json new file mode 100644 index 00000000000..be85048eeac --- /dev/null +++ b/objects/vulnerability/vulnerability--661c4e92-68b0-4a79-8fc8-7e0082aaa24e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1d42f350-d9e1-4ac5-a4d9-f77949272aba", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--661c4e92-68b0-4a79-8fc8-7e0082aaa24e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.931135Z", + "modified": "2024-11-13T00:20:45.931135Z", + "name": "CVE-2024-49051", + "description": "Microsoft PC Manager Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49051" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--66a1b6c0-023e-4b10-a926-debb3ed2be94.json b/objects/vulnerability/vulnerability--66a1b6c0-023e-4b10-a926-debb3ed2be94.json new file mode 100644 index 00000000000..9c8f24d1df0 --- /dev/null +++ b/objects/vulnerability/vulnerability--66a1b6c0-023e-4b10-a926-debb3ed2be94.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4dd7f006-83b9-4315-92ed-4d04aa2d151f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--66a1b6c0-023e-4b10-a926-debb3ed2be94", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.508616Z", + "modified": "2024-11-13T00:20:45.508616Z", + "name": "CVE-2024-40592", + "description": "An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to swap the installer with a malicious package via a race condition during the installation process.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-40592" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--66aa9cba-a743-46ec-86a1-e5ab6f84db19.json b/objects/vulnerability/vulnerability--66aa9cba-a743-46ec-86a1-e5ab6f84db19.json new file mode 100644 index 00000000000..f20867dc59e --- /dev/null +++ b/objects/vulnerability/vulnerability--66aa9cba-a743-46ec-86a1-e5ab6f84db19.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3a09658d-ae84-4bad-ab92-3723041b309a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--66aa9cba-a743-46ec-86a1-e5ab6f84db19", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.083953Z", + "modified": "2024-11-13T00:20:46.083953Z", + "name": "CVE-2024-49040", + "description": "Microsoft Exchange Server Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49040" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6707a637-018e-495f-a7fa-c407102696a2.json b/objects/vulnerability/vulnerability--6707a637-018e-495f-a7fa-c407102696a2.json new file mode 100644 index 00000000000..41cb262f6b7 --- /dev/null +++ b/objects/vulnerability/vulnerability--6707a637-018e-495f-a7fa-c407102696a2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c10b8e2f-c97a-4ffd-aa56-28852fe31283", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6707a637-018e-495f-a7fa-c407102696a2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.305749Z", + "modified": "2024-11-13T00:20:45.305749Z", + "name": "CVE-2024-8881", + "description": "A post-authentication command injection vulnerability in the CGI program in the Zyxel GS1900-48 switch firmware version V2.80(AAHN.1)C0 and earlier could allow an authenticated, LAN-based attacker with administrator privileges to execute some operating system (OS) commands on an affected device by sending a crafted HTTP request.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8881" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6791aabd-5fe1-489d-8beb-2118b16563aa.json b/objects/vulnerability/vulnerability--6791aabd-5fe1-489d-8beb-2118b16563aa.json new file mode 100644 index 00000000000..82c78dc3da7 --- /dev/null +++ b/objects/vulnerability/vulnerability--6791aabd-5fe1-489d-8beb-2118b16563aa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d296f080-089b-4500-b6e4-a9c9461a5acb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6791aabd-5fe1-489d-8beb-2118b16563aa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.230962Z", + "modified": "2024-11-13T00:20:44.230962Z", + "name": "CVE-2024-51566", + "description": "The NVMe driver queue processing is vulernable to guest-induced infinite loops.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51566" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--68757a63-6721-45a5-bf6e-828849011ff4.json b/objects/vulnerability/vulnerability--68757a63-6721-45a5-bf6e-828849011ff4.json new file mode 100644 index 00000000000..83350af10d4 --- /dev/null +++ b/objects/vulnerability/vulnerability--68757a63-6721-45a5-bf6e-828849011ff4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f65d5c16-8178-4765-8861-e806bf20574e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--68757a63-6721-45a5-bf6e-828849011ff4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.384528Z", + "modified": "2024-11-13T00:20:44.384528Z", + "name": "CVE-2024-52533", + "description": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\\0' character.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52533" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--696833b1-005b-41b5-97dd-20a2f807008f.json b/objects/vulnerability/vulnerability--696833b1-005b-41b5-97dd-20a2f807008f.json new file mode 100644 index 00000000000..a1bcc822630 --- /dev/null +++ b/objects/vulnerability/vulnerability--696833b1-005b-41b5-97dd-20a2f807008f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bce29342-d8a2-45ac-af37-26fddf927113", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--696833b1-005b-41b5-97dd-20a2f807008f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.811201Z", + "modified": "2024-11-13T00:20:44.811201Z", + "name": "CVE-2024-50324", + "description": "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50324" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6b97a85f-ad43-4466-a17e-a29bc91fc423.json b/objects/vulnerability/vulnerability--6b97a85f-ad43-4466-a17e-a29bc91fc423.json new file mode 100644 index 00000000000..b07f34e6469 --- /dev/null +++ b/objects/vulnerability/vulnerability--6b97a85f-ad43-4466-a17e-a29bc91fc423.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--78075d49-9402-4cc8-a242-4dba5c8ddfba", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6b97a85f-ad43-4466-a17e-a29bc91fc423", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.1782Z", + "modified": "2024-11-13T00:20:44.1782Z", + "name": "CVE-2024-51749", + "description": "Element is a Matrix web client built using the Matrix React SDK. Versions of Element Web and Desktop earlier than 1.11.85 do not check if thumbnails for attachments, stickers and images are coherent. It is possible to add thumbnails to events trigger a file download once clicked. Fixed in element-web 1.11.85.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51749" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6c945fcd-be54-46df-bb2f-4378c8c2c4a6.json b/objects/vulnerability/vulnerability--6c945fcd-be54-46df-bb2f-4378c8c2c4a6.json new file mode 100644 index 00000000000..a1d112d1dc9 --- /dev/null +++ b/objects/vulnerability/vulnerability--6c945fcd-be54-46df-bb2f-4378c8c2c4a6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--227eb416-c029-4972-aea5-69d522d91f99", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6c945fcd-be54-46df-bb2f-4378c8c2c4a6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.798567Z", + "modified": "2024-11-13T00:20:46.798567Z", + "name": "CVE-2024-29119", + "description": "A vulnerability has been identified in Spectrum Power 7 (All versions < V24Q3). The affected product contains several root-owned SUID binaries that could allow an authenticated local attacker to escalate privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-29119" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6cb4dc67-0346-469d-8d30-e58c76ea881e.json b/objects/vulnerability/vulnerability--6cb4dc67-0346-469d-8d30-e58c76ea881e.json new file mode 100644 index 00000000000..a58c69e77ac --- /dev/null +++ b/objects/vulnerability/vulnerability--6cb4dc67-0346-469d-8d30-e58c76ea881e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--369cc529-0891-4a11-8103-844504c909aa", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6cb4dc67-0346-469d-8d30-e58c76ea881e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.809616Z", + "modified": "2024-11-13T00:20:44.809616Z", + "name": "CVE-2024-50329", + "description": "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50329" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6d8b6f41-7ed0-426a-bdcf-e148481a7527.json b/objects/vulnerability/vulnerability--6d8b6f41-7ed0-426a-bdcf-e148481a7527.json new file mode 100644 index 00000000000..951ccf1cb6f --- /dev/null +++ b/objects/vulnerability/vulnerability--6d8b6f41-7ed0-426a-bdcf-e148481a7527.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--06596453-8f74-4d2e-beb7-5f045b33b2d2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6d8b6f41-7ed0-426a-bdcf-e148481a7527", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.827321Z", + "modified": "2024-11-13T00:20:44.827321Z", + "name": "CVE-2024-50319", + "description": "An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50319" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6e0974ba-a053-4e8a-8c63-ef9024152df6.json b/objects/vulnerability/vulnerability--6e0974ba-a053-4e8a-8c63-ef9024152df6.json new file mode 100644 index 00000000000..8e25867ae5f --- /dev/null +++ b/objects/vulnerability/vulnerability--6e0974ba-a053-4e8a-8c63-ef9024152df6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fa8cb1b8-11a5-44f9-b0f9-348bbd7ce79c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6e0974ba-a053-4e8a-8c63-ef9024152df6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.497404Z", + "modified": "2024-11-13T00:20:44.497404Z", + "name": "CVE-2024-10790", + "description": "The Admin and Site Enhancements (ASE) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 7.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with custom-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. This feature must be enabled, and for specific roles in order to be exploitable.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10790" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6e09d518-c1c4-457b-833e-9a0e4735f12a.json b/objects/vulnerability/vulnerability--6e09d518-c1c4-457b-833e-9a0e4735f12a.json new file mode 100644 index 00000000000..b605fa7fead --- /dev/null +++ b/objects/vulnerability/vulnerability--6e09d518-c1c4-457b-833e-9a0e4735f12a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6459a466-553a-43d8-9542-42f98a2139a2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6e09d518-c1c4-457b-833e-9a0e4735f12a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.716105Z", + "modified": "2024-11-13T00:20:44.716105Z", + "name": "CVE-2024-47434", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47434" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6e3510b0-2d02-44f4-a506-d5ded33236e0.json b/objects/vulnerability/vulnerability--6e3510b0-2d02-44f4-a506-d5ded33236e0.json new file mode 100644 index 00000000000..af95edc3155 --- /dev/null +++ b/objects/vulnerability/vulnerability--6e3510b0-2d02-44f4-a506-d5ded33236e0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--278ce396-19ce-49e4-b817-4c4b118b875c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6e3510b0-2d02-44f4-a506-d5ded33236e0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.916799Z", + "modified": "2024-11-13T00:20:45.916799Z", + "name": "CVE-2024-49514", + "description": "Photoshop Desktop versions 24.7.3, 25.11 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49514" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--728c277a-710b-425f-9022-d94c73a4c055.json b/objects/vulnerability/vulnerability--728c277a-710b-425f-9022-d94c73a4c055.json new file mode 100644 index 00000000000..d91378ac670 --- /dev/null +++ b/objects/vulnerability/vulnerability--728c277a-710b-425f-9022-d94c73a4c055.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f3e7a911-3ab9-43c9-825d-e59e38eaeec7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--728c277a-710b-425f-9022-d94c73a4c055", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.251604Z", + "modified": "2024-11-13T00:20:44.251604Z", + "name": "CVE-2024-48995", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48995" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--72a796f8-c6b5-4dab-b3df-9a85846189d5.json b/objects/vulnerability/vulnerability--72a796f8-c6b5-4dab-b3df-9a85846189d5.json new file mode 100644 index 00000000000..15fca74ed5f --- /dev/null +++ b/objects/vulnerability/vulnerability--72a796f8-c6b5-4dab-b3df-9a85846189d5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1e34b909-8a7c-4e3e-ae0c-2ba104326802", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--72a796f8-c6b5-4dab-b3df-9a85846189d5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.822155Z", + "modified": "2024-11-13T00:20:44.822155Z", + "name": "CVE-2024-50336", + "description": "matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. Fixed in matrix-js-sdk 34.11.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50336" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--72b824c3-f3ff-4c15-9ac9-166819c0a979.json b/objects/vulnerability/vulnerability--72b824c3-f3ff-4c15-9ac9-166819c0a979.json new file mode 100644 index 00000000000..f26b30fe7fc --- /dev/null +++ b/objects/vulnerability/vulnerability--72b824c3-f3ff-4c15-9ac9-166819c0a979.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2a393a83-3a9d-4f34-becb-c1b9965b021e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--72b824c3-f3ff-4c15-9ac9-166819c0a979", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.945142Z", + "modified": "2024-11-13T00:20:46.945142Z", + "name": "CVE-2024-43629", + "description": "Windows DWM Core Library Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43629" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--75133cdd-a7b6-468c-948e-1ab34b48e561.json b/objects/vulnerability/vulnerability--75133cdd-a7b6-468c-948e-1ab34b48e561.json new file mode 100644 index 00000000000..adc9da2e4ad --- /dev/null +++ b/objects/vulnerability/vulnerability--75133cdd-a7b6-468c-948e-1ab34b48e561.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4ada986c-252d-4570-8009-edfe6c09a5d1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--75133cdd-a7b6-468c-948e-1ab34b48e561", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.070679Z", + "modified": "2024-11-13T00:20:46.070679Z", + "name": "CVE-2024-49510", + "description": "InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49510" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--763e1b20-7238-4e53-b6f4-53d4dc850a68.json b/objects/vulnerability/vulnerability--763e1b20-7238-4e53-b6f4-53d4dc850a68.json new file mode 100644 index 00000000000..176fcd593ab --- /dev/null +++ b/objects/vulnerability/vulnerability--763e1b20-7238-4e53-b6f4-53d4dc850a68.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--18e1c94b-eab3-4d8a-84da-8e4e4dd50e6d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--763e1b20-7238-4e53-b6f4-53d4dc850a68", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.927227Z", + "modified": "2024-11-13T00:20:45.927227Z", + "name": "CVE-2024-49032", + "description": "Microsoft Office Graphics Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49032" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--76a91f49-1d17-4e12-958f-819975085abe.json b/objects/vulnerability/vulnerability--76a91f49-1d17-4e12-958f-819975085abe.json new file mode 100644 index 00000000000..06713e09e59 --- /dev/null +++ b/objects/vulnerability/vulnerability--76a91f49-1d17-4e12-958f-819975085abe.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d8b694ce-2a1f-4a1e-b071-b80582fd221a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--76a91f49-1d17-4e12-958f-819975085abe", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.05734Z", + "modified": "2024-11-13T00:20:46.05734Z", + "name": "CVE-2024-49039", + "description": "Windows Task Scheduler Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49039" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--772b9c18-af98-4823-9ff3-b46e88b7aa2f.json b/objects/vulnerability/vulnerability--772b9c18-af98-4823-9ff3-b46e88b7aa2f.json new file mode 100644 index 00000000000..2d4ac0cfbe3 --- /dev/null +++ b/objects/vulnerability/vulnerability--772b9c18-af98-4823-9ff3-b46e88b7aa2f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--76526950-c61f-4242-ba8a-896a98c1b825", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--772b9c18-af98-4823-9ff3-b46e88b7aa2f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.028562Z", + "modified": "2024-11-13T00:20:46.028562Z", + "name": "CVE-2024-49004", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49004" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--77813cc8-d3d8-490c-af24-41653a21f3fa.json b/objects/vulnerability/vulnerability--77813cc8-d3d8-490c-af24-41653a21f3fa.json new file mode 100644 index 00000000000..b9504e26fdf --- /dev/null +++ b/objects/vulnerability/vulnerability--77813cc8-d3d8-490c-af24-41653a21f3fa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5a97fcac-b400-4b09-a2d9-1f6ec4b9d44a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--77813cc8-d3d8-490c-af24-41653a21f3fa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.056171Z", + "modified": "2024-11-13T00:20:46.056171Z", + "name": "CVE-2024-49031", + "description": "Microsoft Office Graphics Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49031" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--784dcd38-c6d0-4df1-9f13-e2dba19edfb0.json b/objects/vulnerability/vulnerability--784dcd38-c6d0-4df1-9f13-e2dba19edfb0.json new file mode 100644 index 00000000000..8f1fdfff5a2 --- /dev/null +++ b/objects/vulnerability/vulnerability--784dcd38-c6d0-4df1-9f13-e2dba19edfb0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--231cd843-9150-4776-99a4-acfd1738463b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--784dcd38-c6d0-4df1-9f13-e2dba19edfb0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.906344Z", + "modified": "2024-11-13T00:20:45.906344Z", + "name": "CVE-2024-49015", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49015" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--785d5e66-460e-4001-80dd-58bb14e2f123.json b/objects/vulnerability/vulnerability--785d5e66-460e-4001-80dd-58bb14e2f123.json new file mode 100644 index 00000000000..9d2fc0e4a0d --- /dev/null +++ b/objects/vulnerability/vulnerability--785d5e66-460e-4001-80dd-58bb14e2f123.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c1d83fb4-7dce-4f38-ad12-31935c08dfee", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--785d5e66-460e-4001-80dd-58bb14e2f123", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.414559Z", + "modified": "2024-11-13T00:20:46.414559Z", + "name": "CVE-2024-32116", + "description": "Multiple relative path traversal vulnerabilities [CWE-23] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData version 7.4.0 and before 7.2.7 allows a privileged attacker to delete files from the underlying filesystem via crafted CLI requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-32116" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7a7ac2b1-b7b6-4a00-b0d5-59097584a15b.json b/objects/vulnerability/vulnerability--7a7ac2b1-b7b6-4a00-b0d5-59097584a15b.json new file mode 100644 index 00000000000..bd6fa6db552 --- /dev/null +++ b/objects/vulnerability/vulnerability--7a7ac2b1-b7b6-4a00-b0d5-59097584a15b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5e5c9ab7-aa29-4e58-a736-c5a32c48ee11", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7a7ac2b1-b7b6-4a00-b0d5-59097584a15b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.055668Z", + "modified": "2024-11-13T00:20:45.055668Z", + "name": "CVE-2024-11004", + "description": "Reflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11004" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7bc09bcf-2cff-40a5-85ca-c8d83125da23.json b/objects/vulnerability/vulnerability--7bc09bcf-2cff-40a5-85ca-c8d83125da23.json new file mode 100644 index 00000000000..0fc37739415 --- /dev/null +++ b/objects/vulnerability/vulnerability--7bc09bcf-2cff-40a5-85ca-c8d83125da23.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--86843de1-c78b-47c0-abce-1d5fe6b01071", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7bc09bcf-2cff-40a5-85ca-c8d83125da23", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.936892Z", + "modified": "2024-11-13T00:20:46.936892Z", + "name": "CVE-2024-43626", + "description": "Windows Telephony Service Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43626" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7bef1c69-cde8-46c6-8618-c97935a17fc7.json b/objects/vulnerability/vulnerability--7bef1c69-cde8-46c6-8618-c97935a17fc7.json new file mode 100644 index 00000000000..8e5cf832f3d --- /dev/null +++ b/objects/vulnerability/vulnerability--7bef1c69-cde8-46c6-8618-c97935a17fc7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1070f362-c5c7-4268-8b1b-c796c6caf987", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7bef1c69-cde8-46c6-8618-c97935a17fc7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.077861Z", + "modified": "2024-11-13T00:20:46.077861Z", + "name": "CVE-2024-49021", + "description": "Microsoft SQL Server Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49021" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7c2d8c17-dc26-4b13-b1ba-a15988d5cc6b.json b/objects/vulnerability/vulnerability--7c2d8c17-dc26-4b13-b1ba-a15988d5cc6b.json new file mode 100644 index 00000000000..d2c1e2396ce --- /dev/null +++ b/objects/vulnerability/vulnerability--7c2d8c17-dc26-4b13-b1ba-a15988d5cc6b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6c43725b-d850-49df-af8e-a68285693f08", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7c2d8c17-dc26-4b13-b1ba-a15988d5cc6b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.895756Z", + "modified": "2024-11-13T00:20:46.895756Z", + "name": "CVE-2024-43447", + "description": "Windows SMBv3 Server Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43447" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7c5e23db-33be-48ca-a699-95a99bad9b52.json b/objects/vulnerability/vulnerability--7c5e23db-33be-48ca-a699-95a99bad9b52.json new file mode 100644 index 00000000000..793d2418c5d --- /dev/null +++ b/objects/vulnerability/vulnerability--7c5e23db-33be-48ca-a699-95a99bad9b52.