diff --git a/mapping.csv b/mapping.csv index 6d997dfdd6..8985401ac6 100644 --- a/mapping.csv +++ b/mapping.csv @@ -262881,3 +262881,8 @@ vulnerability,CVE-2025-0311,vulnerability--3e636fdd-ccb0-44c1-9cd9-72d05ff8fc47 vulnerability,CVE-2024-13183,vulnerability--57d3e6cd-56dd-4c40-9058-7e2cf0af40e6 vulnerability,CVE-2024-13318,vulnerability--073f83aa-efd0-4072-ad32-70f12b086e1e vulnerability,CVE-2025-23016,vulnerability--aec1f8ba-f210-41bb-84f8-b9eb894f7415 +vulnerability,CVE-2024-57686,vulnerability--e4a9bccc-84f7-4bee-8c88-cae3916fd3d5 +vulnerability,CVE-2024-57822,vulnerability--9f838611-b755-421b-8c11-79b4386a79cb +vulnerability,CVE-2024-57823,vulnerability--0a84d545-3a1a-40e2-a1b3-74499f89bed0 +vulnerability,CVE-2024-57687,vulnerability--419301e9-92a7-4507-9beb-f3148e8c2293 +vulnerability,CVE-2024-41787,vulnerability--05f25e02-2910-4569-bf3b-d210b7415a90 diff --git a/objects/vulnerability/vulnerability--05f25e02-2910-4569-bf3b-d210b7415a90.json b/objects/vulnerability/vulnerability--05f25e02-2910-4569-bf3b-d210b7415a90.json new file mode 100644 index 0000000000..0641b60e9e --- /dev/null +++ b/objects/vulnerability/vulnerability--05f25e02-2910-4569-bf3b-d210b7415a90.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--48e7dab6-386e-4e3d-8c0b-f20b54ac63b8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--05f25e02-2910-4569-bf3b-d210b7415a90", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-10T14:18:31.499492Z", + "modified": "2025-01-10T14:18:31.499492Z", + "name": "CVE-2024-41787", + "description": "IBM Engineering Requirements Management DOORS Next 7.0.2 and 7.0.3 could allow a remote attacker to bypass security restrictions, caused by a race condition. By sending a specially crafted request, an attacker could exploit this vulnerability to remotely execute code.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-41787" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0a84d545-3a1a-40e2-a1b3-74499f89bed0.json b/objects/vulnerability/vulnerability--0a84d545-3a1a-40e2-a1b3-74499f89bed0.json new file mode 100644 index 0000000000..1b8e31edb1 --- /dev/null +++ b/objects/vulnerability/vulnerability--0a84d545-3a1a-40e2-a1b3-74499f89bed0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8bcf168f-6e80-45d3-9cad-421a594c9ac7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0a84d545-3a1a-40e2-a1b3-74499f89bed0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-10T14:18:30.131919Z", + "modified": "2025-01-10T14:18:30.131919Z", + "name": "CVE-2024-57823", + "description": "In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-57823" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--419301e9-92a7-4507-9beb-f3148e8c2293.json b/objects/vulnerability/vulnerability--419301e9-92a7-4507-9beb-f3148e8c2293.json new file mode 100644 index 0000000000..3a221c2582 --- /dev/null +++ b/objects/vulnerability/vulnerability--419301e9-92a7-4507-9beb-f3148e8c2293.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8c185e28-b3f2-4fd2-afde-d99b96762c70", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--419301e9-92a7-4507-9beb-f3148e8c2293", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-10T14:18:30.13723Z", + "modified": "2025-01-10T14:18:30.13723Z", + "name": "CVE-2024-57687", + "description": "An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"Cookie\" GET request parameter.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-57687" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9f838611-b755-421b-8c11-79b4386a79cb.json b/objects/vulnerability/vulnerability--9f838611-b755-421b-8c11-79b4386a79cb.json new file mode 100644 index 0000000000..e48dcb8a48 --- /dev/null +++ b/objects/vulnerability/vulnerability--9f838611-b755-421b-8c11-79b4386a79cb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--60aa4f9c-be30-4619-9920-f3d35698f645", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9f838611-b755-421b-8c11-79b4386a79cb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-10T14:18:30.124706Z", + "modified": "2025-01-10T14:18:30.124706Z", + "name": "CVE-2024-57822", + "description": "In Raptor RDF Syntax Library through 2.0.16, there is a heap-based buffer over-read when parsing triples with the nquads parser in raptor_ntriples_parse_term_internal().", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-57822" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e4a9bccc-84f7-4bee-8c88-cae3916fd3d5.json b/objects/vulnerability/vulnerability--e4a9bccc-84f7-4bee-8c88-cae3916fd3d5.json new file mode 100644 index 0000000000..1355285e4e --- /dev/null +++ b/objects/vulnerability/vulnerability--e4a9bccc-84f7-4bee-8c88-cae3916fd3d5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--105bc333-0203-4c86-8f4d-83ecb1e57d67", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e4a9bccc-84f7-4bee-8c88-cae3916fd3d5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-10T14:18:30.113267Z", + "modified": "2025-01-10T14:18:30.113267Z", + "name": "CVE-2024-57686", + "description": "A Cross Site Scripting (XSS) vulnerability was found in /landrecordsys/admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \"pagetitle\" parameter.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-57686" + } + ] + } + ] +} \ No newline at end of file