From 1dc83d80e38de39bbb99160ca680fab4390632d9 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Thu, 10 Oct 2024 15:21:06 +0000 Subject: [PATCH] generated content from 2024-10-10 --- mapping.csv | 2 ++ ...-2462ed10-c170-48dc-a049-2307c3670b41.json | 22 +++++++++++++++++++ ...-8060ba73-1673-46a4-af71-d2b3bde855a5.json | 22 +++++++++++++++++++ 3 files changed, 46 insertions(+) create mode 100644 objects/vulnerability/vulnerability--2462ed10-c170-48dc-a049-2307c3670b41.json create mode 100644 objects/vulnerability/vulnerability--8060ba73-1673-46a4-af71-d2b3bde855a5.json diff --git a/mapping.csv b/mapping.csv index 40794ed3c9..029ef3fa5d 100644 --- a/mapping.csv +++ b/mapping.csv @@ -251637,3 +251637,5 @@ vulnerability,CVE-2024-9785,vulnerability--f60227ba-158b-4050-b881-b7af8dc88448 vulnerability,CVE-2024-9786,vulnerability--d7de3c7a-3d69-4380-b794-9c790e681d01 vulnerability,CVE-2024-9787,vulnerability--9ed2da60-a1c2-48a5-b621-eb889ac7f792 vulnerability,CVE-2024-4658,vulnerability--b9b81c1e-9e92-4de9-be60-2863c38e7063 +vulnerability,CVE-2024-9788,vulnerability--8060ba73-1673-46a4-af71-d2b3bde855a5 +vulnerability,CVE-2024-9789,vulnerability--2462ed10-c170-48dc-a049-2307c3670b41 diff --git a/objects/vulnerability/vulnerability--2462ed10-c170-48dc-a049-2307c3670b41.json b/objects/vulnerability/vulnerability--2462ed10-c170-48dc-a049-2307c3670b41.json new file mode 100644 index 0000000000..906d861885 --- /dev/null +++ b/objects/vulnerability/vulnerability--2462ed10-c170-48dc-a049-2307c3670b41.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--539bfa2d-bdc2-44f0-be45-a3dc085a8123", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2462ed10-c170-48dc-a049-2307c3670b41", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-10T15:20:38.320373Z", + "modified": "2024-10-10T15:20:38.320373Z", + "name": "CVE-2024-9789", + "description": "A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. This issue affects some unknown processing of the file /admin/apply.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9789" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8060ba73-1673-46a4-af71-d2b3bde855a5.json b/objects/vulnerability/vulnerability--8060ba73-1673-46a4-af71-d2b3bde855a5.json new file mode 100644 index 0000000000..348bc42a6c --- /dev/null +++ b/objects/vulnerability/vulnerability--8060ba73-1673-46a4-af71-d2b3bde855a5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5cdaece7-726e-4475-8d33-6da81042bc91", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8060ba73-1673-46a4-af71-d2b3bde855a5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-10-10T15:20:38.298573Z", + "modified": "2024-10-10T15:20:38.298573Z", + "name": "CVE-2024-9788", + "description": "A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. This vulnerability affects unknown code of the file /admin/tag.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-9788" + } + ] + } + ] +} \ No newline at end of file