Skip to content

Commit

Permalink
generated content from 2024-09-14
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 14, 2024
1 parent 9673cf1 commit d805348
Show file tree
Hide file tree
Showing 154 changed files with 3,519 additions and 0 deletions.
153 changes: 153 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -249063,3 +249063,156 @@ vulnerability,CVE-2021-22518,vulnerability--7c9ce006-b80f-4861-bf7b-2cfd1c99b027
vulnerability,CVE-2021-22503,vulnerability--1b51d192-f22b-46fa-bf27-42d8ca67744a
vulnerability,CVE-2021-22532,vulnerability--50a01205-d338-49f9-9613-24d84a5cf897
vulnerability,CVE-2021-22533,vulnerability--3ddf6454-e237-4905-869c-1f80c4d2e1bb
vulnerability,CVE-2022-2446,vulnerability--1d098af5-2a1f-4748-a54f-4cd031052f86
vulnerability,CVE-2024-44685,vulnerability--e2b92266-d753-402a-9ab3-ab9890077c54
vulnerability,CVE-2024-44798,vulnerability--81c3622a-e53b-4bd0-ab5c-e23d49d91b48
vulnerability,CVE-2024-44096,vulnerability--52c8b728-c5ba-4dad-b3c1-e03e324af293
vulnerability,CVE-2024-44430,vulnerability--22718b3f-43e2-4a77-af17-1b26d16cfc80
vulnerability,CVE-2024-44092,vulnerability--de62f796-c860-439e-bb65-0f7ff0e91913
vulnerability,CVE-2024-44093,vulnerability--cb0029b0-a816-4045-b2f6-b06a8b4b906c
vulnerability,CVE-2024-44094,vulnerability--7abe8962-8528-42be-82bf-0615a86429ec
vulnerability,CVE-2024-44095,vulnerability--0fc91d99-9d39-4b42-8267-71adbbc54a0e
vulnerability,CVE-2024-46709,vulnerability--d949a2f3-9c3d-4390-bcb9-0ca8a0158fab
vulnerability,CVE-2024-46710,vulnerability--5e9f70c3-82a8-4865-9a8c-1e58c109fa1c
vulnerability,CVE-2024-46697,vulnerability--e2a8341b-d0c4-4fb1-873f-bb1d69acdafb
vulnerability,CVE-2024-46685,vulnerability--f821fa19-49a8-4d17-b754-1e7830d17467
vulnerability,CVE-2024-46678,vulnerability--89d46d27-eee1-4968-8b45-48671b0b2c8b
vulnerability,CVE-2024-46711,vulnerability--b7294706-5894-495c-9055-149bada3552f
vulnerability,CVE-2024-46677,vulnerability--91a526ee-7ebf-4007-a9d2-1250c50adba7
vulnerability,CVE-2024-46690,vulnerability--91beada9-9cdc-442a-81ef-80ea851e4247
vulnerability,CVE-2024-46686,vulnerability--26058c8b-7225-4fb0-baba-d43d4db11483
vulnerability,CVE-2024-46682,vulnerability--ab105584-3094-4576-acc0-a38c7250f4a2
vulnerability,CVE-2024-46680,vulnerability--a284e596-79b1-455b-842f-ef3bff339e21
vulnerability,CVE-2024-46692,vulnerability--90156653-011e-4892-b2a1-a3c7a20e6833
vulnerability,CVE-2024-46712,vulnerability--198dbfaa-1647-4261-9e48-41e096670f4d
vulnerability,CVE-2024-46713,vulnerability--c30393e8-baf9-4fc4-8067-aa6dec6c72f6
vulnerability,CVE-2024-46675,vulnerability--d39660db-53c2-4f8e-b1df-f406de942c19
vulnerability,CVE-2024-46683,vulnerability--a7ca2ad7-c0f6-404c-8adb-07af0cbd6fd8
vulnerability,CVE-2024-46044,vulnerability--39c5e8de-4c33-487d-b3b9-2094680b00ca
vulnerability,CVE-2024-46701,vulnerability--4840d405-a97c-4826-a643-5e020a2be29a
vulnerability,CVE-2024-46046,vulnerability--a06d6967-4abf-42c0-87e1-79cb57cdda06
vulnerability,CVE-2024-46048,vulnerability--c9411e1e-e1fb-4a6a-9d9e-5148d651d9c4