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3bb92056-a4da-4e83-ab9d-e0903b48660a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7c5e23db-33be-48ca-a699-95a99bad9b52", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.308311Z", + "modified": "2024-11-13T00:20:46.308311Z", + "name": "CVE-2024-46891", + "description": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly restrict the size of generated log files. This could allow an unauthenticated remote attacker to trigger a large amount of logged events to exhaust the system's resources and create a denial of service condition.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46891" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7cd68cda-35f2-47c7-9485-d510482e55d8.json b/objects/vulnerability/vulnerability--7cd68cda-35f2-47c7-9485-d510482e55d8.json new file mode 100644 index 00000000000..1ac78bdbbc7 --- /dev/null +++ b/objects/vulnerability/vulnerability--7cd68cda-35f2-47c7-9485-d510482e55d8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--30c293cd-c90d-4894-aafe-390d53ec0128", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7cd68cda-35f2-47c7-9485-d510482e55d8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.781282Z", + "modified": "2024-11-13T00:20:44.781282Z", + "name": "CVE-2024-50331", + "description": "An out-of-bounds read vulnerability in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to leak sensitive information in memory.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50331" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7dac3159-1dcb-4e13-944a-f455de2e5d5d.json b/objects/vulnerability/vulnerability--7dac3159-1dcb-4e13-944a-f455de2e5d5d.json new file mode 100644 index 00000000000..cf2016534cb --- /dev/null +++ b/objects/vulnerability/vulnerability--7dac3159-1dcb-4e13-944a-f455de2e5d5d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--179623bd-ea6b-47ec-a0eb-7eacfa181c27", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7dac3159-1dcb-4e13-944a-f455de2e5d5d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.268507Z", + "modified": "2024-11-13T00:20:44.268507Z", + "name": "CVE-2024-48075", + "description": "A Heap buffer overflow in the server-site handshake implementation in Real Time Logic SharkSSL 09.09.24 and earlier allows a remote attacker to trigger a Denial-of-Service via a malformed TLS Client Key Exchange message.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48075" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7e00e874-274c-4f23-aacc-fe2eb21c05bc.json b/objects/vulnerability/vulnerability--7e00e874-274c-4f23-aacc-fe2eb21c05bc.json new file mode 100644 index 00000000000..e88b1ad6323 --- /dev/null +++ b/objects/vulnerability/vulnerability--7e00e874-274c-4f23-aacc-fe2eb21c05bc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bd7a3976-f4cf-448a-86fe-5aee1c8013c0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7e00e874-274c-4f23-aacc-fe2eb21c05bc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.814169Z", + "modified": "2024-11-13T00:20:44.814169Z", + "name": "CVE-2024-50320", + "description": "An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50320" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7eb94e41-e2f9-425b-8235-e11a89a03f93.json b/objects/vulnerability/vulnerability--7eb94e41-e2f9-425b-8235-e11a89a03f93.json new file mode 100644 index 00000000000..c0cdbbeb6c9 --- /dev/null +++ b/objects/vulnerability/vulnerability--7eb94e41-e2f9-425b-8235-e11a89a03f93.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9f5c8048-93a1-4b88-bf1f-1c261f340f99", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7eb94e41-e2f9-425b-8235-e11a89a03f93", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.687887Z", + "modified": "2024-11-13T00:20:45.687887Z", + "name": "CVE-2024-21938", + "description": "Incorrect default permissions in the AMD Management Plugin for the Microsoft® System Center Configuration Manager (SCCM) installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21938" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7ebc731f-4f88-45bd-9ea6-5a1dbc8cfcfa.json b/objects/vulnerability/vulnerability--7ebc731f-4f88-45bd-9ea6-5a1dbc8cfcfa.json new file mode 100644 index 00000000000..67eace63187 --- /dev/null +++ b/objects/vulnerability/vulnerability--7ebc731f-4f88-45bd-9ea6-5a1dbc8cfcfa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--156f296b-69fb-4e2c-84df-2a499348d8e6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7ebc731f-4f88-45bd-9ea6-5a1dbc8cfcfa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.333531Z", + "modified": "2024-11-13T00:20:45.333531Z", + "name": "CVE-2024-8495", + "description": "A null pointer dereference in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8495" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7efc30ea-4076-439e-a7ac-0f92dd62263a.json b/objects/vulnerability/vulnerability--7efc30ea-4076-439e-a7ac-0f92dd62263a.json new file mode 100644 index 00000000000..4ab69f65f93 --- /dev/null +++ b/objects/vulnerability/vulnerability--7efc30ea-4076-439e-a7ac-0f92dd62263a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--50ce7cba-ebbf-4f4b-9a70-ba21085a0299", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7efc30ea-4076-439e-a7ac-0f92dd62263a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.27665Z", + "modified": "2024-11-13T00:20:46.27665Z", + "name": "CVE-2024-36509", + "description": "An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiWeb version 7.6.0, version 7.4.3 and below, version 7.2.10 and below, version 7.0.10 and below, version 6.3.23 and below may allow an authenticated attacker to access the encrypted passwords of other administrators via the \"Log Access Event\" logs page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-36509" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7f908bc6-38d7-46c2-baf9-88f10d96c574.json b/objects/vulnerability/vulnerability--7f908bc6-38d7-46c2-baf9-88f10d96c574.json new file mode 100644 index 00000000000..56ff5c9f6ce --- /dev/null +++ b/objects/vulnerability/vulnerability--7f908bc6-38d7-46c2-baf9-88f10d96c574.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b72aa4b6-5c1f-44fa-b533-27af6f6b963a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7f908bc6-38d7-46c2-baf9-88f10d96c574", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.216815Z", + "modified": "2024-11-13T00:20:44.216815Z", + "name": "CVE-2024-51565", + "description": "The hda driver is vulnerable to a buffer over-read from a guest-controlled value.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51565" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--802cc75f-cfbf-44c2-8355-a8244b04bc46.json b/objects/vulnerability/vulnerability--802cc75f-cfbf-44c2-8355-a8244b04bc46.json new file mode 100644 index 00000000000..8f8a606f651 --- /dev/null +++ b/objects/vulnerability/vulnerability--802cc75f-cfbf-44c2-8355-a8244b04bc46.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3b3504b9-f336-41e5-9fd3-6a34fc524b49", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--802cc75f-cfbf-44c2-8355-a8244b04bc46", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.210076Z", + "modified": "2024-11-13T00:20:44.210076Z", + "name": "CVE-2024-51094", + "description": "An issue in Snipe-IT v.7.0.13 build 15514 allows a remote attacker to escalate privileges via the file /account/profile of the component \"Name\" field value under \"Edit Your Profile\".", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51094" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--80d28fca-113e-47f6-b17a-ec90f8730ca3.json b/objects/vulnerability/vulnerability--80d28fca-113e-47f6-b17a-ec90f8730ca3.json new file mode 100644 index 00000000000..b0afdca2299 --- /dev/null +++ b/objects/vulnerability/vulnerability--80d28fca-113e-47f6-b17a-ec90f8730ca3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4747d916-899e-4dd8-8a7e-8c2ee7e6f34b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--80d28fca-113e-47f6-b17a-ec90f8730ca3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.028479Z", + "modified": "2024-11-13T00:20:45.028479Z", + "name": "CVE-2024-11097", + "description": "A vulnerability has been found in SourceCodester Student Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the component Main Menu. The manipulation leads to infinite loop. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11097" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--819a8fc4-00bb-4854-81a4-a492a8905203.json b/objects/vulnerability/vulnerability--819a8fc4-00bb-4854-81a4-a492a8905203.json new file mode 100644 index 00000000000..c89fb69f1dc --- /dev/null +++ b/objects/vulnerability/vulnerability--819a8fc4-00bb-4854-81a4-a492a8905203.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--84d88c1d-38a3-48c9-a977-08903fff3f0f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--819a8fc4-00bb-4854-81a4-a492a8905203", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.284573Z", + "modified": "2024-11-13T00:20:46.284573Z", + "name": "CVE-2024-46894", + "description": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application does not properly validate authorization of a user to query the \"/api/sftp/users\" endpoint. This could allow an authenticated remote attacker to gain knowledge about the list of configured users of the SFTP service and also modify that configuration.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46894" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--820993d4-bd28-4fef-b98d-b89293f719f8.json b/objects/vulnerability/vulnerability--820993d4-bd28-4fef-b98d-b89293f719f8.json new file mode 100644 index 00000000000..967c5028b89 --- /dev/null +++ b/objects/vulnerability/vulnerability--820993d4-bd28-4fef-b98d-b89293f719f8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f362a92e-5cc5-4d6d-9d9a-df6f30812886", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--820993d4-bd28-4fef-b98d-b89293f719f8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.05212Z", + "modified": "2024-11-13T00:20:46.05212Z", + "name": "CVE-2024-49001", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49001" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8381f1af-05af-4eb4-afaf-578a7c49e3ca.json b/objects/vulnerability/vulnerability--8381f1af-05af-4eb4-afaf-578a7c49e3ca.json new file mode 100644 index 00000000000..9f0c8989bf7 --- /dev/null +++ b/objects/vulnerability/vulnerability--8381f1af-05af-4eb4-afaf-578a7c49e3ca.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--04bf6816-125b-4857-8529-2100552121d6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8381f1af-05af-4eb4-afaf-578a7c49e3ca", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.882325Z", + "modified": "2024-11-13T00:20:46.882325Z", + "name": "CVE-2024-43624", + "description": "Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43624" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--84104d42-849a-4bf9-9b76-ed68bc92b4a3.json b/objects/vulnerability/vulnerability--84104d42-849a-4bf9-9b76-ed68bc92b4a3.json new file mode 100644 index 00000000000..904eba515fe --- /dev/null +++ b/objects/vulnerability/vulnerability--84104d42-849a-4bf9-9b76-ed68bc92b4a3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--954ae1eb-a607-4fea-acd3-3b708311c19f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--84104d42-849a-4bf9-9b76-ed68bc92b4a3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.073467Z", + "modified": "2024-11-13T00:20:46.073467Z", + "name": "CVE-2024-49511", + "description": "InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49511" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--856e0712-3654-427c-82fe-95f11312b9f7.json b/objects/vulnerability/vulnerability--856e0712-3654-427c-82fe-95f11312b9f7.json new file mode 100644 index 00000000000..1b9d44d15d4 --- /dev/null +++ b/objects/vulnerability/vulnerability--856e0712-3654-427c-82fe-95f11312b9f7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b58e9e34-c8e8-4b75-bddd-51a0ff0f68af", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--856e0712-3654-427c-82fe-95f11312b9f7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.069531Z", + "modified": "2024-11-13T00:20:46.069531Z", + "name": "CVE-2024-49394", + "description": "In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49394" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--863ea478-12db-4d60-8860-94f6d45c6c5a.json b/objects/vulnerability/vulnerability--863ea478-12db-4d60-8860-94f6d45c6c5a.json new file mode 100644 index 00000000000..38dca2ca99a --- /dev/null +++ b/objects/vulnerability/vulnerability--863ea478-12db-4d60-8860-94f6d45c6c5a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b2561826-8e6b-4635-b742-1b4bce2dba68", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--863ea478-12db-4d60-8860-94f6d45c6c5a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.998633Z", + "modified": "2024-11-13T00:20:44.998633Z", + "name": "CVE-2024-25253", + "description": "Driver Booster v10.6 was discovered to contain a buffer overflow via the Host parameter under the Customize proxy module.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-25253" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8670f060-99d9-4638-bd00-ee9493459a66.json b/objects/vulnerability/vulnerability--8670f060-99d9-4638-bd00-ee9493459a66.json new file mode 100644 index 00000000000..bdfe5bf2983 --- /dev/null +++ b/objects/vulnerability/vulnerability--8670f060-99d9-4638-bd00-ee9493459a66.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b2be1df2-bdfd-4745-942f-8886bf47aa2d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8670f060-99d9-4638-bd00-ee9493459a66", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.04227Z", + "modified": "2024-11-13T00:20:45.04227Z", + "name": "CVE-2024-11005", + "description": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11005" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--871fcc30-6821-40d7-8a7a-cfcf41fedaf3.json b/objects/vulnerability/vulnerability--871fcc30-6821-40d7-8a7a-cfcf41fedaf3.json new file mode 100644 index 00000000000..ea271deefc1 --- /dev/null +++ b/objects/vulnerability/vulnerability--871fcc30-6821-40d7-8a7a-cfcf41fedaf3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a419694a-4e2b-4a35-bae8-cb42a0aa7233", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--871fcc30-6821-40d7-8a7a-cfcf41fedaf3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.769251Z", + "modified": "2024-11-13T00:20:44.769251Z", + "name": "CVE-2024-50559", + "description": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate the filenames of the certificate. This could allow an authenticated remote attacker to append arbitrary values which will lead to compromise of integrity of the system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50559" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--87e7b77e-2464-4ba2-8de2-2240ad122fc6.json b/objects/vulnerability/vulnerability--87e7b77e-2464-4ba2-8de2-2240ad122fc6.json new file mode 100644 index 00000000000..283410acfc7 --- /dev/null +++ b/objects/vulnerability/vulnerability--87e7b77e-2464-4ba2-8de2-2240ad122fc6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4e853335-540f-402b-9796-ba7595e689ab", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--87e7b77e-2464-4ba2-8de2-2240ad122fc6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.079414Z", + "modified": "2024-11-13T00:20:46.079414Z", + "name": "CVE-2024-49509", + "description": "InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49509" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8839773a-edc8-45fc-9c83-ecfe73f0ea24.json b/objects/vulnerability/vulnerability--8839773a-edc8-45fc-9c83-ecfe73f0ea24.json new file mode 100644 index 00000000000..debadecd763 --- /dev/null +++ b/objects/vulnerability/vulnerability--8839773a-edc8-45fc-9c83-ecfe73f0ea24.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--36a702d6-75da-480f-80bf-8531522ef09f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8839773a-edc8-45fc-9c83-ecfe73f0ea24", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.933915Z", + "modified": "2024-11-13T00:20:45.933915Z", + "name": "CVE-2024-49048", + "description": "TorchGeo Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49048" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8a7d8d2d-dcee-4b5b-b1b5-f93a7fc977c3.json b/objects/vulnerability/vulnerability--8a7d8d2d-dcee-4b5b-b1b5-f93a7fc977c3.json new file mode 100644 index 00000000000..864b141eb27 --- /dev/null +++ b/objects/vulnerability/vulnerability--8a7d8d2d-dcee-4b5b-b1b5-f93a7fc977c3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--37c088fa-2226-406e-bdc7-f8ed2b109b96", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8a7d8d2d-dcee-4b5b-b1b5-f93a7fc977c3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.737556Z", + "modified": "2024-11-13T00:20:44.737556Z", + "name": "CVE-2024-47450", + "description": "Illustrator versions 28.7.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47450" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8abd24ab-182c-437a-8ddf-89d02b1ddbb6.json b/objects/vulnerability/vulnerability--8abd24ab-182c-437a-8ddf-89d02b1ddbb6.json new file mode 100644 index 00000000000..18bd5536a2f --- /dev/null +++ b/objects/vulnerability/vulnerability--8abd24ab-182c-437a-8ddf-89d02b1ddbb6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--72ba597c-4245-45b0-afc7-1e042ceffb48", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8abd24ab-182c-437a-8ddf-89d02b1ddbb6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.175633Z", + "modified": "2024-11-13T00:20:44.175633Z", + "name": "CVE-2024-51722", + "description": "A local privilege escalation vulnerability in the SecuSUITE Server (System Configuration) of SecuSUITE versions 5.0.420 and earlier could allow a successful attacker that had gained control of code running under one of the system accounts listed in the configuration file to potentially issue privileged script commands.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51722" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8ac4d058-2641-4849-ad75-c5daae42cb8a.json b/objects/vulnerability/vulnerability--8ac4d058-2641-4849-ad75-c5daae42cb8a.json new file mode 100644 index 00000000000..d45ddb175ad --- /dev/null +++ b/objects/vulnerability/vulnerability--8ac4d058-2641-4849-ad75-c5daae42cb8a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--adf9d9df-f567-4f51-acb9-eacc177f96a7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8ac4d058-2641-4849-ad75-c5daae42cb8a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.543838Z", + "modified": "2024-11-13T00:20:44.543838Z", + "name": "CVE-2024-9357", + "description": "The xili-tidy-tags plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'action' parameter in all versions up to, and including, 1.12.04 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9357" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8aec430f-eade-43bf-aef1-7a350409ae56.json b/objects/vulnerability/vulnerability--8aec430f-eade-43bf-aef1-7a350409ae56.json new file mode 100644 index 00000000000..ebaa9cbef11 --- /dev/null +++ b/objects/vulnerability/vulnerability--8aec430f-eade-43bf-aef1-7a350409ae56.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--33e4bacc-afba-4847-ac2c-29c54c91e0c6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8aec430f-eade-43bf-aef1-7a350409ae56", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.32929Z", + "modified": "2024-11-13T00:20:45.32929Z", + "name": "CVE-2024-8074", + "description": "Improper Privilege Management vulnerability in Nomysoft Informatics Nomysem allows Collect Data as Provided by Users.This issue affects Nomysem: before 13.10.2024.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8074" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8b27fed4-17bd-42e1-b6e9-37c48ecb08c8.json b/objects/vulnerability/vulnerability--8b27fed4-17bd-42e1-b6e9-37c48ecb08c8.json new file mode 100644 index 00000000000..5ff58e36331 --- /dev/null +++ b/objects/vulnerability/vulnerability--8b27fed4-17bd-42e1-b6e9-37c48ecb08c8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f8cc3a95-a544-4514-b257-371fc3c50269", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8b27fed4-17bd-42e1-b6e9-37c48ecb08c8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.235532Z", + "modified": "2024-11-13T00:20:45.235532Z", + "name": "CVE-2024-33510", + "description": "An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.16 and below; FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below; FortiSASE version 24.2.b SSL-VPN web user interface may allow a remote unauthenticated attacker to perform phishing attempts via crafted requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-33510" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8b4a7aa1-6afb-4ce9-ac47-f20ac055c5fa.json b/objects/vulnerability/vulnerability--8b4a7aa1-6afb-4ce9-ac47-f20ac055c5fa.json new file mode 100644 index 00000000000..1ffd68efb51 --- /dev/null +++ b/objects/vulnerability/vulnerability--8b4a7aa1-6afb-4ce9-ac47-f20ac055c5fa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ef2e0b65-6749-44d6-8931-c108783ab992", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8b4a7aa1-6afb-4ce9-ac47-f20ac055c5fa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.026872Z", + "modified": "2024-11-13T00:20:46.026872Z", + "name": "CVE-2024-49050", + "description": "Visual Studio Code Python Extension Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49050" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8b6d2730-0a53-4f58-a356-47cc666fddfe.json b/objects/vulnerability/vulnerability--8b6d2730-0a53-4f58-a356-47cc666fddfe.json new file mode 100644 index 00000000000..839ac5f7760 --- /dev/null +++ b/objects/vulnerability/vulnerability--8b6d2730-0a53-4f58-a356-47cc666fddfe.