diff --git a/mapping.csv b/mapping.csv index 7066c74251..7a38759470 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263089,3 +263089,5 @@ vulnerability,CVE-2025-22314,vulnerability--89354669-2eb6-4f11-8f5b-1ea02109a182 vulnerability,CVE-2025-22570,vulnerability--9cb15494-d53a-43cb-a7cb-117f9b43005a vulnerability,CVE-2025-22337,vulnerability--5fbafecc-396d-4f22-ab6a-099dbcdf97e7 vulnerability,CVE-2025-22777,vulnerability--3583868a-dbc3-447d-8523-65d8ead5912e +vulnerability,CVE-2024-52333,vulnerability--9757d7a3-db28-4a9e-a711-c7d4e93ae1ca +vulnerability,CVE-2024-47796,vulnerability--4745dc1a-a7b9-461b-b918-afd05fcaddd5 diff --git a/objects/vulnerability/vulnerability--4745dc1a-a7b9-461b-b918-afd05fcaddd5.json b/objects/vulnerability/vulnerability--4745dc1a-a7b9-461b-b918-afd05fcaddd5.json new file mode 100644 index 0000000000..e8845c9fd0 --- /dev/null +++ b/objects/vulnerability/vulnerability--4745dc1a-a7b9-461b-b918-afd05fcaddd5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--576d8eef-ed48-4fe6-a522-8301bd7a2a6e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4745dc1a-a7b9-461b-b918-afd05fcaddd5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T15:22:03.487512Z", + "modified": "2025-01-13T15:22:03.487512Z", + "name": "CVE-2024-47796", + "description": "An improper array index validation vulnerability exists in the nowindow functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-47796" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9757d7a3-db28-4a9e-a711-c7d4e93ae1ca.json b/objects/vulnerability/vulnerability--9757d7a3-db28-4a9e-a711-c7d4e93ae1ca.json new file mode 100644 index 0000000000..9562fc06e0 --- /dev/null +++ b/objects/vulnerability/vulnerability--9757d7a3-db28-4a9e-a711-c7d4e93ae1ca.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1e5d084c-09e6-4519-af16-c93d82010a5c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9757d7a3-db28-4a9e-a711-c7d4e93ae1ca", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T15:22:03.372585Z", + "modified": "2025-01-13T15:22:03.372585Z", + "name": "CVE-2024-52333", + "description": "An improper array index validation vulnerability exists in the determineMinMax functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52333" + } + ] + } + ] +} \ No newline at end of file