vulnerability,CVE-2024-46698,vulnerability--0dc50c2f-2718-4b63-9e50-4980603cd5f7
vulnerability,CVE-2024-46706,vulnerability--300ae022-1e40-465e-aac5-0b5d0d4d2a37
vulnerability,CVE-2024-46696,vulnerability--d16d73d8-fe26-47bd-b23a-65fb9f6e21d2
vulnerability,CVE-2024-46699,vulnerability--c48bf7d1-6ec8-478e-88c6-aa29cd0f9eea
vulnerability,CVE-2024-46674,vulnerability--98ac992c-25bf-4257-b8e4-cb118b217f7c
vulnerability,CVE-2024-46705,vulnerability--4a54117d-c91a-444b-91ef-f95a1251c622
vulnerability,CVE-2024-46707,vulnerability--dab51fa6-cb95-4fb0-b4b7-ebc61d98ad9b
vulnerability,CVE-2024-46679,vulnerability--2f06349a-ba9c-4b58-9000-786453d49057
vulnerability,CVE-2024-46693,vulnerability--33b89b86-89c8-4024-8262-f6018cdb75d0
vulnerability,CVE-2024-46684,vulnerability--cc487949-992a-40e6-9ff2-fd02c3bc83ad
vulnerability,CVE-2024-46703,vulnerability--a92e6168-e491-474c-ba2d-8732e671e170
vulnerability,CVE-2024-46708,vulnerability--1fed9c48-3843-4ea8-a6bd-a1e7496ad84e
vulnerability,CVE-2024-46049,vulnerability--25b4c651-21a3-4740-b875-6ed08268376a
vulnerability,CVE-2024-46694,vulnerability--ac170342-f064-4364-8f42-72e2eb77ea6f
vulnerability,CVE-2024-46688,vulnerability--57b807e9-8c78-4bf6-8e5b-a1500da6e68f
vulnerability,CVE-2024-46673,vulnerability--6639f2da-f857-4c5d-9e6f-a47af6ec7c32
vulnerability,CVE-2024-46695,vulnerability--882210c2-0f98-4b47-acc2-fbddfaf60c3a
vulnerability,CVE-2024-46681,vulnerability--806801d6-fc98-462f-947f-a9919fa4f6f4
vulnerability,CVE-2024-46691,vulnerability--98b34c2c-7b22-4d52-82f7-9729ea197f35
vulnerability,CVE-2024-46702,vulnerability--c763f5b5-a065-4191-93f1-611f99feef02
vulnerability,CVE-2024-46689,vulnerability--d960e3fe-b18c-491c-a610-3f93b1a13a39
vulnerability,CVE-2024-46676,vulnerability--a986b482-7380-44d4-b243-1f7331aed98c
vulnerability,CVE-2024-46704,vulnerability--9280dc6a-f641-41c4-b76e-2c5232bb7f11
vulnerability,CVE-2024-46047,vulnerability--2802bf18-1d59-491e-a47c-ff595adfeb53
vulnerability,CVE-2024-46045,vulnerability--c887ef74-ec48-4f59-a39d-fa21be5c5aca
vulnerability,CVE-2024-46687,vulnerability--ec60af07-2486-4b13-adb7-016f2ebccb56
vulnerability,CVE-2024-46700,vulnerability--641cb368-e867-4215-b3e0-1522cda7d649
vulnerability,CVE-2024-6862,vulnerability--e7311be8-068b-4db3-a6f4-0e004cfc172d
vulnerability,CVE-2024-6723,vulnerability--5b40a09a-7cad-4a8e-94e1-0a748f2dd8e3
vulnerability,CVE-2024-6587,vulnerability--19e8c71e-9f09-44a6-a7c3-785cbdad92f1
vulnerability,CVE-2024-6850,vulnerability--e1f73f6e-e654-4659-a5d5-a334a11b8d47
vulnerability,CVE-2024-6137,vulnerability--15a6b56b-ef51-4718-a4ce-282eb2214b93
vulnerability,CVE-2024-6258,vulnerability--4c3f97ec-d592-440f-bc01-935d3e34863e
vulnerability,CVE-2024-6259,vulnerability--13c2c6f2-3132-48b7-a440-0db6e1a7de3b
vulnerability,CVE-2024-6617,vulnerability--6e5d77a9-3155-41f3-ac44-833b41a8172d
vulnerability,CVE-2024-6493,vulnerability--20cb0bb4-a77f-46a8-996b-02885e139c6f
vulnerability,CVE-2024-6135,vulnerability--4ff98937-03d2-4961-87c3-6be6de0ed193
vulnerability,CVE-2024-6544,vulnerability--81dd83f2-49d5-4b13-9b4a-aa7da89f82cb