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f64019f2-d9c7-438f-b38b-9bfe78d396d7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8b6d2730-0a53-4f58-a356-47cc666fddfe", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.279932Z", + "modified": "2024-11-13T00:20:44.279932Z", + "name": "CVE-2024-48998", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48998" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8ce73e56-6e05-4ec6-906d-54d6d3a8341d.json b/objects/vulnerability/vulnerability--8ce73e56-6e05-4ec6-906d-54d6d3a8341d.json new file mode 100644 index 00000000000..e9ad3401edd --- /dev/null +++ b/objects/vulnerability/vulnerability--8ce73e56-6e05-4ec6-906d-54d6d3a8341d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--85e9a062-a246-4c5a-8d2d-32649fe666bd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8ce73e56-6e05-4ec6-906d-54d6d3a8341d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.422191Z", + "modified": "2024-11-13T00:20:44.422191Z", + "name": "CVE-2024-45147", + "description": "Bridge versions 13.0.9, 14.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45147" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8f34405e-da8b-42c7-ac24-af4f3991935f.json b/objects/vulnerability/vulnerability--8f34405e-da8b-42c7-ac24-af4f3991935f.json new file mode 100644 index 00000000000..e82e677b61e --- /dev/null +++ b/objects/vulnerability/vulnerability--8f34405e-da8b-42c7-ac24-af4f3991935f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9c5f6d7f-c7e3-45d7-93db-931ac5086aeb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8f34405e-da8b-42c7-ac24-af4f3991935f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.523462Z", + "modified": "2024-11-13T00:20:44.523462Z", + "name": "CVE-2024-10672", + "description": "The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with editor-level access and above, to delete limited files on the server.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10672" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8fb3e363-9f89-43db-bbc3-f024f7ac1d6f.json b/objects/vulnerability/vulnerability--8fb3e363-9f89-43db-bbc3-f024f7ac1d6f.json new file mode 100644 index 00000000000..4b44f756efc --- /dev/null +++ b/objects/vulnerability/vulnerability--8fb3e363-9f89-43db-bbc3-f024f7ac1d6f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--63d684ea-54c6-4fae-8d83-189ad3005ae3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8fb3e363-9f89-43db-bbc3-f024f7ac1d6f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.479893Z", + "modified": "2024-11-13T00:20:44.479893Z", + "name": "CVE-2024-10218", + "description": "XSS Attack in mar.jar, Monitoring Archive Utility (MAR Utility), monitoringconsolecommon.jar in TIBCO Software Inc TIBCO Hawk and TIBCO Operational Intelligence", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10218" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--93b22c5a-b7e3-4742-8140-acd31412d5e9.json b/objects/vulnerability/vulnerability--93b22c5a-b7e3-4742-8140-acd31412d5e9.json new file mode 100644 index 00000000000..3c6524d5c50 --- /dev/null +++ b/objects/vulnerability/vulnerability--93b22c5a-b7e3-4742-8140-acd31412d5e9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7b367b68-7ab8-499c-bd52-326c7962b9ba", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--93b22c5a-b7e3-4742-8140-acd31412d5e9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.643577Z", + "modified": "2024-11-13T00:20:45.643577Z", + "name": "CVE-2024-21975", + "description": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21975" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--93cc7dc5-dd72-4abc-b2da-ee570f974acc.json b/objects/vulnerability/vulnerability--93cc7dc5-dd72-4abc-b2da-ee570f974acc.json new file mode 100644 index 00000000000..8f924873e4f --- /dev/null +++ b/objects/vulnerability/vulnerability--93cc7dc5-dd72-4abc-b2da-ee570f974acc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--36d55174-7e78-477a-bd30-0f9856f840ee", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--93cc7dc5-dd72-4abc-b2da-ee570f974acc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.920991Z", + "modified": "2024-11-13T00:20:46.920991Z", + "name": "CVE-2024-43630", + "description": "Windows Kernel Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43630" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--94ef9454-fdb1-481c-984e-2c2131f72f46.json b/objects/vulnerability/vulnerability--94ef9454-fdb1-481c-984e-2c2131f72f46.json new file mode 100644 index 00000000000..61a9fa4b223 --- /dev/null +++ b/objects/vulnerability/vulnerability--94ef9454-fdb1-481c-984e-2c2131f72f46.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6fd158cc-63fc-41aa-a0c2-0e0ce5d4c244", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--94ef9454-fdb1-481c-984e-2c2131f72f46", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.396595Z", + "modified": "2024-11-13T00:20:44.396595Z", + "name": "CVE-2024-52010", + "description": "Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. A command injection vulnerability in the Web SSH feature allows an authenticated attacker to execute arbitrary commands as root on the host. Zoraxy has a Web SSH terminal feature that allows authenticated users to connect to SSH servers from their browsers. In HandleCreateProxySession the request to create an SSH session is handled. An attacker can exploit the username variable to escape from the bash command and inject arbitrary commands into sshCommand. This is possible, because, unlike hostname and port, the username is not validated or sanitized.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52010" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--95357a53-5b6e-4c53-a6a2-27fc1f3bf17a.json b/objects/vulnerability/vulnerability--95357a53-5b6e-4c53-a6a2-27fc1f3bf17a.json new file mode 100644 index 00000000000..2a9c094c37c --- /dev/null +++ b/objects/vulnerability/vulnerability--95357a53-5b6e-4c53-a6a2-27fc1f3bf17a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--717876d5-1475-434c-9bc7-932b0dcd78e4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--95357a53-5b6e-4c53-a6a2-27fc1f3bf17a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.709973Z", + "modified": "2024-11-13T00:20:44.709973Z", + "name": "CVE-2024-47906", + "description": "Excessive binary privileges in Ivanti Connect Secure which affects versions 22.4R2 through 22.7R2.2 inclusive within the R2 release line and Ivanti Policy Secure before version 22.7R1.2 allow a local authenticated attacker to escalate privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47906" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--95a7b821-0e17-466e-bf3c-8b82e14638c1.json b/objects/vulnerability/vulnerability--95a7b821-0e17-466e-bf3c-8b82e14638c1.json new file mode 100644 index 00000000000..da19d5fad10 --- /dev/null +++ b/objects/vulnerability/vulnerability--95a7b821-0e17-466e-bf3c-8b82e14638c1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9c4e7a14-e0b9-4133-a4dd-4e7801f1fed9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--95a7b821-0e17-466e-bf3c-8b82e14638c1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.761687Z", + "modified": "2024-11-13T00:20:44.761687Z", + "name": "CVE-2024-50328", + "description": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50328" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--95c45952-2cca-4d37-bdd0-6c0ffa533690.json b/objects/vulnerability/vulnerability--95c45952-2cca-4d37-bdd0-6c0ffa533690.json new file mode 100644 index 00000000000..1eaed9bbf22 --- /dev/null +++ b/objects/vulnerability/vulnerability--95c45952-2cca-4d37-bdd0-6c0ffa533690.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--02e5f231-f3bf-4ea9-8b65-249f57d36c7c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--95c45952-2cca-4d37-bdd0-6c0ffa533690", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.521299Z", + "modified": "2024-11-13T00:20:44.521299Z", + "name": "CVE-2024-10323", + "description": "The JetWidgets For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.0.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10323" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--95e0d916-7abc-49e3-83b7-76898d2f5f52.json b/objects/vulnerability/vulnerability--95e0d916-7abc-49e3-83b7-76898d2f5f52.json new file mode 100644 index 00000000000..b2f65c9b030 --- /dev/null +++ b/objects/vulnerability/vulnerability--95e0d916-7abc-49e3-83b7-76898d2f5f52.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--355364d0-4f25-4c50-a9e7-fe50a27ecd9b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--95e0d916-7abc-49e3-83b7-76898d2f5f52", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.66166Z", + "modified": "2024-11-13T00:20:44.66166Z", + "name": "CVE-2024-47430", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47430" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--960003f8-bc02-43dc-8965-54bd0f3221d6.json b/objects/vulnerability/vulnerability--960003f8-bc02-43dc-8965-54bd0f3221d6.json new file mode 100644 index 00000000000..2217b9f42b4 --- /dev/null +++ b/objects/vulnerability/vulnerability--960003f8-bc02-43dc-8965-54bd0f3221d6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9377c0ca-8eab-439d-bf64-5a73eebce99b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--960003f8-bc02-43dc-8965-54bd0f3221d6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.786774Z", + "modified": "2024-11-13T00:20:44.786774Z", + "name": "CVE-2024-50313", + "description": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.16.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.15 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.29 only if the basic authentication mechanism is used by the application). The basic authentication implementation of affected applications contains a race condition vulnerability which could allow unauthenticated remote attackers to circumvent default account lockout measures.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50313" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--967b60b1-2be3-48b4-a4cf-b250e594e6b1.json b/objects/vulnerability/vulnerability--967b60b1-2be3-48b4-a4cf-b250e594e6b1.json new file mode 100644 index 00000000000..1c62fbfd3d9 --- /dev/null +++ b/objects/vulnerability/vulnerability--967b60b1-2be3-48b4-a4cf-b250e594e6b1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fc34e014-4368-46fa-b493-ea9dc8e80eb5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--967b60b1-2be3-48b4-a4cf-b250e594e6b1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.886788Z", + "modified": "2024-11-13T00:20:46.886788Z", + "name": "CVE-2024-43642", + "description": "Windows SMB Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43642" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--975a0312-f028-47fc-8a28-270673c2b904.json b/objects/vulnerability/vulnerability--975a0312-f028-47fc-8a28-270673c2b904.json new file mode 100644 index 00000000000..40a43e86975 --- /dev/null +++ b/objects/vulnerability/vulnerability--975a0312-f028-47fc-8a28-270673c2b904.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0e2d8f8b-96bd-4d58-8a52-d606299540b2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--975a0312-f028-47fc-8a28-270673c2b904", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.930789Z", + "modified": "2024-11-13T00:20:46.930789Z", + "name": "CVE-2024-43530", + "description": "Windows Update Stack Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43530" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--97f7c328-c3e9-441a-b7d8-9c93efa38fee.json b/objects/vulnerability/vulnerability--97f7c328-c3e9-441a-b7d8-9c93efa38fee.json new file mode 100644 index 00000000000..13dfce4e8f6 --- /dev/null +++ b/objects/vulnerability/vulnerability--97f7c328-c3e9-441a-b7d8-9c93efa38fee.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3483e20a-2d04-4b07-bff1-ea853fe6cd5f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--97f7c328-c3e9-441a-b7d8-9c93efa38fee", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.172932Z", + "modified": "2024-11-13T00:20:44.172932Z", + "name": "CVE-2024-51562", + "description": "The NVMe driver function nvme_opc_get_log_page is vulnerable to a buffer over-read from a guest-controlled value.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51562" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9817978c-f04a-49ac-aa74-07fdd5265012.json b/objects/vulnerability/vulnerability--9817978c-f04a-49ac-aa74-07fdd5265012.json new file mode 100644 index 00000000000..4b9752a1f99 --- /dev/null +++ b/objects/vulnerability/vulnerability--9817978c-f04a-49ac-aa74-07fdd5265012.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1aaffe13-683b-415e-a276-63b803bf7f03", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9817978c-f04a-49ac-aa74-07fdd5265012", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.943058Z", + "modified": "2024-11-13T00:20:46.943058Z", + "name": "CVE-2024-43452", + "description": "Windows Registry Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43452" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--98b809b7-c734-45f7-a703-27f12c7686f0.json b/objects/vulnerability/vulnerability--98b809b7-c734-45f7-a703-27f12c7686f0.json new file mode 100644 index 00000000000..7df122eb41f --- /dev/null +++ b/objects/vulnerability/vulnerability--98b809b7-c734-45f7-a703-27f12c7686f0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9b6cb103-97c3-4042-af4c-2061ed1926f1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--98b809b7-c734-45f7-a703-27f12c7686f0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.059469Z", + "modified": "2024-11-13T00:20:46.059469Z", + "name": "CVE-2024-49049", + "description": "Visual Studio Code Remote Extension Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49049" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9990b9e0-6694-4d17-9a4d-aef4fefdc6b1.json b/objects/vulnerability/vulnerability--9990b9e0-6694-4d17-9a4d-aef4fefdc6b1.json new file mode 100644 index 00000000000..3f8b6f0f2b7 --- /dev/null +++ b/objects/vulnerability/vulnerability--9990b9e0-6694-4d17-9a4d-aef4fefdc6b1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1f7cbc36-3b64-4e14-b3a5-ec0a479865bc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9990b9e0-6694-4d17-9a4d-aef4fefdc6b1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.661843Z", + "modified": "2024-11-13T00:20:45.661843Z", + "name": "CVE-2024-21945", + "description": "Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21945" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9a99d717-d23f-45f2-8451-63826f334705.json b/objects/vulnerability/vulnerability--9a99d717-d23f-45f2-8451-63826f334705.json new file mode 100644 index 00000000000..4bf01c8e4c6 --- /dev/null +++ b/objects/vulnerability/vulnerability--9a99d717-d23f-45f2-8451-63826f334705.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2975be36-1723-4777-8496-85f0f2257cb4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9a99d717-d23f-45f2-8451-63826f334705", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.045002Z", + "modified": "2024-11-13T00:20:46.045002Z", + "name": "CVE-2024-49011", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49011" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9b5462f9-a3cb-4535-89d5-fa94007d3c87.json b/objects/vulnerability/vulnerability--9b5462f9-a3cb-4535-89d5-fa94007d3c87.json new file mode 100644 index 00000000000..2af9bc74571 --- /dev/null +++ b/objects/vulnerability/vulnerability--9b5462f9-a3cb-4535-89d5-fa94007d3c87.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e73b00fd-bd05-4369-bd73-0ed6464f12f6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9b5462f9-a3cb-4535-89d5-fa94007d3c87", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.035546Z", + "modified": "2024-11-13T00:20:45.035546Z", + "name": "CVE-2024-11099", + "description": "A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11099" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9d018067-8503-41a9-8b43-079dd789f084.json b/objects/vulnerability/vulnerability--9d018067-8503-41a9-8b43-079dd789f084.json new file mode 100644 index 00000000000..8bbe453bf1c --- /dev/null +++ b/objects/vulnerability/vulnerability--9d018067-8503-41a9-8b43-079dd789f084.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--858c9040-351d-4825-84c3-7f63afcaccf2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9d018067-8503-41a9-8b43-079dd789f084", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.752924Z", + "modified": "2024-11-13T00:20:44.752924Z", + "name": "CVE-2024-47808", + "description": "A vulnerability has been identified in SINEC NMS (All versions < V3.0 SP1). The affected application contains a database function, that does not properly restrict the permissions of users to write to the filesystem of the host system.\r\nThis could allow an authenticated medium-privileged attacker to write arbitrary content to any location in the filesystem of the host system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47808" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a0382dc0-e939-4ed5-a6a7-5559b3b1b03b.json b/objects/vulnerability/vulnerability--a0382dc0-e939-4ed5-a6a7-5559b3b1b03b.json new file mode 100644 index 00000000000..55e14148716 --- /dev/null +++ b/objects/vulnerability/vulnerability--a0382dc0-e939-4ed5-a6a7-5559b3b1b03b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--91d3e6e0-ecaf-417d-ba8c-ade687ae15f0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a0382dc0-e939-4ed5-a6a7-5559b3b1b03b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.65876Z", + "modified": "2024-11-13T00:20:44.65876Z", + "name": "CVE-2024-47458", + "description": "Bridge versions 13.0.9, 14.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47458" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a15ffed8-73c2-4f50-ac20-029012626791.json b/objects/vulnerability/vulnerability--a15ffed8-73c2-4f50-ac20-029012626791.json new file mode 100644 index 00000000000..8e7a7b9edde --- /dev/null +++ b/objects/vulnerability/vulnerability--a15ffed8-73c2-4f50-ac20-029012626791.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b86fa225-6715-4612-8bb0-2d68f28ba9d4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a15ffed8-73c2-4f50-ac20-029012626791", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.637794Z", + "modified": "2024-11-13T00:20:45.637794Z", + "name": "CVE-2024-21976", + "description": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21976" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a21100ac-a25a-4842-9f29-a59cfc9a3b83.json b/objects/vulnerability/vulnerability--a21100ac-a25a-4842-9f29-a59cfc9a3b83.json new file mode 100644 index 00000000000..033aeba7016 --- /dev/null +++ b/objects/vulnerability/vulnerability--a21100ac-a25a-4842-9f29-a59cfc9a3b83.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--03d62328-5419-4051-b767-380e48a4ef98", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a21100ac-a25a-4842-9f29-a59cfc9a3b83", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.408229Z", + "modified": "2024-11-13T00:20:46.408229Z", + "name": "CVE-2024-32117", + "description": "An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiManager version 7.4.0 through 7.4.2 and below 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and below 7.2.5 & FortiAnalyzer-BigData version 7.4.0 and below 7.2.7 allows a privileged attacker to read arbitrary files from the underlying system via crafted HTTP or HTTPs requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-32117" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a2dd819d-bcaa-4051-947f-3826e461c6c6.json b/objects/vulnerability/vulnerability--a2dd819d-bcaa-4051-947f-3826e461c6c6.json new file mode 100644 index 00000000000..db6687362a3 --- /dev/null +++ b/objects/vulnerability/vulnerability--a2dd819d-bcaa-4051-947f-3826e461c6c6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2c7ee452-8355-4060-a078-4933f3920f9e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a2dd819d-bcaa-4051-947f-3826e461c6c6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.792345Z", + "modified": "2024-11-13T00:20:44.792345Z", + "name": "CVE-2024-50636", + "description": "PyMOL 2.5.0 contains a vulnerability in its \"Run Script\" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50636" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a4e2153c-c538-4c1c-b2b8-e36d315ba946.json b/objects/vulnerability/vulnerability--a4e2153c-c538-4c1c-b2b8-e36d315ba946.json new file mode 100644 index 00000000000..e3cb3ceb5aa --- /dev/null +++ b/objects/vulnerability/vulnerability--a4e2153c-c538-4c1c-b2b8-e36d315ba946.