Skip to content

Commit

Permalink
generated content from 2025-01-10
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 10, 2025
1 parent f0e939a commit 7fe5e45
Show file tree
Hide file tree
Showing 6 changed files with 115 additions and 0 deletions.
5 changes: 5 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -262881,3 +262881,8 @@ vulnerability,CVE-2025-0311,vulnerability--3e636fdd-ccb0-44c1-9cd9-72d05ff8fc47
vulnerability,CVE-2024-13183,vulnerability--57d3e6cd-56dd-4c40-9058-7e2cf0af40e6
vulnerability,CVE-2024-13318,vulnerability--073f83aa-efd0-4072-ad32-70f12b086e1e
vulnerability,CVE-2025-23016,vulnerability--aec1f8ba-f210-41bb-84f8-b9eb894f7415
vulnerability,CVE-2024-57686,vulnerability--e4a9bccc-84f7-4bee-8c88-cae3916fd3d5
vulnerability,CVE-2024-57822,vulnerability--9f838611-b755-421b-8c11-79b4386a79cb
vulnerability,CVE-2024-57823,vulnerability--0a84d545-3a1a-40e2-a1b3-74499f89bed0
vulnerability,CVE-2024-57687,vulnerability--419301e9-92a7-4507-9beb-f3148e8c2293
vulnerability,CVE-2024-41787,vulnerability--05f25e02-2910-4569-bf3b-d210b7415a90
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--48e7dab6-386e-4e3d-8c0b-f20b54ac63b8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05f25e02-2910-4569-bf3b-d210b7415a90",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-10T14:18:31.499492Z",
"modified": "2025-01-10T14:18:31.499492Z",
"name": "CVE-2024-41787",
"description": "IBM Engineering Requirements Management DOORS Next 7.0.2 and 7.0.3 could allow a remote attacker to bypass security restrictions, caused by a race condition. By sending a specially crafted request, an attacker could exploit this vulnerability to remotely execute code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41787"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8bcf168f-6e80-45d3-9cad-421a594c9ac7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a84d545-3a1a-40e2-a1b3-74499f89bed0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-10T14:18:30.131919Z",
"modified": "2025-01-10T14:18:30.131919Z",
"name": "CVE-2024-57823",
"description": "In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57823"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8c185e28-b3f2-4fd2-afde-d99b96762c70",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--419301e9-92a7-4507-9beb-f3148e8c2293",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-10T14:18:30.13723Z",
"modified": "2025-01-10T14:18:30.13723Z",
"name": "CVE-2024-57687",
"description": "An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"Cookie\" GET request parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57687"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--60aa4f9c-be30-4619-9920-f3d35698f645",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9f838611-b755-421b-8c11-79b4386a79cb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-10T14:18:30.124706Z",
"modified": "2025-01-10T14:18:30.124706Z",
"name": "CVE-2024-57822",
"description": "In Raptor RDF Syntax Library through 2.0.16, there is a heap-based buffer over-read when parsing triples with the nquads parser in raptor_ntriples_parse_term_internal().",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57822"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--105bc333-0203-4c86-8f4d-83ecb1e57d67",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--e4a9bccc-84f7-4bee-8c88-cae3916fd3d5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-10T14:18:30.113267Z",
"modified": "2025-01-10T14:18:30.113267Z",
"name": "CVE-2024-57686",
"description": "A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"pagetitle\" parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57686"
}
]
}
]
}

0 comments on commit 7fe5e45

Please sign in to comment.