vulnerability,CVE-2024-6582,vulnerability--d656f071-7cd1-4f4f-97be-ed77f82d0d6b
vulnerability,CVE-2024-6087,vulnerability--9179ec59-2998-4e28-9bf6-95c0fb4b291b
vulnerability,CVE-2024-6867,vulnerability--53522dfe-e5e1-4b3c-9777-c723c1ead49c
vulnerability,CVE-2024-6656,vulnerability--c1568944-db24-493e-917a-b8d9aa85d443
vulnerability,CVE-2024-42025,vulnerability--ddf00a0f-c5dc-40c2-8a78-22ff0ebcb5ef
vulnerability,CVE-2024-4550,vulnerability--8d591511-064b-4721-a7a0-7e491684ce65
vulnerability,CVE-2024-38816,vulnerability--f7dfce30-4069-45a4-be07-d2fe12e4fbbb
vulnerability,CVE-2024-8281,vulnerability--2ad2f3b9-e958-4c4e-be27-a38237655576
vulnerability,CVE-2024-8762,vulnerability--c7e8afef-c71f-4524-b4e0-ae376212bc45
vulnerability,CVE-2024-8737,vulnerability--9c055b89-7e3c-40e1-82e9-125bacef663c
vulnerability,CVE-2024-8665,vulnerability--09bd2074-93d0-4b24-a5b6-96ae45aabc7d
vulnerability,CVE-2024-8782,vulnerability--4f017d12-7c90-47e7-b4de-2ee78a567d75
vulnerability,CVE-2024-8783,vulnerability--aba2cebe-0adf-42be-82fb-b437b71a26b3
vulnerability,CVE-2024-8747,vulnerability--5bc54e9b-0a0e-45da-a5d1-c1dd6dfacf4e
vulnerability,CVE-2024-8059,vulnerability--7f64559c-a261-4b02-b792-14675e056492
vulnerability,CVE-2024-8663,vulnerability--570ae7e9-333c-4c38-8938-0b1ebdbb1ac9
vulnerability,CVE-2024-8279,vulnerability--d2c23a64-540f-4af5-a934-89c586485cbc
vulnerability,CVE-2024-8732,vulnerability--45074085-8dcd-41a0-97dc-4ebc5193be65
vulnerability,CVE-2024-8242,vulnerability--a3892440-c01c-4b25-8304-8e77489c892f
vulnerability,CVE-2024-8784,vulnerability--a30c2340-7f5f-49ea-a844-4db9013dbdcb
vulnerability,CVE-2024-8656,vulnerability--ab371a7e-1f80-46cd-9f01-d19de87c2d19
vulnerability,CVE-2024-8278,vulnerability--3364e075-0206-40c3-944a-e819aaac22db
vulnerability,CVE-2024-8734,vulnerability--2e915672-b442-4af3-8e08-d96cca9d61b2
vulnerability,CVE-2024-8742,vulnerability--daaaebc0-a378-491b-a562-687e28dd4e53
vulnerability,CVE-2024-8714,vulnerability--cf0f88bb-aaa9-4059-a141-f8a023a3e29c
vulnerability,CVE-2024-8730,vulnerability--6bc42628-058e-4f4d-8d2a-1aa864215791
vulnerability,CVE-2024-8280,vulnerability--09076718-5eba-4b87-a154-0c5c86aa506d
vulnerability,CVE-2024-8269,vulnerability--12b568ff-4bdf-4b67-b56e-d4c3e006240e
vulnerability,CVE-2024-8664,vulnerability--2bef6189-0739-4484-922f-a72195f057f6
vulnerability,CVE-2024-8731,vulnerability--75cf9588-9f66-421d-8601-79d97f30017f
vulnerability,CVE-2024-29779,vulnerability--a876d6b5-b13f-4116-8a76-e75c593358f6
vulnerability,CVE-2024-39925,vulnerability--574cb640-9289-4086-8f78-34020bd929ca
vulnerability,CVE-2024-39377,vulnerability--0a66eb9a-8a81-4751-ae91-5ca865fcda1a
vulnerability,CVE-2024-39381,vulnerability--68f89186-2ae2-4c6d-ab06-0aa82b1491f1
vulnerability,CVE-2024-39380,vulnerability--c60a4c3a-e22d-475e-af38-4692a9ed1f19
vulnerability,CVE-2024-39384,vulnerability--b6326b2f-6799-4007-ad36-fa0cc09ddf20
vulnerability,CVE-2024-39926,vulnerability--488c63a3-edce-43f0-8745-e9043cf37e25
vulnerability,CVE-2024-39385,vulnerability--f856fe58-58e0-4154-a7f6-aae03688bdcb