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2739dad9-acec-4a2b-b909-1798df1ebd44", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a4e2153c-c538-4c1c-b2b8-e36d315ba946", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.020608Z", + "modified": "2024-11-13T00:20:45.020608Z", + "name": "CVE-2024-11126", + "description": "A vulnerability was found in Digistar AG-30 Plus 2.6b. It has been classified as problematic. Affected is an unknown function of the component Login Page. The manipulation leads to improper restriction of excessive authentication attempts. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11126" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a4e9e35d-5e6b-4721-81c8-a802ff1b0385.json b/objects/vulnerability/vulnerability--a4e9e35d-5e6b-4721-81c8-a802ff1b0385.json new file mode 100644 index 00000000000..e3fde55a0b9 --- /dev/null +++ b/objects/vulnerability/vulnerability--a4e9e35d-5e6b-4721-81c8-a802ff1b0385.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--68ddb645-225e-4d94-892f-5068e7dc9515", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a4e9e35d-5e6b-4721-81c8-a802ff1b0385", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.042201Z", + "modified": "2024-11-13T00:20:46.042201Z", + "name": "CVE-2024-49521", + "description": "Adobe Commerce versions 3.2.5 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to a security feature bypass. A low privileged attacker could exploit this vulnerability to send crafted requests from the vulnerable server to internal systems, which could result in the bypassing of security measures such as firewalls. Exploitation of this issue does not require user interaction.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49521" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a4eb1201-23dd-44ee-bd9a-7371aa244c3a.json b/objects/vulnerability/vulnerability--a4eb1201-23dd-44ee-bd9a-7371aa244c3a.json new file mode 100644 index 00000000000..f3778939f79 --- /dev/null +++ b/objects/vulnerability/vulnerability--a4eb1201-23dd-44ee-bd9a-7371aa244c3a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--49c0f010-a20f-41d7-81bd-10d5a11ba918", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a4eb1201-23dd-44ee-bd9a-7371aa244c3a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.684969Z", + "modified": "2024-11-13T00:20:44.684969Z", + "name": "CVE-2024-47457", + "description": "Illustrator versions 28.7.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47457" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a55d2b54-4596-4bb7-8c6c-c1589b8293c8.json b/objects/vulnerability/vulnerability--a55d2b54-4596-4bb7-8c6c-c1589b8293c8.json new file mode 100644 index 00000000000..026acc6e63b --- /dev/null +++ b/objects/vulnerability/vulnerability--a55d2b54-4596-4bb7-8c6c-c1589b8293c8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--45ba0357-c799-42be-aa12-e045c71d1dac", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a55d2b54-4596-4bb7-8c6c-c1589b8293c8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.293457Z", + "modified": "2024-11-13T00:20:44.293457Z", + "name": "CVE-2024-48838", + "description": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) a Files or Directories Accessible to External Parties vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48838" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a57661d6-781c-4858-a4b4-d10991b12895.json b/objects/vulnerability/vulnerability--a57661d6-781c-4858-a4b4-d10991b12895.json new file mode 100644 index 00000000000..fc76c4cc95a --- /dev/null +++ b/objects/vulnerability/vulnerability--a57661d6-781c-4858-a4b4-d10991b12895.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--18c1198e-ecb3-40cc-98a8-6b3bf96807e1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a57661d6-781c-4858-a4b4-d10991b12895", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.408243Z", + "modified": "2024-11-13T00:20:44.408243Z", + "name": "CVE-2024-52297", + "description": "Tolgee is an open-source localization platform. Tolgee 3.81.1 included the all configuration properties in the PublicConfiguratioDTO publicly exposed to users. This vulnerability is fixed in v3.81.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52297" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a5cfa80e-6206-4c0d-a7e9-284c823149b9.json b/objects/vulnerability/vulnerability--a5cfa80e-6206-4c0d-a7e9-284c823149b9.json new file mode 100644 index 00000000000..9d6bd8558f2 --- /dev/null +++ b/objects/vulnerability/vulnerability--a5cfa80e-6206-4c0d-a7e9-284c823149b9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--81fee849-9db9-45ba-8a9e-d9e10aacb881", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a5cfa80e-6206-4c0d-a7e9-284c823149b9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.776663Z", + "modified": "2024-11-13T00:20:44.776663Z", + "name": "CVE-2024-50310", + "description": "A vulnerability has been identified in SIMATIC CP 1543-1 V4.0 (6GK7543-1AX10-0XE0) (All versions >= V4.0.44 < V4.0.50). Affected devices do not properly handle authorization. This could allow an unauthenticated remote attacker to gain access to the filesystem.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50310" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a62a92d2-5828-425d-a13f-f0daec89d9a4.json b/objects/vulnerability/vulnerability--a62a92d2-5828-425d-a13f-f0daec89d9a4.json new file mode 100644 index 00000000000..c06a0404f69 --- /dev/null +++ b/objects/vulnerability/vulnerability--a62a92d2-5828-425d-a13f-f0daec89d9a4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a0e60498-578c-4bfc-9e55-910ca96352a1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a62a92d2-5828-425d-a13f-f0daec89d9a4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.957775Z", + "modified": "2024-11-13T00:20:46.957775Z", + "name": "CVE-2024-43640", + "description": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43640" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a7b2ccab-9767-4d8e-a4e5-7f7504c84712.json b/objects/vulnerability/vulnerability--a7b2ccab-9767-4d8e-a4e5-7f7504c84712.json new file mode 100644 index 00000000000..ffb1224ab52 --- /dev/null +++ b/objects/vulnerability/vulnerability--a7b2ccab-9767-4d8e-a4e5-7f7504c84712.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--543d4d6f-3ffe-4283-8720-5824d554c3af", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a7b2ccab-9767-4d8e-a4e5-7f7504c84712", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.976524Z", + "modified": "2024-11-13T00:20:44.976524Z", + "name": "CVE-2024-25254", + "description": "SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-25254" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a7d37e21-73f7-4898-8c8d-00b8aab25947.json b/objects/vulnerability/vulnerability--a7d37e21-73f7-4898-8c8d-00b8aab25947.json new file mode 100644 index 00000000000..e93970c773a --- /dev/null +++ b/objects/vulnerability/vulnerability--a7d37e21-73f7-4898-8c8d-00b8aab25947.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--60c7952e-7afe-4615-a1bd-620b55183bf7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a7d37e21-73f7-4898-8c8d-00b8aab25947", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.686077Z", + "modified": "2024-11-13T00:20:44.686077Z", + "name": "CVE-2024-47454", + "description": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47454" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a7dc3f6d-fe26-4fad-82fc-da38ae0d3d94.json b/objects/vulnerability/vulnerability--a7dc3f6d-fe26-4fad-82fc-da38ae0d3d94.json new file mode 100644 index 00000000000..ae51ee81179 --- /dev/null +++ b/objects/vulnerability/vulnerability--a7dc3f6d-fe26-4fad-82fc-da38ae0d3d94.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--de609b12-60ed-447f-8316-0ed48086f65d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a7dc3f6d-fe26-4fad-82fc-da38ae0d3d94", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.74267Z", + "modified": "2024-11-13T00:20:44.74267Z", + "name": "CVE-2024-47799", + "description": "Exposure of sensitive system information to an unauthorized control sphere issue exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may obtain information of the other devices connected through the Wi-Fi.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47799" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a9781eaf-72c9-4301-90db-8ba8c79d7068.json b/objects/vulnerability/vulnerability--a9781eaf-72c9-4301-90db-8ba8c79d7068.json new file mode 100644 index 00000000000..8f85a73c8c4 --- /dev/null +++ b/objects/vulnerability/vulnerability--a9781eaf-72c9-4301-90db-8ba8c79d7068.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e3afcbaf-025d-483a-bd92-7868a7c11bbf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a9781eaf-72c9-4301-90db-8ba8c79d7068", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.037841Z", + "modified": "2024-11-13T00:20:46.037841Z", + "name": "CVE-2024-49002", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49002" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a9e468e8-111c-41f5-9831-caa27044f357.json b/objects/vulnerability/vulnerability--a9e468e8-111c-41f5-9831-caa27044f357.json new file mode 100644 index 00000000000..8ccd3702d47 --- /dev/null +++ b/objects/vulnerability/vulnerability--a9e468e8-111c-41f5-9831-caa27044f357.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fce2e027-a338-41c7-89d7-af143b69c743", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a9e468e8-111c-41f5-9831-caa27044f357", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.076937Z", + "modified": "2024-11-13T00:20:46.076937Z", + "name": "CVE-2024-49507", + "description": "InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49507" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ab0b4d08-6b2d-43e1-8daa-9b4986b001ff.json b/objects/vulnerability/vulnerability--ab0b4d08-6b2d-43e1-8daa-9b4986b001ff.json new file mode 100644 index 00000000000..75f3ecd5bbf --- /dev/null +++ b/objects/vulnerability/vulnerability--ab0b4d08-6b2d-43e1-8daa-9b4986b001ff.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--71e11ab8-a640-46e9-93e0-9ccfb6a0bcb2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ab0b4d08-6b2d-43e1-8daa-9b4986b001ff", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.158608Z", + "modified": "2024-11-13T00:20:44.158608Z", + "name": "CVE-2024-51213", + "description": "Cross Site Scripting vulnerability in Online Shop Store v.1.0 allows a remote attacker to execute arbitrary code via the login.php component.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51213" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ab45a4ca-3692-45e5-8952-abdfdba95ca3.json b/objects/vulnerability/vulnerability--ab45a4ca-3692-45e5-8952-abdfdba95ca3.json new file mode 100644 index 00000000000..0163d81fcdd --- /dev/null +++ b/objects/vulnerability/vulnerability--ab45a4ca-3692-45e5-8952-abdfdba95ca3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4519acba-866a-41e6-8730-f71f0a539ab1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ab45a4ca-3692-45e5-8952-abdfdba95ca3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.594414Z", + "modified": "2024-11-13T00:20:46.594414Z", + "name": "CVE-2024-28731", + "description": "Cross Site Request Forgery vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via the Port forwarding option.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28731" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--abca7fdb-37b8-4043-b05d-ed9066ea5a33.json b/objects/vulnerability/vulnerability--abca7fdb-37b8-4043-b05d-ed9066ea5a33.json new file mode 100644 index 00000000000..edcc35051f2 --- /dev/null +++ b/objects/vulnerability/vulnerability--abca7fdb-37b8-4043-b05d-ed9066ea5a33.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6bf1fd61-c7ab-4d17-bf4a-282874b7afe9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--abca7fdb-37b8-4043-b05d-ed9066ea5a33", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.890622Z", + "modified": "2024-11-13T00:20:46.890622Z", + "name": "CVE-2024-43627", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43627" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ac2eee53-b914-41f9-aeb6-b774445bd83e.json b/objects/vulnerability/vulnerability--ac2eee53-b914-41f9-aeb6-b774445bd83e.json new file mode 100644 index 00000000000..ce097041fde --- /dev/null +++ b/objects/vulnerability/vulnerability--ac2eee53-b914-41f9-aeb6-b774445bd83e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--35c030b7-e502-4cfb-86de-a304ff2db600", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ac2eee53-b914-41f9-aeb6-b774445bd83e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.699692Z", + "modified": "2024-11-13T00:20:44.699692Z", + "name": "CVE-2024-47449", + "description": "Audition versions 23.6.9, 24.4.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47449" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--aca46458-9fc1-44de-a60c-634acb277029.json b/objects/vulnerability/vulnerability--aca46458-9fc1-44de-a60c-634acb277029.json new file mode 100644 index 00000000000..0caaadc4a87 --- /dev/null +++ b/objects/vulnerability/vulnerability--aca46458-9fc1-44de-a60c-634acb277029.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0c05c19e-e1cf-4a75-9a1a-848b17768fdc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--aca46458-9fc1-44de-a60c-634acb277029", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.892515Z", + "modified": "2024-11-13T00:20:45.892515Z", + "name": "CVE-2024-49016", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49016" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ae4fc22c-9b49-4ed2-ba55-1a0700625e6f.json b/objects/vulnerability/vulnerability--ae4fc22c-9b49-4ed2-ba55-1a0700625e6f.json new file mode 100644 index 00000000000..51fd8de2b0d --- /dev/null +++ b/objects/vulnerability/vulnerability--ae4fc22c-9b49-4ed2-ba55-1a0700625e6f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9fed56cd-3f56-4bdd-9b4f-c38f67a94732", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ae4fc22c-9b49-4ed2-ba55-1a0700625e6f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:54.395701Z", + "modified": "2024-11-13T00:20:54.395701Z", + "name": "CVE-2023-47543", + "description": "An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to interact with ressources of other organizations via HTTP or HTTPS requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-47543" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ae9ae53f-d095-4af3-9037-04ab6505dfa3.json b/objects/vulnerability/vulnerability--ae9ae53f-d095-4af3-9037-04ab6505dfa3.json new file mode 100644 index 00000000000..690ff0e56a5 --- /dev/null +++ b/objects/vulnerability/vulnerability--ae9ae53f-d095-4af3-9037-04ab6505dfa3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ce06a3a7-c8e0-46a9-b453-e28d7018e3ed", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ae9ae53f-d095-4af3-9037-04ab6505dfa3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.010385Z", + "modified": "2024-11-13T00:20:46.010385Z", + "name": "CVE-2024-49003", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49003" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--afd5f4fa-a03e-49c6-b3ea-2185bde7d575.json b/objects/vulnerability/vulnerability--afd5f4fa-a03e-49c6-b3ea-2185bde7d575.json new file mode 100644 index 00000000000..c4e8e8c45ba --- /dev/null +++ b/objects/vulnerability/vulnerability--afd5f4fa-a03e-49c6-b3ea-2185bde7d575.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b929a65e-5af4-4844-9c15-ca1acf464e10", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--afd5f4fa-a03e-49c6-b3ea-2185bde7d575", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.048184Z", + "modified": "2024-11-13T00:20:45.048184Z", + "name": "CVE-2024-11096", + "description": "A vulnerability, which was classified as critical, was found in code-projects Task Manager 1.0. This affects an unknown part of the file /newProject.php. The manipulation of the argument projectName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11096" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b00b8199-c7c6-4e84-9567-f1c3131e1157.json b/objects/vulnerability/vulnerability--b00b8199-c7c6-4e84-9567-f1c3131e1157.json new file mode 100644 index 00000000000..14dd110b6c2 --- /dev/null +++ b/objects/vulnerability/vulnerability--b00b8199-c7c6-4e84-9567-f1c3131e1157.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a72d099c-0e8f-4ce1-abd5-39678425f969", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b00b8199-c7c6-4e84-9567-f1c3131e1157", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.932794Z", + "modified": "2024-11-13T00:20:45.932794Z", + "name": "CVE-2024-49030", + "description": "Microsoft Excel Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49030" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b0cc991e-e240-4023-b7b1-3e916fbb4a6d.json b/objects/vulnerability/vulnerability--b0cc991e-e240-4023-b7b1-3e916fbb4a6d.json new file mode 100644 index 00000000000..348199fa93c --- /dev/null +++ b/objects/vulnerability/vulnerability--b0cc991e-e240-4023-b7b1-3e916fbb4a6d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9c9c64c6-b507-46c8-bbc4-1ca3ae1c8ee4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b0cc991e-e240-4023-b7b1-3e916fbb4a6d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.916231Z", + "modified": "2024-11-13T00:20:46.916231Z", + "name": "CVE-2024-43498", + "description": ".NET and Visual Studio Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43498" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b1344162-71e1-4d3b-a782-570359eb51a1.json b/objects/vulnerability/vulnerability--b1344162-71e1-4d3b-a782-570359eb51a1.json new file mode 100644 index 00000000000..08c376f9d58 --- /dev/null +++ b/objects/vulnerability/vulnerability--b1344162-71e1-4d3b-a782-570359eb51a1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--83e9d0d6-a668-4caf-ba25-4d0d9b38f005", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b1344162-71e1-4d3b-a782-570359eb51a1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.879679Z", + "modified": "2024-11-13T00:20:46.879679Z", + "name": "CVE-2024-43635", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43635" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b1fda952-3945-4c67-a43f-15220f6732ab.json b/objects/vulnerability/vulnerability--b1fda952-3945-4c67-a43f-15220f6732ab.json new file mode 100644 index 00000000000..ecf6da7eb58 --- /dev/null +++ b/objects/vulnerability/vulnerability--b1fda952-3945-4c67-a43f-15220f6732ab.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d02cfd8a-63ef-4f14-a3a8-bbddeb3ef0d3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b1fda952-3945-4c67-a43f-15220f6732ab", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.910101Z", + "modified": "2024-11-13T00:20:46.910101Z", + "name": "CVE-2024-43613", + "description": "Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43613" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b2d17cf2-8a33-46f9-bf64-0b0504796cc7.json b/objects/vulnerability/vulnerability--b2d17cf2-8a33-46f9-bf64-0b0504796cc7.json new file mode 100644 index 00000000000..72282a54fdb --- /dev/null +++ b/objects/vulnerability/vulnerability--b2d17cf2-8a33-46f9-bf64-0b0504796cc7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--24a962f6-f115-4722-8d04-fc59af9f9572", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b2d17cf2-8a33-46f9-bf64-0b0504796cc7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.236419Z", + "modified": "2024-11-13T00:20:46.236419Z", + "name": "CVE-2024-36513", + "description": "A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-36513" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b3dd53ce-650c-4558-9c1b-818f564293c5.json b/objects/vulnerability/vulnerability--b3dd53ce-650c-4558-9c1b-818f564293c5.json new file mode 100644 index 00000000000..e9a63defa67 --- /dev/null +++ b/objects/vulnerability/vulnerability--b3dd53ce-650c-4558-9c1b-818f564293c5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5d8a13d6-41e8-485e-936d-bc68dd2b057d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b3dd53ce-650c-4558-9c1b-818f564293c5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.373656Z", + "modified": "2024-11-13T00:20:46.373656Z", + "name": "CVE-2024-42372", + "description": "Due to missing authorization check in SAP NetWeaver AS Java (System Landscape Directory) an unauthorized user can read and modify some restricted global SLD configurations causing low impact on confidentiality and integrity of the application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-42372" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b40b1570-6b01-496a-a613-19d98443f1a3.json b/objects/vulnerability/vulnerability--b40b1570-6b01-496a-a613-19d98443f1a3.json new file mode 100644 index 00000000000..17a0b93ed05 --- /dev/null +++ b/objects/vulnerability/vulnerability--b40b1570-6b01-496a-a613-19d98443f1a3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f2d16464-8c70-4827-b3ee-a9bcaefa0a8a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b40b1570-6b01-496a-a613-19d98443f1a3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.027485Z", + "modified": "2024-11-13T00:20:45.027485Z", + "name": "CVE-2024-11100", + "description": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11100" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b46f35d5-a759-4d31-a732-89637be6229b.json b/objects/vulnerability/vulnerability--b46f35d5-a759-4d31-a732-89637be6229b.json new file mode 100644 index 00000000000..1b329f21d5a --- /dev/null +++ b/objects/vulnerability/vulnerability--b46f35d5-a759-4d31-a732-89637be6229b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d12c3aa3-b8be-4949-b6b9-1f5a08d91486", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b46f35d5-a759-4d31-a732-89637be6229b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.50628Z", + "modified": "2024-11-13T00:20:44.50628Z", + "name": "CVE-2024-10695", + "description": "The Futurio Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.0.13 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10695" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b51b45f2-2fc6-40d1-8078-1e8c396b3510.json b/objects/vulnerability/vulnerability--b51b45f2-2fc6-40d1-8078-1e8c396b3510.json new file mode 100644 index 00000000000..5cfb35aa7ca --- /dev/null +++ b/objects/vulnerability/vulnerability--b51b45f2-2fc6-40d1-8078-1e8c396b3510.