From 2dae6e9d40c341c87efc4ab00555d331bb048816 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Mon, 13 Jan 2025 19:16:31 +0000 Subject: [PATCH] generated content from 2025-01-13 --- mapping.csv | 2 ++ ...-bb3fcf1d-d215-4049-ac67-8529476e29a2.json | 22 +++++++++++++++++++ ...-fac39467-2f48-45bc-adbe-ae93ab3baa5b.json | 22 +++++++++++++++++++ 3 files changed, 46 insertions(+) create mode 100644 objects/vulnerability/vulnerability--bb3fcf1d-d215-4049-ac67-8529476e29a2.json create mode 100644 objects/vulnerability/vulnerability--fac39467-2f48-45bc-adbe-ae93ab3baa5b.json diff --git a/mapping.csv b/mapping.csv index af97b829dc..a603445e06 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263102,3 +263102,5 @@ vulnerability,CVE-2024-46919,vulnerability--46b2641e-16e3-461d-8151-fc4f4db9b67b vulnerability,CVE-2024-5743,vulnerability--0f0b42a3-6e61-48ab-ba56-0bb59401c05d vulnerability,CVE-2024-46920,vulnerability--18da639d-9297-48ed-bf39-c7fd2dc044c5 vulnerability,CVE-2024-46479,vulnerability--44edbad1-1550-4d8c-a001-d68eeb381605 +vulnerability,CVE-2024-46921,vulnerability--fac39467-2f48-45bc-adbe-ae93ab3baa5b +vulnerability,CVE-2024-44771,vulnerability--bb3fcf1d-d215-4049-ac67-8529476e29a2 diff --git a/objects/vulnerability/vulnerability--bb3fcf1d-d215-4049-ac67-8529476e29a2.json b/objects/vulnerability/vulnerability--bb3fcf1d-d215-4049-ac67-8529476e29a2.json new file mode 100644 index 0000000000..26c6c99928 --- /dev/null +++ b/objects/vulnerability/vulnerability--bb3fcf1d-d215-4049-ac67-8529476e29a2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--36334339-500c-40ca-be3d-cc826cedea21", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bb3fcf1d-d215-4049-ac67-8529476e29a2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T19:16:11.716885Z", + "modified": "2025-01-13T19:16:11.716885Z", + "name": "CVE-2024-44771", + "description": "BigId PrivacyPortal v179 is vulnerable to Cross Site Scripting (XSS) via the \"Label\" field in the Report template function.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-44771" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fac39467-2f48-45bc-adbe-ae93ab3baa5b.json b/objects/vulnerability/vulnerability--fac39467-2f48-45bc-adbe-ae93ab3baa5b.json new file mode 100644 index 0000000000..9be2c25771 --- /dev/null +++ b/objects/vulnerability/vulnerability--fac39467-2f48-45bc-adbe-ae93ab3baa5b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7b17561f-1861-4387-841e-ee6de5fd48c4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fac39467-2f48-45bc-adbe-ae93ab3baa5b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T19:16:11.56507Z", + "modified": "2025-01-13T19:16:11.56507Z", + "name": "CVE-2024-46921", + "description": "An issue was discovered in Samsung Mobile Processor and Modem Exynos 9820, 9825, 980, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W1000, Modem 5123, Modem 5300, Modem 5400. UE does not limit the number of attempts for the RRC Setup procedure in the 5G SA, leading to a denial of service (battery-drain attack).", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-46921" + } + ] + } + ] +} \ No newline at end of file