vulnerability,CVE-2024-39924,vulnerability--8dfd342c-2a9b-4b62-8c98-bdd5137f3866
vulnerability,CVE-2024-39382,vulnerability--614780e9-660e-47fa-9aad-6a068e5b391e
vulnerability,CVE-2024-3100,vulnerability--d5316bd3-768f-41ea-aa27-92ec8122499a
vulnerability,CVE-2024-34121,vulnerability--f8155304-b5f8-49d6-852a-7fea7754f445
vulnerability,CVE-2024-7133,vulnerability--1c2236d7-56e7-4649-abfa-b3e063a5da95
vulnerability,CVE-2024-7129,vulnerability--2cdcd28c-1f7e-42d0-a433-be30685e52b3
vulnerability,CVE-2024-7423,vulnerability--a5b66d57-94d1-4e05-a267-231d15bf6240
vulnerability,CVE-2024-7864,vulnerability--16b45460-5e99-47b1-94d9-ab79535d5927
vulnerability,CVE-2024-7863,vulnerability--b364f11e-447f-4394-8dda-054653e12241
vulnerability,CVE-2024-7756,vulnerability--b10e4970-ee18-48c3-a1b7-a81835f1cb10
vulnerability,CVE-2024-7888,vulnerability--5fbd1692-fc1d-4def-a0cf-413baae447a7
vulnerability,CVE-2024-41859,vulnerability--6db05a3b-eba8-40c0-a208-da2935afac8b
vulnerability,CVE-2024-41857,vulnerability--4ad18a02-43df-4add-bebe-8e0093400c9f
vulnerability,CVE-2024-41870,vulnerability--97bae47a-d0af-405e-915b-c1546c989350
vulnerability,CVE-2024-41873,vulnerability--dfe3f084-e90a-42ef-bdd1-caae73afd122
vulnerability,CVE-2024-41869,vulnerability--629e5cff-3351-4af4-9a6b-dc2782649fed
vulnerability,CVE-2024-41872,vulnerability--25e1bbc5-7945-4f18-86e1-302b17aae735
vulnerability,CVE-2024-41871,vulnerability--ed425ad0-7942-4b2b-a01e-ce6426781c18
vulnerability,CVE-2024-41874,vulnerability--908190c0-97bb-44fc-8755-bbfcbcc52531
vulnerability,CVE-2024-41867,vulnerability--bdcc4b87-b18c-4bb7-b22b-d32565f16b34
vulnerability,CVE-2024-43180,vulnerability--72c96bd5-9063-47e5-8976-0f09c5401e18
vulnerability,CVE-2024-43759,vulnerability--8b26c2ba-8631-4a8e-96ef-d96023c29ca4
vulnerability,CVE-2024-43758,vulnerability--ca52af9c-e5b4-4f01-a83c-f1f8e3e8fc06
vulnerability,CVE-2024-43756,vulnerability--0edb8f85-6e5e-42b5-b424-17544244ee02
vulnerability,CVE-2024-43760,vulnerability--2a339cfa-f485-4ec4-a787-490ca5cd39a9
vulnerability,CVE-2024-43099,vulnerability--ef73db86-8be5-4a89-80ba-c717e90e6e0d
vulnerability,CVE-2024-31414,vulnerability--3823c792-97f4-4e68-a2f4-6738e9851808
vulnerability,CVE-2024-31416,vulnerability--91efb0f6-1ba1-4e8d-9a2f-edf1e9dd741a
vulnerability,CVE-2024-31415,vulnerability--1ee92bf9-3859-4222-a62f-ede8775cfb18
vulnerability,CVE-2024-5870,vulnerability--f5865742-9dc7-411e-94e6-ec045ad106ed
vulnerability,CVE-2024-5867,vulnerability--77197d04-9821-4b8b-bbfa-374f69a5381e
vulnerability,CVE-2024-5567,vulnerability--6d424d75-6342-46c7-9419-656568a50f88
vulnerability,CVE-2024-5931,vulnerability--be288b16-6e55-41aa-a73a-823163e49ab0
vulnerability,CVE-2024-5884,vulnerability--fb3e7b53-5820-4657-a8c2-1a1b5d7d8324
vulnerability,CVE-2024-5754,vulnerability--62cdf863-ff94-459a-b38d-0378f63f3ea7
vulnerability,CVE-2024-5789,vulnerability--c51b7af0-490e-4c52-af89-ec3f842d107b
vulnerability,CVE-2024-5628,vulnerability--e3e0fd9e-0d3a-4bdc-91cf-d7c1cf0ab0c1
vulnerability,CVE-2024-5869,vulnerability--31df4e67-46d4-4892-be9b-dc416d92db14