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7dfbd891-c74c-40c1-bfa7-e4ba2e141cf6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b51b45f2-2fc6-40d1-8078-1e8c396b3510", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.948421Z", + "modified": "2024-11-13T00:20:46.948421Z", + "name": "CVE-2024-43459", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43459" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b68c835a-d5aa-4885-985e-1bd558a30610.json b/objects/vulnerability/vulnerability--b68c835a-d5aa-4885-985e-1bd558a30610.json new file mode 100644 index 00000000000..6f8965afa20 --- /dev/null +++ b/objects/vulnerability/vulnerability--b68c835a-d5aa-4885-985e-1bd558a30610.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9636ac59-47d8-4aee-926c-99365ec0af81", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b68c835a-d5aa-4885-985e-1bd558a30610", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.824353Z", + "modified": "2024-11-13T00:20:44.824353Z", + "name": "CVE-2024-50386", + "description": "Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2.4 and 4.19.0.0 through 4.19.1.2, an attacker that can register templates, can use them to deploy malicious instances on KVM-based environments and exploit this to gain access to the host filesystems that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of KVM-based infrastructure managed by CloudStack.\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.5 or 4.19.1.3, or later, which addresses this issue. \n\nAdditionally, all user-registered KVM-compatible templates can be scanned and checked that they are flat files that should not be using any additional or unnecessary features. For example, operators can run the following command on their file-based primary storage(s) and inspect the output. An empty output for the disk being validated means it has no references to the host filesystems; on the other hand, if the output for the disk being validated is not empty, it might indicate a compromised disk. However, bear in mind that (i) volumes created from templates will have references for the templates at first and (ii) volumes can be consolidated while migrating, losing their references to the templates. Therefore, the command execution for the primary storages can show both false positives and false negatives.\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info. If the output is not empty, that might indicate a compromised disk; check it carefully.\"; qemu-img info -U $file | grep file: ; printf \"\\n\\n\"; done\nFor checking the whole template/volume features of each disk, operators can run the following command:\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info.\"; qemu-img info -U $file; printf \"\\n\\n\"; done", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50386" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b7962680-89f7-405f-8324-26d9f71c918e.json b/objects/vulnerability/vulnerability--b7962680-89f7-405f-8324-26d9f71c918e.json new file mode 100644 index 00000000000..42d75ad6c0f --- /dev/null +++ b/objects/vulnerability/vulnerability--b7962680-89f7-405f-8324-26d9f71c918e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--87e98406-efe5-4834-a475-124ff2803d62", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b7962680-89f7-405f-8324-26d9f71c918e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.65535Z", + "modified": "2024-11-13T00:20:45.65535Z", + "name": "CVE-2024-21939", + "description": "Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21939" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b925914e-e6f5-46a9-aa46-1cd7dbfd4518.json b/objects/vulnerability/vulnerability--b925914e-e6f5-46a9-aa46-1cd7dbfd4518.json new file mode 100644 index 00000000000..0008a968f89 --- /dev/null +++ b/objects/vulnerability/vulnerability--b925914e-e6f5-46a9-aa46-1cd7dbfd4518.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e741b8e4-2318-4614-a44e-25946ba62c5f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b925914e-e6f5-46a9-aa46-1cd7dbfd4518", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.705289Z", + "modified": "2024-11-13T00:20:44.705289Z", + "name": "CVE-2024-47435", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47435" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ba908d66-cc37-4b63-9535-6ab10ea9e9bf.json b/objects/vulnerability/vulnerability--ba908d66-cc37-4b63-9535-6ab10ea9e9bf.json new file mode 100644 index 00000000000..7c669c7be56 --- /dev/null +++ b/objects/vulnerability/vulnerability--ba908d66-cc37-4b63-9535-6ab10ea9e9bf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2e1537fb-e2cd-4b06-bd09-b0a01d418706", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ba908d66-cc37-4b63-9535-6ab10ea9e9bf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.667542Z", + "modified": "2024-11-13T00:20:45.667542Z", + "name": "CVE-2024-21974", + "description": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21974" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bab5919e-c707-4183-bbd5-ef0f40bea99b.json b/objects/vulnerability/vulnerability--bab5919e-c707-4183-bbd5-ef0f40bea99b.json new file mode 100644 index 00000000000..6da5b4cdcb1 --- /dev/null +++ b/objects/vulnerability/vulnerability--bab5919e-c707-4183-bbd5-ef0f40bea99b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a06d3c90-bc4f-48ab-a9a5-8c2e2ab07202", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bab5919e-c707-4183-bbd5-ef0f40bea99b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.876181Z", + "modified": "2024-11-13T00:20:46.876181Z", + "name": "CVE-2024-43634", + "description": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43634" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bab8acd7-f159-480d-a49a-48d7d7ba9a67.json b/objects/vulnerability/vulnerability--bab8acd7-f159-480d-a49a-48d7d7ba9a67.json new file mode 100644 index 00000000000..50b05cb4ac7 --- /dev/null +++ b/objects/vulnerability/vulnerability--bab8acd7-f159-480d-a49a-48d7d7ba9a67.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8eec4c46-f34c-4ba8-a2ef-030723ad8686", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bab8acd7-f159-480d-a49a-48d7d7ba9a67", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:54.432852Z", + "modified": "2024-11-13T00:20:54.432852Z", + "name": "CVE-2023-50176", + "description": "A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.13 allows attacker to execute unauthorized code or commands via phishing SAML authentication link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-50176" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bb646117-2d16-4e80-ba98-b024285f737a.json b/objects/vulnerability/vulnerability--bb646117-2d16-4e80-ba98-b024285f737a.json new file mode 100644 index 00000000000..bfe4abc18b1 --- /dev/null +++ b/objects/vulnerability/vulnerability--bb646117-2d16-4e80-ba98-b024285f737a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0cbc4604-ac2a-402e-a55e-f2661809e406", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bb646117-2d16-4e80-ba98-b024285f737a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.072174Z", + "modified": "2024-11-13T00:20:46.072174Z", + "name": "CVE-2024-49526", + "description": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49526" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bbea4377-7519-4a0b-8229-5cbb73d9c3b8.json b/objects/vulnerability/vulnerability--bbea4377-7519-4a0b-8229-5cbb73d9c3b8.json new file mode 100644 index 00000000000..6fb8822940c --- /dev/null +++ b/objects/vulnerability/vulnerability--bbea4377-7519-4a0b-8229-5cbb73d9c3b8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7099ec6a-ddc8-43f4-bdff-404658c241ff", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bbea4377-7519-4a0b-8229-5cbb73d9c3b8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.05212Z", + "modified": "2024-11-13T00:20:45.05212Z", + "name": "CVE-2024-11116", + "description": "Inappropriate implementation in Blink in Google Chrome prior to 131.0.6778.69 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11116" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bcd7f009-972c-48b5-b11c-0671a843c1b6.json b/objects/vulnerability/vulnerability--bcd7f009-972c-48b5-b11c-0671a843c1b6.json new file mode 100644 index 00000000000..5b0e9158c15 --- /dev/null +++ b/objects/vulnerability/vulnerability--bcd7f009-972c-48b5-b11c-0671a843c1b6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0f1ad8f3-b82c-43aa-9be2-7c09a9ada4ef", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bcd7f009-972c-48b5-b11c-0671a843c1b6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.053326Z", + "modified": "2024-11-13T00:20:46.053326Z", + "name": "CVE-2024-49515", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49515" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bcd8c1b9-7724-45f5-b7d4-ecd375427ccd.json b/objects/vulnerability/vulnerability--bcd8c1b9-7724-45f5-b7d4-ecd375427ccd.json new file mode 100644 index 00000000000..5289cd1f5f1 --- /dev/null +++ b/objects/vulnerability/vulnerability--bcd8c1b9-7724-45f5-b7d4-ecd375427ccd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ae9f0a7e-4c31-45f1-9baa-1e07c668f660", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bcd8c1b9-7724-45f5-b7d4-ecd375427ccd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.706576Z", + "modified": "2024-11-13T00:20:44.706576Z", + "name": "CVE-2024-47451", + "description": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47451" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bd820712-3638-4597-9c33-196053fec9db.json b/objects/vulnerability/vulnerability--bd820712-3638-4597-9c33-196053fec9db.json new file mode 100644 index 00000000000..b5c18b8544d --- /dev/null +++ b/objects/vulnerability/vulnerability--bd820712-3638-4597-9c33-196053fec9db.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--185da9bf-bf7b-47d0-b931-aee00b517bcf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bd820712-3638-4597-9c33-196053fec9db", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.012832Z", + "modified": "2024-11-13T00:20:46.012832Z", + "name": "CVE-2024-49517", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49517" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bd960bdc-0e61-407a-9b23-8248175e3600.json b/objects/vulnerability/vulnerability--bd960bdc-0e61-407a-9b23-8248175e3600.json new file mode 100644 index 00000000000..60bb2d59033 --- /dev/null +++ b/objects/vulnerability/vulnerability--bd960bdc-0e61-407a-9b23-8248175e3600.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7e59cc9d-6e0e-4824-a51c-f35128e7f268", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bd960bdc-0e61-407a-9b23-8248175e3600", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.291258Z", + "modified": "2024-11-13T00:20:44.291258Z", + "name": "CVE-2024-48994", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48994" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--be0bca73-51ce-4ce6-b6c1-1575f015df09.json b/objects/vulnerability/vulnerability--be0bca73-51ce-4ce6-b6c1-1575f015df09.json new file mode 100644 index 00000000000..71dfc677834 --- /dev/null +++ b/objects/vulnerability/vulnerability--be0bca73-51ce-4ce6-b6c1-1575f015df09.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--49f1e761-7c58-4332-8af6-9c05bcc165a6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--be0bca73-51ce-4ce6-b6c1-1575f015df09", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.748054Z", + "modified": "2024-11-13T00:20:44.748054Z", + "name": "CVE-2024-47456", + "description": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47456" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--be2e234b-0d19-4e8d-9ae6-1cda580939b5.json b/objects/vulnerability/vulnerability--be2e234b-0d19-4e8d-9ae6-1cda580939b5.json new file mode 100644 index 00000000000..7bf6fcf2d34 --- /dev/null +++ b/objects/vulnerability/vulnerability--be2e234b-0d19-4e8d-9ae6-1cda580939b5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--32171e47-fce1-4a46-bb13-e234878baec8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--be2e234b-0d19-4e8d-9ae6-1cda580939b5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.242083Z", + "modified": "2024-11-13T00:20:44.242083Z", + "name": "CVE-2024-48999", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48999" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bfb918c7-02eb-454c-bd75-3ea201f5b832.json b/objects/vulnerability/vulnerability--bfb918c7-02eb-454c-bd75-3ea201f5b832.json new file mode 100644 index 00000000000..80cde2eed5b --- /dev/null +++ b/objects/vulnerability/vulnerability--bfb918c7-02eb-454c-bd75-3ea201f5b832.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ef6a86bd-5fbf-4c96-9d52-b7c12b8c4e2d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bfb918c7-02eb-454c-bd75-3ea201f5b832", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.662985Z", + "modified": "2024-11-13T00:20:44.662985Z", + "name": "CVE-2024-47455", + "description": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47455" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c471e26d-1892-4fbb-9657-ce3770ab3d71.json b/objects/vulnerability/vulnerability--c471e26d-1892-4fbb-9657-ce3770ab3d71.json new file mode 100644 index 00000000000..51fdff52103 --- /dev/null +++ b/objects/vulnerability/vulnerability--c471e26d-1892-4fbb-9657-ce3770ab3d71.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--926478b9-bd87-4afc-9e44-cdfd9a7f7583", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c471e26d-1892-4fbb-9657-ce3770ab3d71", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.348495Z", + "modified": "2024-11-13T00:20:46.348495Z", + "name": "CVE-2024-42442", + "description": "APTIOV contains a vulnerability in the BIOS where a user or attacker may cause an improper restriction of operations within the bounds of a memory buffer over the network. A successful exploitation of this vulnerability may lead to code execution outside of the intended System Management Mode.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-42442" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c4754f98-d326-4c7a-9924-94a35c260c4d.json b/objects/vulnerability/vulnerability--c4754f98-d326-4c7a-9924-94a35c260c4d.json new file mode 100644 index 00000000000..3bb73bd7bb8 --- /dev/null +++ b/objects/vulnerability/vulnerability--c4754f98-d326-4c7a-9924-94a35c260c4d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--521f59dc-3707-4e76-a2d5-1190dc5dbef0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c4754f98-d326-4c7a-9924-94a35c260c4d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.32427Z", + "modified": "2024-11-13T00:20:45.32427Z", + "name": "CVE-2024-8534", + "description": "Memory safety vulnerability leading to memory corruption and Denial of Service in NetScaler ADC and Gateway if the appliance must be configured as a Gateway (VPN Vserver) with RDP Feature enabled OR the appliance must be configured as a Gateway (VPN Vserver) and RDP Proxy Server Profile is created and set to Gateway (VPN Vserver) OR the appliance must be configured as a Auth Server (AAA Vserver) with RDP Feature enabled", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8534" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c50932fe-80e5-4441-8478-1b0be8570367.json b/objects/vulnerability/vulnerability--c50932fe-80e5-4441-8478-1b0be8570367.json new file mode 100644 index 00000000000..12218fb4bef --- /dev/null +++ b/objects/vulnerability/vulnerability--c50932fe-80e5-4441-8478-1b0be8570367.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d7945bfa-e8de-440f-b535-5a15a52b70a4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c50932fe-80e5-4441-8478-1b0be8570367", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.048614Z", + "modified": "2024-11-13T00:20:46.048614Z", + "name": "CVE-2024-49558", + "description": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49558" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c566103e-619c-4bf5-919e-633ae21b5a2c.json b/objects/vulnerability/vulnerability--c566103e-619c-4bf5-919e-633ae21b5a2c.json new file mode 100644 index 00000000000..b20339b73c8 --- /dev/null +++ b/objects/vulnerability/vulnerability--c566103e-619c-4bf5-919e-633ae21b5a2c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fb88d4b1-98f3-4843-8620-1bbee25b85c8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c566103e-619c-4bf5-919e-633ae21b5a2c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.896577Z", + "modified": "2024-11-13T00:20:45.896577Z", + "name": "CVE-2024-49009", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49009" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c5e8778e-c00c-4125-83cb-a0f2bdfa3193.json b/objects/vulnerability/vulnerability--c5e8778e-c00c-4125-83cb-a0f2bdfa3193.json new file mode 100644 index 00000000000..081cf48b333 --- /dev/null +++ b/objects/vulnerability/vulnerability--c5e8778e-c00c-4125-83cb-a0f2bdfa3193.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1e955fa0-1065-4c0f-b490-55aaf1ec96ed", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c5e8778e-c00c-4125-83cb-a0f2bdfa3193", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.512136Z", + "modified": "2024-11-13T00:20:44.512136Z", + "name": "CVE-2024-10971", + "description": "Improper access control in the Password History feature in Devolutions DVLS 2024.3.6 and earlier allows a malicious authenticated user to obtain sensitive data via faulty permission.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10971" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c5fedf50-8e23-4c87-b54c-101884f35b54.json b/objects/vulnerability/vulnerability--c5fedf50-8e23-4c87-b54c-101884f35b54.json new file mode 100644 index 00000000000..3513bd70b76 --- /dev/null +++ b/objects/vulnerability/vulnerability--c5fedf50-8e23-4c87-b54c-101884f35b54.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5e768681-85ee-4f2f-810c-89d034b76ad2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c5fedf50-8e23-4c87-b54c-101884f35b54", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.730855Z", + "modified": "2024-11-13T00:20:44.730855Z", + "name": "CVE-2024-47432", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47432" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c6240f40-dc79-4800-be89-a19bda088744.json b/objects/vulnerability/vulnerability--c6240f40-dc79-4800-be89-a19bda088744.json new file mode 100644 index 00000000000..48931c6e2d4 --- /dev/null +++ b/objects/vulnerability/vulnerability--c6240f40-dc79-4800-be89-a19bda088744.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ee9b727f-bf39-4526-a0c3-fa510e13a2e7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c6240f40-dc79-4800-be89-a19bda088744", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.013842Z", + "modified": "2024-11-13T00:20:46.013842Z", + "name": "CVE-2024-49027", + "description": "Microsoft Excel Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49027" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c6b96f49-cb1d-430d-9c24-309431714fdc.json b/objects/vulnerability/vulnerability--c6b96f49-cb1d-430d-9c24-309431714fdc.json new file mode 100644 index 00000000000..cdf6a473df2 --- /dev/null +++ b/objects/vulnerability/vulnerability--c6b96f49-cb1d-430d-9c24-309431714fdc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--96d86f13-5fcc-4828-aa7e-85af434cb87e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c6b96f49-cb1d-430d-9c24-309431714fdc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.534588Z", + "modified": "2024-11-13T00:20:45.534588Z", + "name": "CVE-2024-31496", + "description": "A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData 7.4.0 and before 7.2.7 allows a privileged attacker to execute unauthorized code or commands via crafted CLI requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-31496" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c7b7fb1c-0789-4a31-b3db-4c12ba950013.json b/objects/vulnerability/vulnerability--c7b7fb1c-0789-4a31-b3db-4c12ba950013.json new file mode 100644 index 00000000000..a92c0562285 --- /dev/null +++ b/objects/vulnerability/vulnerability--c7b7fb1c-0789-4a31-b3db-4c12ba950013.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--00c9331c-f987-4435-a94a-5e1df48e3cb9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c7b7fb1c-0789-4a31-b3db-4c12ba950013", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.399098Z", + "modified": "2024-11-13T00:20:44.399098Z", + "name": "CVE-2024-52296", + "description": "libosdp is an implementation of IEC 60839-11-5 OSDP (Open Supervised Device Protocol) and provides a C library with support for C++, Rust and Python3. At ospd_common.c, on the osdp_reply_name function, any reply id between REPLY_ACK and REPLY_XRD is valid, but names array do not declare all of the range. On a case of an undefined reply id within the range, name will be null (name = names[reply_id - REPLY_ACK];). Null name will casue a crash on next line: if (name[0] == '\\0') as null[0] is invalid. As this logic is not limited to a secure connection, attacker may trigger this vulnerability without any prior knowledge. This issue is fixed in 2.4.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52296" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c84d6f87-d092-4a61-b20e-530a2c81e1a1.json b/objects/vulnerability/vulnerability--c84d6f87-d092-4a61-b20e-530a2c81e1a1.json new file mode 100644 index 00000000000..96d5edd5f49 --- /dev/null +++ b/objects/vulnerability/vulnerability--c84d6f87-d092-4a61-b20e-530a2c81e1a1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8582b560-bf0c-4293-860b-63b7e1042810", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c84d6f87-d092-4a61-b20e-530a2c81e1a1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.919307Z", + "modified": "2024-11-13T00:20:46.919307Z", + "name": "CVE-2024-43623", + "description": "Windows NT OS Kernel Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43623" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c897949e-fee8-48f8-bb35-e463f6d51f14.json b/objects/vulnerability/vulnerability--c897949e-fee8-48f8-bb35-e463f6d51f14.json new file mode 100644 index 00000000000..2df4302c7b2 --- /dev/null +++ b/objects/vulnerability/vulnerability--c897949e-fee8-48f8-bb35-e463f6d51f14.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9c9f700b-bf85-4525-83d6-f0c851175a6d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c897949e-fee8-48f8-bb35-e463f6d51f14", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.016514Z", + "modified": "2024-11-13T00:20:46.016514Z", + "name": "CVE-2024-49000", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49000" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c8c2dbf7-6612-4ddf-ae04-5ffee0d3a550.json b/objects/vulnerability/vulnerability--c8c2dbf7-6612-4ddf-ae04-5ffee0d3a550.json new file mode 100644 index 00000000000..a18ba119dcd --- /dev/null +++ b/objects/vulnerability/vulnerability--c8c2dbf7-6612-4ddf-ae04-5ffee0d3a550.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6c42588a-2ec7-4182-add4-b920580acfe5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c8c2dbf7-6612-4ddf-ae04-5ffee0d3a550", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.668812Z", + "modified": "2024-11-13T00:20:44.668812Z", + "name": "CVE-2024-47444", + "description": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47444" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c9def297-8907-4888-bdd3-ca936a5e3c7e.json b/objects/vulnerability/vulnerability--c9def297-8907-4888-bdd3-ca936a5e3c7e.json new file mode 100644 index 00000000000..db323e48373 --- /dev/null +++ b/objects/vulnerability/vulnerability--c9def297-8907-4888-bdd3-ca936a5e3c7e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9304ef02-c051-493e-afe5-26d513674d88", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c9def297-8907-4888-bdd3-ca936a5e3c7e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.050755Z", + "modified": "2024-11-13T00:20:45.050755Z", + "name": "CVE-2024-11124", + "description": "A vulnerability has been found in TimGeyssens UIOMatic 5 and classified as critical. This vulnerability affects unknown code of the file /src/UIOMatic/wwwroot/backoffice/resources/uioMaticObject.r. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11124" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cad1bace-cabe-46f4-b57e-8c6a1c7c68ef.json b/objects/vulnerability/vulnerability--cad1bace-cabe-46f4-b57e-8c6a1c7c68ef.json new file mode 100644 index 00000000000..5f8b178fc21 --- /dev/null +++ b/objects/vulnerability/vulnerability--cad1bace-cabe-46f4-b57e-8c6a1c7c68ef.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a3222af5-fc95-4b9f-8fdc-909cda88738c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cad1bace-cabe-46f4-b57e-8c6a1c7c68ef", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.495033Z", + "modified": "2024-11-13T00:20:44.495033Z", + "name": "CVE-2024-10538", + "description": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the before_label parameter in the Image Comparison widget in all versions up to, and including, 3.12.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10538" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cb84c350-ea87-4f35-a5ab-712504351d3a.json b/objects/vulnerability/vulnerability--cb84c350-ea87-4f35-a5ab-712504351d3a.json new file mode 100644 index 00000000000..a71d9480550 --- /dev/null +++ b/objects/vulnerability/vulnerability--cb84c350-ea87-4f35-a5ab-712504351d3a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--131e44a3-7ba7-4eea-b0e4-ec7289664347", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cb84c350-ea87-4f35-a5ab-712504351d3a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.667811Z", + "modified": "2024-11-13T00:20:44.667811Z", + "name": "CVE-2024-47440", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47440" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cbb70ff9-124f-4ea4-88f8-9cea9ddacbce.json b/objects/vulnerability/vulnerability--cbb70ff9-124f-4ea4-88f8-9cea9ddacbce.json new file mode 100644 index 00000000000..572b01e4b11 --- /dev/null +++ b/objects/vulnerability/vulnerability--cbb70ff9-124f-4ea4-88f8-9cea9ddacbce.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2cef8dfc-0941-47c2-b725-1f8d9b3fa47f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cbb70ff9-124f-4ea4-88f8-9cea9ddacbce", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.912311Z", + "modified": "2024-11-13T00:20:46.912311Z", + "name": "CVE-2024-43631", + "description": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43631" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ce30ac9a-df41-447b-9b45-8ebedb6b0b0d.json b/objects/vulnerability/vulnerability--ce30ac9a-df41-447b-9b45-8ebedb6b0b0d.json new file mode 100644 index 00000000000..7a7ec9032ef --- /dev/null +++ b/objects/vulnerability/vulnerability--ce30ac9a-df41-447b-9b45-8ebedb6b0b0d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fafcf2b7-109e-4c53-bf8b-460f6a7bfa6e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ce30ac9a-df41-447b-9b45-8ebedb6b0b0d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.665044Z", + "modified": "2024-11-13T00:20:44.665044Z", + "name": "CVE-2024-47587", + "description": "Cash Operations does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges causing low impact to confidentiality to the application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47587" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ceae359c-cc22-442f-a542-5e126f1b204e.json b/objects/vulnerability/vulnerability--ceae359c-cc22-442f-a542-5e126f1b204e.json new file mode 100644 index 00000000000..658d90b5a4b --- /dev/null +++ b/objects/vulnerability/vulnerability--ceae359c-cc22-442f-a542-5e126f1b204e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--65a249dd-c7b7-4965-a4c2-c57530292a49", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ceae359c-cc22-442f-a542-5e126f1b204e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.06519Z", + "modified": "2024-11-13T00:20:46.06519Z", + "name": "CVE-2024-49026", + "description": "Microsoft Excel Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49026" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cf13d698-f37a-4663-841b-8b3eea074f9a.json b/objects/vulnerability/vulnerability--cf13d698-f37a-4663-841b-8b3eea074f9a.json new file mode 100644 index 00000000000..4dc089cc830 --- /dev/null +++ b/objects/vulnerability/vulnerability--cf13d698-f37a-4663-841b-8b3eea074f9a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fd169adb-d2b3-4a78-addc-92fece4c36df", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cf13d698-f37a-4663-841b-8b3eea074f9a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.482056Z", + "modified": "2024-11-13T00:20:44.482056Z", + "name": "CVE-2024-10685", + "description": "The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10685" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d0e692b0-f1aa-4cb6-8717-d3b0b65e6a58.json b/objects/vulnerability/vulnerability--d0e692b0-f1aa-4cb6-8717-d3b0b65e6a58.json new file mode 100644 index 00000000000..165fdfa669c --- /dev/null +++ b/objects/vulnerability/vulnerability--d0e692b0-f1aa-4cb6-8717-d3b0b65e6a58.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ab94f4d0-e4ba-4fa9-8e44-710d7e2d9f1d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d0e692b0-f1aa-4cb6-8717-d3b0b65e6a58", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.054816Z", + "modified": "2024-11-13T00:20:46.054816Z", + "name": "CVE-2024-49557", + "description": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49557" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d1145c42-7c2a-4f5d-889e-10de0bd236c9.json b/objects/vulnerability/vulnerability--d1145c42-7c2a-4f5d-889e-10de0bd236c9.json new file mode 100644 index 00000000000..ed587d7fe37 --- /dev/null +++ b/objects/vulnerability/vulnerability--d1145c42-7c2a-4f5d-889e-10de0bd236c9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4a5c9282-802a-414f-ba8b-22044f57ccf0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d1145c42-7c2a-4f5d-889e-10de0bd236c9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.271515Z", + "modified": "2024-11-13T00:20:45.271515Z", + "name": "CVE-2024-33658", + "description": "APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Restriction of Operations within the Bounds of a Memory Buffer by local. Successful exploitation of this vulnerability may lead to privilege escalation and potentially arbitrary code execution, and impact Integrity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-33658" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d13f5a46-62aa-4066-9da5-788a7c572e4b.json b/objects/vulnerability/vulnerability--d13f5a46-62aa-4066-9da5-788a7c572e4b.json new file mode 100644 index 00000000000..0d77605431f --- /dev/null +++ b/objects/vulnerability/vulnerability--d13f5a46-62aa-4066-9da5-788a7c572e4b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--62be7428-e784-4b1f-9264-3d644ad34e40", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d13f5a46-62aa-4066-9da5-788a7c572e4b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.260587Z", + "modified": "2024-11-13T00:20:45.260587Z", + "name": "CVE-2024-33660", + "description": "An exploit is possible where an actor with physical access can manipulate SPI flash without being detected.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-33660" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d4aef99d-da8d-47f4-b2e2-bac57bcec7ff.json b/objects/vulnerability/vulnerability--d4aef99d-da8d-47f4-b2e2-bac57bcec7ff.json new file mode 100644 index 00000000000..d4fa5344702 --- /dev/null +++ b/objects/vulnerability/vulnerability--d4aef99d-da8d-47f4-b2e2-bac57bcec7ff.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--efe7dad9-a702-4be9-a5ca-6418bc1538b7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d4aef99d-da8d-47f4-b2e2-bac57bcec7ff", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.025217Z", + "modified": "2024-11-13T00:20:45.025217Z", + "name": "CVE-2024-11111", + "description": "Inappropriate implementation in Autofill in Google Chrome prior to 131.0.6778.69 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11111" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d4b60e6c-6a33-4762-bc49-0b567bd87b76.json b/objects/vulnerability/vulnerability--d4b60e6c-6a33-4762-bc49-0b567bd87b76.json new file mode 100644 index 00000000000..c3ff9af1051 --- /dev/null +++ b/objects/vulnerability/vulnerability--d4b60e6c-6a33-4762-bc49-0b567bd87b76.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7d5bad37-2757-4441-b04d-f58ac058cd25", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d4b60e6c-6a33-4762-bc49-0b567bd87b76", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.764116Z", + "modified": "2024-11-13T00:20:44.764116Z", + "name": "CVE-2024-50323", + "description": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a local unauthenticated attacker to achieve code execution. User interaction is required.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50323" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d5ddaad8-e133-4c11-96fc-30c55a2a0191.json b/objects/vulnerability/vulnerability--d5ddaad8-e133-4c11-96fc-30c55a2a0191.json new file mode 100644 index 00000000000..7728e309fe4 --- /dev/null +++ b/objects/vulnerability/vulnerability--d5ddaad8-e133-4c11-96fc-30c55a2a0191.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1ff02369-a63b-4030-a978-a24ac5ca0d5c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d5ddaad8-e133-4c11-96fc-30c55a2a0191", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.233837Z", + "modified": "2024-11-13T00:20:46.233837Z", + "name": "CVE-2024-36140", + "description": "A vulnerability has been identified in OZW672 (All versions < V5.2), OZW772 (All versions < V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-36140" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d6cad59b-61d0-4d87-ab5c-1d2a99232340.json b/objects/vulnerability/vulnerability--d6cad59b-61d0-4d87-ab5c-1d2a99232340.json new file mode 100644 index 00000000000..63247821293 --- /dev/null +++ b/objects/vulnerability/vulnerability--d6cad59b-61d0-4d87-ab5c-1d2a99232340.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--75af31c7-8bc9-4611-ac22-f2fb1b311f9b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d6cad59b-61d0-4d87-ab5c-1d2a99232340", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.935049Z", + "modified": "2024-11-13T00:20:46.935049Z", + "name": "CVE-2024-43641", + "description": "Windows Registry Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43641" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d73a97a5-9f3f-4c7d-a197-3177ade05a41.json b/objects/vulnerability/vulnerability--d73a97a5-9f3f-4c7d-a197-3177ade05a41.json new file mode 100644 index 00000000000..343c62e14ae --- /dev/null +++ b/objects/vulnerability/vulnerability--d73a97a5-9f3f-4c7d-a197-3177ade05a41.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--81baba68-53bf-48a4-8d91-4942be920c2c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d73a97a5-9f3f-4c7d-a197-3177ade05a41", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.736475Z", + "modified": "2024-11-13T00:20:44.736475Z", + "name": "CVE-2024-47437", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47437" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d80340d7-0dbf-4f72-a991-e11859c10007.json b/objects/vulnerability/vulnerability--d80340d7-0dbf-4f72-a991-e11859c10007.json new file mode 100644 index 00000000000..b63bb165f6d --- /dev/null +++ b/objects/vulnerability/vulnerability--d80340d7-0dbf-4f72-a991-e11859c10007.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--25bbfce6-26b0-4c08-afb0-657312a0ac9c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d80340d7-0dbf-4f72-a991-e11859c10007", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.287507Z", + "modified": "2024-11-13T00:20:45.287507Z", + "name": "CVE-2024-8069", + "description": "Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8069" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d8968b18-2ca4-4342-82cb-57ca275c6d4c.json b/objects/vulnerability/vulnerability--d8968b18-2ca4-4342-82cb-57ca275c6d4c.json new file mode 100644 index 00000000000..544b1ef9f6c --- /dev/null +++ b/objects/vulnerability/vulnerability--d8968b18-2ca4-4342-82cb-57ca275c6d4c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7658fd90-444e-48df-aafd-930a967a2aad", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d8968b18-2ca4-4342-82cb-57ca275c6d4c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.030661Z", + "modified": "2024-11-13T00:20:45.030661Z", + "name": "CVE-2024-11113", + "description": "Use after free in Accessibility in Google Chrome prior to 131.0.6778.69 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11113" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d8b825f0-bd90-484f-b6aa-52f5075d0cc3.json b/objects/vulnerability/vulnerability--d8b825f0-bd90-484f-b6aa-52f5075d0cc3.json new file mode 100644 index 00000000000..d311c6a422d --- /dev/null +++ b/objects/vulnerability/vulnerability--d8b825f0-bd90-484f-b6aa-52f5075d0cc3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--878383a8-c261-421a-b661-c61f2517da3d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d8b825f0-bd90-484f-b6aa-52f5075d0cc3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.704039Z", + "modified": "2024-11-13T00:20:44.704039Z", + "name": "CVE-2024-47940", + "description": "A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 9). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PSM files. This could allow an attacker to execute code in the context of the current process.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47940" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d9293001-ab4b-4ebf-b8fb-39960bbe3a8d.json b/objects/vulnerability/vulnerability--d9293001-ab4b-4ebf-b8fb-39960bbe3a8d.json new file mode 100644 index 00000000000..5e00f0e8a3f --- /dev/null +++ b/objects/vulnerability/vulnerability--d9293001-ab4b-4ebf-b8fb-39960bbe3a8d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9da91694-b11f-46bb-8925-08a787e61279", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d9293001-ab4b-4ebf-b8fb-39960bbe3a8d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.018129Z", + "modified": "2024-11-13T00:20:46.018129Z", + "name": "CVE-2024-49518", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49518" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d92d95f9-2c04-41c5-8c61-f98c5122b701.json b/objects/vulnerability/vulnerability--d92d95f9-2c04-41c5-8c61-f98c5122b701.json new file mode 100644 index 00000000000..61d65e5035f --- /dev/null +++ b/objects/vulnerability/vulnerability--d92d95f9-2c04-41c5-8c61-f98c5122b701.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--975fc87b-5216-4c60-b61a-5adfff100d31", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d92d95f9-2c04-41c5-8c61-f98c5122b701", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.439197Z", + "modified": "2024-11-13T00:20:44.439197Z", + "name": "CVE-2024-45289", + "description": "The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname. The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.\n\nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45289" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--da2b45f2-8fa8-44fc-bf71-9d61dff90b2d.json b/objects/vulnerability/vulnerability--da2b45f2-8fa8-44fc-bf71-9d61dff90b2d.json new file mode 100644 index 00000000000..08c604c6604 --- /dev/null +++ b/objects/vulnerability/vulnerability--da2b45f2-8fa8-44fc-bf71-9d61dff90b2d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--192905ea-b422-49c8-9cee-457f9e6fc15d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--da2b45f2-8fa8-44fc-bf71-9d61dff90b2d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.160726Z", + "modified": "2024-11-13T00:20:44.160726Z", + "name": "CVE-2024-51564", + "description": "A guest can trigger an infinite loop in the hda audio driver.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51564" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--da8182cb-6ca3-47c7-956a-2f2466a94b8a.json b/objects/vulnerability/vulnerability--da8182cb-6ca3-47c7-956a-2f2466a94b8a.json new file mode 100644 index 00000000000..cc93f92cfad --- /dev/null +++ b/objects/vulnerability/vulnerability--da8182cb-6ca3-47c7-956a-2f2466a94b8a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e74842cc-81e5-4718-84d6-713f94469c1d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--da8182cb-6ca3-47c7-956a-2f2466a94b8a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.163157Z", + "modified": "2024-11-13T00:20:44.163157Z", + "name": "CVE-2024-51563", + "description": "The virtio_vq_recordon function is subject to a time-of-check to time-of-use (TOCTOU) race condition.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51563" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dbcb7bdc-4394-4903-a4a6-ab41e7a76cb3.json b/objects/vulnerability/vulnerability--dbcb7bdc-4394-4903-a4a6-ab41e7a76cb3.json new file mode 100644 index 00000000000..b298ad38d87 --- /dev/null +++ b/objects/vulnerability/vulnerability--dbcb7bdc-4394-4903-a4a6-ab41e7a76cb3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--315a7735-7014-4dae-95e0-576cf37644d8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dbcb7bdc-4394-4903-a4a6-ab41e7a76cb3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.06774Z", + "modified": "2024-11-13T00:20:46.06774Z", + "name": "CVE-2024-49043", + "description": "Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49043" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dc01ba92-b64a-4d48-bd09-e42c0549a251.json b/objects/vulnerability/vulnerability--dc01ba92-b64a-4d48-bd09-e42c0549a251.json new file mode 100644 index 00000000000..a54296a92f6 --- /dev/null +++ b/objects/vulnerability/vulnerability--dc01ba92-b64a-4d48-bd09-e42c0549a251.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0df5ac4a-5991-410d-85c9-869980c1e3b4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dc01ba92-b64a-4d48-bd09-e42c0549a251", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.733499Z", + "modified": "2024-11-13T00:20:44.733499Z", + "name": "CVE-2024-47428", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47428" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dc212d2e-b914-4be6-a858-4e6197f0c3d5.json b/objects/vulnerability/vulnerability--dc212d2e-b914-4be6-a858-4e6197f0c3d5.json new file mode 100644 index 00000000000..4bdd1c67f3b --- /dev/null +++ b/objects/vulnerability/vulnerability--dc212d2e-b914-4be6-a858-4e6197f0c3d5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8e464cf0-373c-4c74-8d37-fb0282ec137a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dc212d2e-b914-4be6-a858-4e6197f0c3d5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.022655Z", + "modified": "2024-11-13T00:20:45.022655Z", + "name": "CVE-2024-11114", + "description": "Inappropriate implementation in Views in Google Chrome on Windows prior to 131.0.6778.69 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11114" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dc324211-511c-4b32-a9f6-d4a997fb2b7e.json b/objects/vulnerability/vulnerability--dc324211-511c-4b32-a9f6-d4a997fb2b7e.json new file mode 100644 index 00000000000..2e0657decb5 --- /dev/null +++ b/objects/vulnerability/vulnerability--dc324211-511c-4b32-a9f6-d4a997fb2b7e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1f4e459f-6bc0-4a2c-b64b-998a8e90563a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dc324211-511c-4b32-a9f6-d4a997fb2b7e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.038482Z", + "modified": "2024-11-13T00:20:45.038482Z", + "name": "CVE-2024-11112", + "description": "Use after free in Media in Google Chrome on Windows prior to 131.0.6778.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11112" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dc408d81-cff8-4fe1-9cb1-447048555a72.json b/objects/vulnerability/vulnerability--dc408d81-cff8-4fe1-9cb1-447048555a72.json new file mode 100644 index 00000000000..b2a583c169b --- /dev/null +++ b/objects/vulnerability/vulnerability--dc408d81-cff8-4fe1-9cb1-447048555a72.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a1cbc4c5-0c88-47c4-9218-4a23c6c445ba", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dc408d81-cff8-4fe1-9cb1-447048555a72", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.261725Z", + "modified": "2024-11-13T00:20:44.261725Z", + "name": "CVE-2024-48997", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48997" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dd3c34cc-ae1e-4f89-949d-0f4c69d2017f.json b/objects/vulnerability/vulnerability--dd3c34cc-ae1e-4f89-949d-0f4c69d2017f.json new file mode 100644 index 00000000000..75f24be72f2 --- /dev/null +++ b/objects/vulnerability/vulnerability--dd3c34cc-ae1e-4f89-949d-0f4c69d2017f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8aeabe48-c40c-489a-8fe3-c953e7a5cf37", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dd3c34cc-ae1e-4f89-949d-0f4c69d2017f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.863951Z", + "modified": "2024-11-13T00:20:44.863951Z", + "name": "CVE-2024-26011", + "description": "A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.0 through 7.0.3, FortiPortal version 6.0.0 through 6.0.14, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted packets.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-26011" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ddd52939-e79b-450e-a85b-ed0694b4c702.json b/objects/vulnerability/vulnerability--ddd52939-e79b-450e-a85b-ed0694b4c702.json new file mode 100644 index 00000000000..497f8b06ac9 --- /dev/null +++ b/objects/vulnerability/vulnerability--ddd52939-e79b-450e-a85b-ed0694b4c702.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bffbb336-fb77-4774-a2c5-0fa70046cd34", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ddd52939-e79b-450e-a85b-ed0694b4c702", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.866822Z", + "modified": "2024-11-13T00:20:46.866822Z", + "name": "CVE-2024-43621", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43621" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e07200a3-ad5e-4554-99f9-b6a5f26c213d.json b/objects/vulnerability/vulnerability--e07200a3-ad5e-4554-99f9-b6a5f26c213d.json new file mode 100644 index 00000000000..aa6cfc2f27a --- /dev/null +++ b/objects/vulnerability/vulnerability--e07200a3-ad5e-4554-99f9-b6a5f26c213d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--211109f2-543b-4233-84f9-4cbcfbb852b0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e07200a3-ad5e-4554-99f9-b6a5f26c213d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.66534Z", + "modified": "2024-11-13T00:20:45.66534Z", + "name": "CVE-2024-21946", + "description": "Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21946" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e08d03dd-7866-41a2-af78-d75ba05af7c0.json b/objects/vulnerability/vulnerability--e08d03dd-7866-41a2-af78-d75ba05af7c0.json new file mode 100644 index 00000000000..bdbbf31599f --- /dev/null +++ b/objects/vulnerability/vulnerability--e08d03dd-7866-41a2-af78-d75ba05af7c0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4aa598a0-8374-4b3d-94e8-676c38e63ad8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e08d03dd-7866-41a2-af78-d75ba05af7c0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.285142Z", + "modified": "2024-11-13T00:20:45.285142Z", + "name": "CVE-2024-8068", + "description": "Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8068" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e090ca1a-bddd-47ee-ad23-7798fb7614af.json b/objects/vulnerability/vulnerability--e090ca1a-bddd-47ee-ad23-7798fb7614af.json new file mode 100644 index 00000000000..7320a625ec7 --- /dev/null +++ b/objects/vulnerability/vulnerability--e090ca1a-bddd-47ee-ad23-7798fb7614af.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fb4f116c-5a1c-4a59-bb54-de0f5ce038d4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e090ca1a-bddd-47ee-ad23-7798fb7614af", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.053336Z", + "modified": "2024-11-13T00:20:45.053336Z", + "name": "CVE-2024-11117", + "description": "Inappropriate implementation in FileSystem in Google Chrome prior to 131.0.6778.69 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Low)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11117" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e27a0369-262f-48c8-ab70-96b741a56be1.json b/objects/vulnerability/vulnerability--e27a0369-262f-48c8-ab70-96b741a56be1.json new file mode 100644 index 00000000000..150ccbabcb7 --- /dev/null +++ b/objects/vulnerability/vulnerability--e27a0369-262f-48c8-ab70-96b741a56be1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f65b9b94-fe30-4596-b1c7-1ae26508f65c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e27a0369-262f-48c8-ab70-96b741a56be1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.740396Z", + "modified": "2024-11-13T00:20:44.740396Z", + "name": "CVE-2024-47535", + "description": "Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47535" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e3270cf9-6ab9-4ae7-97fe-68117214729e.json b/objects/vulnerability/vulnerability--e3270cf9-6ab9-4ae7-97fe-68117214729e.json new file mode 100644 index 00000000000..c1a28f42d37 --- /dev/null +++ b/objects/vulnerability/vulnerability--e3270cf9-6ab9-4ae7-97fe-68117214729e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fa3d8c5c-524d-48cb-a40e-696b439549af", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e3270cf9-6ab9-4ae7-97fe-68117214729e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.922927Z", + "modified": "2024-11-13T00:20:44.922927Z", + "name": "CVE-2024-7516", + "description": "A vulnerability in Brocade Fabric OS versions before 9.2.2 could allow man-in-the-middle attackers to conduct remote Service Session Hijacking that may arise from the attacker's ability to forge an SSH key while the Brocade Fabric OS Switch is performing various remote operations initiated by a switch admin.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-7516" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e3947adc-25cb-40cd-b06a-e98b4c2ac1b4.json b/objects/vulnerability/vulnerability--e3947adc-25cb-40cd-b06a-e98b4c2ac1b4.json new file mode 100644 index 00000000000..0dd1f7a7df6 --- /dev/null +++ b/objects/vulnerability/vulnerability--e3947adc-25cb-40cd-b06a-e98b4c2ac1b4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f8740912-52b6-4090-a1b4-be167521fce3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e3947adc-25cb-40cd-b06a-e98b4c2ac1b4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.695484Z", + "modified": "2024-11-13T00:20:44.695484Z", + "name": "CVE-2024-47436", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47436" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e40d0b4e-99f6-4927-ad9e-ff57e8f11310.json b/objects/vulnerability/vulnerability--e40d0b4e-99f6-4927-ad9e-ff57e8f11310.json new file mode 100644 index 00000000000..39c2cd654b0 --- /dev/null +++ b/objects/vulnerability/vulnerability--e40d0b4e-99f6-4927-ad9e-ff57e8f11310.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--932cee9a-fb71-47ca-ba98-33293f3c22b7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e40d0b4e-99f6-4927-ad9e-ff57e8f11310", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.019334Z", + "modified": "2024-11-13T00:20:45.019334Z", + "name": "CVE-2024-11110", + "description": "Inappropriate implementation in Extensions in Google Chrome prior to 131.0.6778.69 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. (Chromium security severity: High)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11110" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e528ddf5-b6bd-4455-b7c8-316a9617cd5a.json b/objects/vulnerability/vulnerability--e528ddf5-b6bd-4455-b7c8-316a9617cd5a.json new file mode 100644 index 00000000000..17fb1e782d7 --- /dev/null +++ b/objects/vulnerability/vulnerability--e528ddf5-b6bd-4455-b7c8-316a9617cd5a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eeb886bc-463f-405b-ba6d-831b06f38874", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e528ddf5-b6bd-4455-b7c8-316a9617cd5a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.707527Z", + "modified": "2024-11-13T00:20:44.707527Z", + "name": "CVE-2024-47441", + "description": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47441" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e568d228-dc55-4c15-b96f-79101da27ab7.json b/objects/vulnerability/vulnerability--e568d228-dc55-4c15-b96f-79101da27ab7.json new file mode 100644 index 00000000000..cbc5f359cd4 --- /dev/null +++ b/objects/vulnerability/vulnerability--e568d228-dc55-4c15-b96f-79101da27ab7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--cf1b7093-06f5-48a6-95b2-05e9eb4f8589", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e568d228-dc55-4c15-b96f-79101da27ab7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.532419Z", + "modified": "2024-11-13T00:20:44.532419Z", + "name": "CVE-2024-10944", + "description": "A Remote\nCode Execution vulnerability exists in the affected product. The vulnerability requires\na high level of permissions and exists due to improper input validation resulting\nin the possibility of a malicious Updated Agent being deployed.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-10944" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e6483c26-71b5-4aba-9985-62983c3bf045.json b/objects/vulnerability/vulnerability--e6483c26-71b5-4aba-9985-62983c3bf045.json new file mode 100644 index 00000000000..959805c9db7 --- /dev/null +++ b/objects/vulnerability/vulnerability--e6483c26-71b5-4aba-9985-62983c3bf045.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--64b56207-1671-42cf-88b2-ad39ddb76fce", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e6483c26-71b5-4aba-9985-62983c3bf045", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.032079Z", + "modified": "2024-11-13T00:20:45.032079Z", + "name": "CVE-2024-11102", + "description": "A vulnerability was found in SourceCodester Hospital Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /vm/doctor/edit-doc.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11102" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e7f09a49-10ab-4950-aeab-fba306860b1d.json b/objects/vulnerability/vulnerability--e7f09a49-10ab-4950-aeab-fba306860b1d.json new file mode 100644 index 00000000000..0005b50b1c2 --- /dev/null +++ b/objects/vulnerability/vulnerability--e7f09a49-10ab-4950-aeab-fba306860b1d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c512017d-9ee8-492e-945d-4ee40b25b41b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e7f09a49-10ab-4950-aeab-fba306860b1d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.274184Z", + "modified": "2024-11-13T00:20:44.274184Z", + "name": "CVE-2024-48996", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48996" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e8ffcdf5-96c9-4524-8afe-603295c480ab.json b/objects/vulnerability/vulnerability--e8ffcdf5-96c9-4524-8afe-603295c480ab.json new file mode 100644 index 00000000000..af4129f8cea --- /dev/null +++ b/objects/vulnerability/vulnerability--e8ffcdf5-96c9-4524-8afe-603295c480ab.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--04a2a33f-4267-4f06-ac69-1bcd9478a659", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e8ffcdf5-96c9-4524-8afe-603295c480ab", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.920317Z", + "modified": "2024-11-13T00:20:45.920317Z", + "name": "CVE-2024-49044", + "description": "Visual Studio Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49044" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e9259a3d-030c-47fd-81d5-a48694bade51.json b/objects/vulnerability/vulnerability--e9259a3d-030c-47fd-81d5-a48694bade51.json new file mode 100644 index 00000000000..13e8f0c87cc --- /dev/null +++ b/objects/vulnerability/vulnerability--e9259a3d-030c-47fd-81d5-a48694bade51.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7d478e3a-2f83-4f58-a593-54f91e482665", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e9259a3d-030c-47fd-81d5-a48694bade51", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.196819Z", + "modified": "2024-11-13T00:20:44.196819Z", + "name": "CVE-2024-51720", + "description": "An insufficient entropy vulnerability in the SecuSUITE Secure Client Authentication (SCA) Server of SecuSUITE versions 5.0.420 and earlier could allow an attacker to potentially enroll an attacker-controlled device to the victim’s account and telephone number.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51720" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e9b966b7-c438-41bf-b37e-3a3fdc32f5b2.json b/objects/vulnerability/vulnerability--e9b966b7-c438-41bf-b37e-3a3fdc32f5b2.json new file mode 100644 index 00000000000..4f4cd492335 --- /dev/null +++ b/objects/vulnerability/vulnerability--e9b966b7-c438-41bf-b37e-3a3fdc32f5b2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a355732a-ffd6-4048-b27c-ca73487835fb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e9b966b7-c438-41bf-b37e-3a3fdc32f5b2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.798585Z", + "modified": "2024-11-13T00:20:44.798585Z", + "name": "CVE-2024-50557", + "description": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.2), SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) (All versions < V8.2), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.2), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.2), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.2), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.2), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.2), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.2), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.2), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.2), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.2), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.2), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.2), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.2), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.2), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.2), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.2), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.2), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.2), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.2). Affected devices do not properly validate input in configuration fields of the iperf functionality. This could allow an unauthenticated remote attacker to execute arbitrary code on the device.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50557" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ea5eccd9-044d-4265-ae81-bd26b785125c.json b/objects/vulnerability/vulnerability--ea5eccd9-044d-4265-ae81-bd26b785125c.json new file mode 100644 index 00000000000..1fb8b32e2bf --- /dev/null +++ b/objects/vulnerability/vulnerability--ea5eccd9-044d-4265-ae81-bd26b785125c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--981533c7-5e99-426b-81de-aae55fbd28ed", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ea5eccd9-044d-4265-ae81-bd26b785125c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.173438Z", + "modified": "2024-11-13T00:20:46.173438Z", + "name": "CVE-2024-2207", + "description": "Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. Sound Research has released driver updates to mitigate the potential vulnerabilities.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-2207" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ec0fed9d-f4fd-4bea-a82a-9b1e155addec.json b/objects/vulnerability/vulnerability--ec0fed9d-f4fd-4bea-a82a-9b1e155addec.json new file mode 100644 index 00000000000..202afc34031 --- /dev/null +++ b/objects/vulnerability/vulnerability--ec0fed9d-f4fd-4bea-a82a-9b1e155addec.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--afb9eecf-c8ef-47e6-9e91-5414b3066954", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec0fed9d-f4fd-4bea-a82a-9b1e155addec", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.788606Z", + "modified": "2024-11-13T00:20:44.788606Z", + "name": "CVE-2024-50321", + "description": "An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50321" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ec368531-1131-4b3d-9bb8-16a04511a557.json b/objects/vulnerability/vulnerability--ec368531-1131-4b3d-9bb8-16a04511a557.json new file mode 100644 index 00000000000..ab779d86542 --- /dev/null +++ b/objects/vulnerability/vulnerability--ec368531-1131-4b3d-9bb8-16a04511a557.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--20bce16c-b787-4d21-a7fd-50bd843187dc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec368531-1131-4b3d-9bb8-16a04511a557", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.963205Z", + "modified": "2024-11-13T00:20:46.963205Z", + "name": "CVE-2024-43636", + "description": "Win32k Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43636" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ecc38d4a-ccd0-4594-9cce-b1320db57f2f.json b/objects/vulnerability/vulnerability--ecc38d4a-ccd0-4594-9cce-b1320db57f2f.json new file mode 100644 index 00000000000..f48048c810a --- /dev/null +++ b/objects/vulnerability/vulnerability--ecc38d4a-ccd0-4594-9cce-b1320db57f2f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8cd9d9fb-4328-4309-9e86-f6ffc680d2a6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ecc38d4a-ccd0-4594-9cce-b1320db57f2f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.646483Z", + "modified": "2024-11-13T00:20:45.646483Z", + "name": "CVE-2024-21937", + "description": "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21937" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--eccb6415-a545-4335-9dea-c3fa772895d1.json b/objects/vulnerability/vulnerability--eccb6415-a545-4335-9dea-c3fa772895d1.json new file mode 100644 index 00000000000..40a54237919 --- /dev/null +++ b/objects/vulnerability/vulnerability--eccb6415-a545-4335-9dea-c3fa772895d1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d2fb92d9-a0e1-4e3d-bf8c-7f417fa7f849", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--eccb6415-a545-4335-9dea-c3fa772895d1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.080856Z", + "modified": "2024-11-13T00:20:46.080856Z", + "name": "CVE-2024-49008", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49008" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ed752481-0158-44a1-9d35-96252991e611.json b/objects/vulnerability/vulnerability--ed752481-0158-44a1-9d35-96252991e611.json new file mode 100644 index 00000000000..14e7fadaec5 --- /dev/null +++ b/objects/vulnerability/vulnerability--ed752481-0158-44a1-9d35-96252991e611.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c205414c-3153-4db1-8c86-59bcc8f1bb1b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ed752481-0158-44a1-9d35-96252991e611", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.673745Z", + "modified": "2024-11-13T00:20:45.673745Z", + "name": "CVE-2024-21957", + "description": "Incorrect default permissions in the AMD Management Console installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-21957" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--edabb666-64c9-4a8e-b63b-176a733c3387.json b/objects/vulnerability/vulnerability--edabb666-64c9-4a8e-b63b-176a733c3387.json new file mode 100644 index 00000000000..33b26afa4b6 --- /dev/null +++ b/objects/vulnerability/vulnerability--edabb666-64c9-4a8e-b63b-176a733c3387.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--889d026d-05b4-4c11-bfc6-695809d4dee4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--edabb666-64c9-4a8e-b63b-176a733c3387", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.401131Z", + "modified": "2024-11-13T00:20:44.401131Z", + "name": "CVE-2024-52301", + "description": "Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52301" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ef0c04e2-c20f-4b6d-bde9-36e59a9c6ccc.json b/objects/vulnerability/vulnerability--ef0c04e2-c20f-4b6d-bde9-36e59a9c6ccc.json new file mode 100644 index 00000000000..569237654bf --- /dev/null +++ b/objects/vulnerability/vulnerability--ef0c04e2-c20f-4b6d-bde9-36e59a9c6ccc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bdd414f7-19f2-4d95-8d62-ec55ca0b4151", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ef0c04e2-c20f-4b6d-bde9-36e59a9c6ccc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.754159Z", + "modified": "2024-11-13T00:20:44.754159Z", + "name": "CVE-2024-47593", + "description": "SAP NetWeaver Application Server ABAP allows an unauthenticated attacker with network access to read files from the server, which otherwise would be restricted.This attack is possible only if a Web Dispatcher or some sort of Proxy Server is in use and the file in question was previously opened or downloaded in an application based on SAP GUI for HTML Technology. This will not compromise the application's integrity or availability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47593" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ef6322cd-5620-41a1-a6b7-3d54e1c5bca8.json b/objects/vulnerability/vulnerability--ef6322cd-5620-41a1-a6b7-3d54e1c5bca8.json new file mode 100644 index 00000000000..8dedb0be99c --- /dev/null +++ b/objects/vulnerability/vulnerability--ef6322cd-5620-41a1-a6b7-3d54e1c5bca8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d0ef53b7-58a5-4694-8538-63bcf30041c3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ef6322cd-5620-41a1-a6b7-3d54e1c5bca8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.899218Z", + "modified": "2024-11-13T00:20:46.899218Z", + "name": "CVE-2024-43451", + "description": "NTLM Hash Disclosure Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43451" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f1c0e401-cd81-4e4d-b583-0c7a01176691.json b/objects/vulnerability/vulnerability--f1c0e401-cd81-4e4d-b583-0c7a01176691.json new file mode 100644 index 00000000000..831c417aa69 --- /dev/null +++ b/objects/vulnerability/vulnerability--f1c0e401-cd81-4e4d-b583-0c7a01176691.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3b80e115-2ac8-44bf-9fe4-e5631bac29e8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f1c0e401-cd81-4e4d-b583-0c7a01176691", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.926576Z", + "modified": "2024-11-13T00:20:46.926576Z", + "name": "CVE-2024-43602", + "description": "Azure CycleCloud Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43602" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f1e663af-47f3-4fa2-bad1-e28dfb32f693.json b/objects/vulnerability/vulnerability--f1e663af-47f3-4fa2-bad1-e28dfb32f693.json new file mode 100644 index 00000000000..ed9f6c35586 --- /dev/null +++ b/objects/vulnerability/vulnerability--f1e663af-47f3-4fa2-bad1-e28dfb32f693.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1c144c66-7af4-4710-aead-088c165af0bd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f1e663af-47f3-4fa2-bad1-e28dfb32f693", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.907886Z", + "modified": "2024-11-13T00:20:46.907886Z", + "name": "CVE-2024-43628", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43628" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f26db443-67df-4bcb-b865-f91eda81c3c0.json b/objects/vulnerability/vulnerability--f26db443-67df-4bcb-b865-f91eda81c3c0.json new file mode 100644 index 00000000000..644f2130bc4 --- /dev/null +++ b/objects/vulnerability/vulnerability--f26db443-67df-4bcb-b865-f91eda81c3c0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2b4f4116-8cdb-40d1-8987-4f0b40fe4bea", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f26db443-67df-4bcb-b865-f91eda81c3c0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.910525Z", + "modified": "2024-11-13T00:20:45.910525Z", + "name": "CVE-2024-49395", + "description": "In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49395" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f33664b4-8e82-4d66-8db0-09537b805647.json b/objects/vulnerability/vulnerability--f33664b4-8e82-4d66-8db0-09537b805647.json new file mode 100644 index 00000000000..1f67efbbac6 --- /dev/null +++ b/objects/vulnerability/vulnerability--f33664b4-8e82-4d66-8db0-09537b805647.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5528a4df-363f-4333-9803-b1a846a6679d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f33664b4-8e82-4d66-8db0-09537b805647", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.951091Z", + "modified": "2024-11-13T00:20:46.951091Z", + "name": "CVE-2024-43633", + "description": "Windows Hyper-V Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43633" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f385a1d3-7704-40ea-9c72-760d45e7bd57.json b/objects/vulnerability/vulnerability--f385a1d3-7704-40ea-9c72-760d45e7bd57.json new file mode 100644 index 00000000000..152e8da07ab --- /dev/null +++ b/objects/vulnerability/vulnerability--f385a1d3-7704-40ea-9c72-760d45e7bd57.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--50b6c99f-14ec-441b-b9d2-85cc9c1ead5d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f385a1d3-7704-40ea-9c72-760d45e7bd57", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.04696Z", + "modified": "2024-11-13T00:20:45.04696Z", + "name": "CVE-2024-11130", + "description": "A vulnerability was found in ZZCMS up to 2023. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/msg.php. The manipulation of the argument keyword leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11130" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f3a7ad26-3bb0-46ba-92ff-9beee62bf8ac.json b/objects/vulnerability/vulnerability--f3a7ad26-3bb0-46ba-92ff-9beee62bf8ac.json new file mode 100644 index 00000000000..8b664dd7453 --- /dev/null +++ b/objects/vulnerability/vulnerability--f3a7ad26-3bb0-46ba-92ff-9beee62bf8ac.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b58b780a-f703-48d1-ba27-40848e273ca8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f3a7ad26-3bb0-46ba-92ff-9beee62bf8ac", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.902313Z", + "modified": "2024-11-13T00:20:45.902313Z", + "name": "CVE-2024-49042", + "description": "Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49042" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f4847043-ba15-47a6-8e32-996cc2c8f8d0.json b/objects/vulnerability/vulnerability--f4847043-ba15-47a6-8e32-996cc2c8f8d0.json new file mode 100644 index 00000000000..f853c7b9516 --- /dev/null +++ b/objects/vulnerability/vulnerability--f4847043-ba15-47a6-8e32-996cc2c8f8d0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f40c80da-be7b-4b82-8f90-c2ac02875c3c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f4847043-ba15-47a6-8e32-996cc2c8f8d0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.814342Z", + "modified": "2024-11-13T00:20:45.814342Z", + "name": "CVE-2024-37365", + "description": "A remote code execution vulnerability exists in the affected\nproduct. The vulnerability allows users to save projects within the public\ndirectory allowing anyone with local access to modify and/or delete files. Additionally,\na malicious user could potentially leverage this vulnerability to escalate\ntheir privileges by changing the macro to execute arbitrary code.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-37365" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f4b0245c-75f4-4aa4-81e2-a17c3602f351.json b/objects/vulnerability/vulnerability--f4b0245c-75f4-4aa4-81e2-a17c3602f351.json new file mode 100644 index 00000000000..022abe0db70 --- /dev/null +++ b/objects/vulnerability/vulnerability--f4b0245c-75f4-4aa4-81e2-a17c3602f351.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1ccb120b-99ef-4061-875b-668225e017bf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f4b0245c-75f4-4aa4-81e2-a17c3602f351", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.137137Z", + "modified": "2024-11-13T00:20:45.137137Z", + "name": "CVE-2024-44102", + "description": "A vulnerability has been identified in PP TeleControl Server Basic 1000 to 5000 V3.1 (6NH9910-0AA31-0AE1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 256 to 1000 V3.1 (6NH9910-0AA31-0AD1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 32 to 64 V3.1 (6NH9910-0AA31-0AF1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 64 to 256 V3.1 (6NH9910-0AA31-0AC1) (All versions < V3.1.2.1 with redundancy configured), PP TeleControl Server Basic 8 to 32 V3.1 (6NH9910-0AA31-0AB1) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 1000 V3.1 (6NH9910-0AA31-0AD0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 256 V3.1 (6NH9910-0AA31-0AC0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 32 V3.1 (6NH9910-0AA31-0AF0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 5000 V3.1 (6NH9910-0AA31-0AE0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 64 V3.1 (6NH9910-0AA31-0AB0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic 8 V3.1 (6NH9910-0AA31-0AA0) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic Serv Upgr (6NH9910-0AA31-0GA1) (All versions < V3.1.2.1 with redundancy configured), TeleControl Server Basic Upgr V3.1 (6NH9910-0AA31-0GA0) (All versions < V3.1.2.1 with redundancy configured). The affected system allows remote users to send maliciously crafted objects. Due to insecure deserialization of user-supplied content by the affected software, an unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted serialized object. This could allow the attacker to execute arbitrary code on the device with SYSTEM privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44102" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f51253e6-2d7e-429b-a380-f05090e3b53b.json b/objects/vulnerability/vulnerability--f51253e6-2d7e-429b-a380-f05090e3b53b.json new file mode 100644 index 00000000000..bf23dfe17b6 --- /dev/null +++ b/objects/vulnerability/vulnerability--f51253e6-2d7e-429b-a380-f05090e3b53b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ab7dc88a-df6d-4cd1-a131-16f03bbbfd47", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f51253e6-2d7e-429b-a380-f05090e3b53b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.322974Z", + "modified": "2024-11-13T00:20:46.322974Z", + "name": "CVE-2024-46889", + "description": "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application uses hard-coded cryptographic key material to obfuscate configuration files. This could allow an attacker to learn that cryptographic key material through reverse engineering of the application binary and decrypt arbitrary backup files.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46889" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f58fbba1-23e9-4645-94eb-fd8355ffd2c2.json b/objects/vulnerability/vulnerability--f58fbba1-23e9-4645-94eb-fd8355ffd2c2.json new file mode 100644 index 00000000000..e3110e21f66 --- /dev/null +++ b/objects/vulnerability/vulnerability--f58fbba1-23e9-4645-94eb-fd8355ffd2c2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e2cfe1dd-2cf2-4c54-a681-8f6ec0f52ecb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f58fbba1-23e9-4645-94eb-fd8355ffd2c2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.054346Z", + "modified": "2024-11-13T00:20:45.054346Z", + "name": "CVE-2024-11115", + "description": "Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 131.0.6778.69 allowed a remote attacker to perform privilege escalation via a series of UI gestures. (Chromium security severity: Medium)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11115" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f688ce26-c5ad-4d59-b54c-849079f73c8f.json b/objects/vulnerability/vulnerability--f688ce26-c5ad-4d59-b54c-849079f73c8f.json new file mode 100644 index 00000000000..2bbaf5cfc11 --- /dev/null +++ b/objects/vulnerability/vulnerability--f688ce26-c5ad-4d59-b54c-849079f73c8f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--98a30f2c-04a5-41a1-ba83-9109dd45d6fc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f688ce26-c5ad-4d59-b54c-849079f73c8f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.335057Z", + "modified": "2024-11-13T00:20:44.335057Z", + "name": "CVE-2024-30133", + "description": "HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a control flow vulnerability. The application does not sufficiently manage its control flow during execution, creating conditions in which the control flow can be modified in unexpected ways.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-30133" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f709efd0-3a14-4e23-ad75-11513c5ba8e3.json b/objects/vulnerability/vulnerability--f709efd0-3a14-4e23-ad75-11513c5ba8e3.json new file mode 100644 index 00000000000..1c6a300fdb0 --- /dev/null +++ b/objects/vulnerability/vulnerability--f709efd0-3a14-4e23-ad75-11513c5ba8e3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f4bcf57e-52d0-4045-9deb-c72bfb24ef90", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f709efd0-3a14-4e23-ad75-11513c5ba8e3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.871733Z", + "modified": "2024-11-13T00:20:46.871733Z", + "name": "CVE-2024-43625", + "description": "Microsoft Windows VMSwitch Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43625" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f74f79bb-bc47-4534-886e-5c509a7f12e4.json b/objects/vulnerability/vulnerability--f74f79bb-bc47-4534-886e-5c509a7f12e4.json new file mode 100644 index 00000000000..cc3932f3199 --- /dev/null +++ b/objects/vulnerability/vulnerability--f74f79bb-bc47-4534-886e-5c509a7f12e4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ede00c9a-97be-45ef-9942-1d88f3981b34", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f74f79bb-bc47-4534-886e-5c509a7f12e4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.90648Z", + "modified": "2024-11-13T00:20:46.90648Z", + "name": "CVE-2024-43639", + "description": "Windows Kerberos Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43639" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f7a856f0-2596-417b-924c-88c630873d20.json b/objects/vulnerability/vulnerability--f7a856f0-2596-417b-924c-88c630873d20.json new file mode 100644 index 00000000000..e6819d9a916 --- /dev/null +++ b/objects/vulnerability/vulnerability--f7a856f0-2596-417b-924c-88c630873d20.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1d6e3644-d1cd-4779-a89b-5df108d0ba14", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f7a856f0-2596-417b-924c-88c630873d20", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.085897Z", + "modified": "2024-11-13T00:20:46.085897Z", + "name": "CVE-2024-49028", + "description": "Microsoft Excel Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49028" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f841ccf1-d10b-4d58-943e-14caa84ff4cb.json b/objects/vulnerability/vulnerability--f841ccf1-d10b-4d58-943e-14caa84ff4cb.json new file mode 100644 index 00000000000..ed9e2b1b8e6 --- /dev/null +++ b/objects/vulnerability/vulnerability--f841ccf1-d10b-4d58-943e-14caa84ff4cb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3c1a388e-db41-4a9b-9908-8386c297bd84", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f841ccf1-d10b-4d58-943e-14caa84ff4cb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.614637Z", + "modified": "2024-11-13T00:20:46.614637Z", + "name": "CVE-2024-28726", + "description": "An issue in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to execute arbitrary code via a crafted payload to the Diagnostics function.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28726" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f87aac57-b256-4019-9063-535184b11eff.json b/objects/vulnerability/vulnerability--f87aac57-b256-4019-9063-535184b11eff.json new file mode 100644 index 00000000000..6a057153551 --- /dev/null +++ b/objects/vulnerability/vulnerability--f87aac57-b256-4019-9063-535184b11eff.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--88250a48-77d1-4e49-9b65-bd5b0a195c74", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f87aac57-b256-4019-9063-535184b11eff", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.908796Z", + "modified": "2024-11-13T00:20:45.908796Z", + "name": "CVE-2024-49005", + "description": "SQL Server Native Client Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49005" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fa3cf72b-a7d4-4dd1-8acb-1eb08bd2ddfa.json b/objects/vulnerability/vulnerability--fa3cf72b-a7d4-4dd1-8acb-1eb08bd2ddfa.json new file mode 100644 index 00000000000..cc17f97b106 --- /dev/null +++ b/objects/vulnerability/vulnerability--fa3cf72b-a7d4-4dd1-8acb-1eb08bd2ddfa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ef6c2d77-d470-4969-8f86-b224c9fc8a2c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fa3cf72b-a7d4-4dd1-8acb-1eb08bd2ddfa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.745112Z", + "modified": "2024-11-13T00:20:44.745112Z", + "name": "CVE-2024-47442", + "description": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47442" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--faeb4115-48ae-4d39-a065-099a7263a070.json b/objects/vulnerability/vulnerability--faeb4115-48ae-4d39-a065-099a7263a070.json new file mode 100644 index 00000000000..27f4d3558c3 --- /dev/null +++ b/objects/vulnerability/vulnerability--faeb4115-48ae-4d39-a065-099a7263a070.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3ed82a9e-485d-4ad3-b768-978d74da8c48", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--faeb4115-48ae-4d39-a065-099a7263a070", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.909031Z", + "modified": "2024-11-13T00:20:46.909031Z", + "name": "CVE-2024-43643", + "description": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43643" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fbc96916-45f1-4cc3-bdd2-d8c9ed5aff8d.json b/objects/vulnerability/vulnerability--fbc96916-45f1-4cc3-bdd2-d8c9ed5aff8d.json new file mode 100644 index 00000000000..0bbba67005d --- /dev/null +++ b/objects/vulnerability/vulnerability--fbc96916-45f1-4cc3-bdd2-d8c9ed5aff8d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9038a976-bad7-4562-a84c-4b8e9f36386d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fbc96916-45f1-4cc3-bdd2-d8c9ed5aff8d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.941836Z", + "modified": "2024-11-13T00:20:46.941836Z", + "name": "CVE-2024-43644", + "description": "Windows Client-Side Caching Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-43644" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fc38c850-4133-49d1-9bf4-d0c9941becd1.json b/objects/vulnerability/vulnerability--fc38c850-4133-49d1-9bf4-d0c9941becd1.json new file mode 100644 index 00000000000..f7130d0048e --- /dev/null +++ b/objects/vulnerability/vulnerability--fc38c850-4133-49d1-9bf4-d0c9941becd1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2b2cded7-ac9a-4ad0-87c4-f68d556a6897", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fc38c850-4133-49d1-9bf4-d0c9941becd1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.670693Z", + "modified": "2024-11-13T00:20:44.670693Z", + "name": "CVE-2024-47446", + "description": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47446" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fde0f482-7365-4d21-a8c1-f2d1a2bbc49e.json b/objects/vulnerability/vulnerability--fde0f482-7365-4d21-a8c1-f2d1a2bbc49e.json new file mode 100644 index 00000000000..ab89358bda3 --- /dev/null +++ b/objects/vulnerability/vulnerability--fde0f482-7365-4d21-a8c1-f2d1a2bbc49e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bad1f1be-46f2-4a87-8f27-9a226807e82d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fde0f482-7365-4d21-a8c1-f2d1a2bbc49e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:46.06091Z", + "modified": "2024-11-13T00:20:46.06091Z", + "name": "CVE-2024-49508", + "description": "InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49508" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fdfbc83d-0cd3-47ab-817c-444016d57d80.json b/objects/vulnerability/vulnerability--fdfbc83d-0cd3-47ab-817c-444016d57d80.json new file mode 100644 index 00000000000..261dd99a209 --- /dev/null +++ b/objects/vulnerability/vulnerability--fdfbc83d-0cd3-47ab-817c-444016d57d80.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--45f857d7-aae8-450c-937a-df3b6054b8b5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fdfbc83d-0cd3-47ab-817c-444016d57d80", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:45.929627Z", + "modified": "2024-11-13T00:20:45.929627Z", + "name": "CVE-2024-49056", + "description": "Authentication bypass by assumed-immutable data on airlift.microsoft.com allows an authorized attacker to elevate privileges over a network.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49056" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fef2024f-4808-4b18-a224-be90742382c9.json b/objects/vulnerability/vulnerability--fef2024f-4808-4b18-a224-be90742382c9.json new file mode 100644 index 00000000000..4b9846754c8 --- /dev/null +++ b/objects/vulnerability/vulnerability--fef2024f-4808-4b18-a224-be90742382c9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--158c2bbe-8117-4ac1-aec1-881b323fddd1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fef2024f-4808-4b18-a224-be90742382c9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-13T00:20:44.720816Z", + "modified": "2024-11-13T00:20:44.720816Z", + "name": "CVE-2024-47429", + "description": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47429" + } + ] + } + ] +} \ No newline at end of file