vulnerability,CVE-2024-45101,vulnerability--e9d9a867-72e2-4a2f-8194-51cf6c6f9c16
vulnerability,CVE-2024-45105,vulnerability--419cffdd-3166-4cee-a585-39886e4eb6e6
vulnerability,CVE-2024-45112,vulnerability--3292798e-78f2-43a1-8136-0e87b993cee7
vulnerability,CVE-2024-45108,vulnerability--2e0808bb-8731-4a36-aa0e-a12888761506
vulnerability,CVE-2024-45103,vulnerability--d5677040-f882-483f-aff7-fe907bf6ac87
vulnerability,CVE-2024-45109,vulnerability--58d33a19-4fc9-4cda-bb16-d7982582f539
vulnerability,CVE-2024-45368,vulnerability--81a29fc5-b4c6-4e9c-8d1f-a156d62e10a3
vulnerability,CVE-2024-45113,vulnerability--0ba0057c-a7c6-4559-bddb-82f638781131
vulnerability,CVE-2024-45111,vulnerability--859fafca-6fee-4d3b-9a98-5737b5353390
vulnerability,CVE-2024-45104,vulnerability--b50ee42c-1446-4f0b-ad58-b3087015d000
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0720d43c-b8af-4081-ae25-ba42bad861d9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09076718-5eba-4b87-a154-0c5c86aa506d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-14T00:33:47.832817Z",
"modified": "2024-09-14T00:33:47.832817Z",
"name": "CVE-2024-8280",
"description": "An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8280"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9ce725e4-338f-4a1f-9268-e7626f325418",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09bd2074-93d0-4b24-a5b6-96ae45aabc7d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-14T00:33:47.782779Z",
"modified": "2024-09-14T00:33:47.782779Z",
"name": "CVE-2024-8665",
"description": "The YITH Custom Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-8665"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a1a787ec-025b-4215-ae30-cba7f2b0519c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a66eb9a-8a81-4751-ae91-5ca865fcda1a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-14T00:33:47.961253Z",
"modified": "2024-09-14T00:33:47.961253Z",
"name": "CVE-2024-39377",
"description": "Media Encoder versions 24.5, 23.6.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-39377"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c71f5727-5f5a-4906-bb14-af0eb835faab",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ba0057c-a7c6-4559-bddb-82f638781131",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-14T00:33:48.807141Z",
"modified": "2024-09-14T00:33:48.807141Z",
"name": "CVE-2024-45113",
"description": "ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access and affect the integrity of the application. Exploitation of this issue does not require user interaction.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45113"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--975c13f5-0d27-4c43-ba52-3b22769d6db7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0dc50c2f-2718-4b63-9e50-4980603cd5f7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-14T00:33:46.977338Z",
"modified": "2024-09-14T00:33:46.977338Z",
"name": "CVE-2024-46698",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo/aperture: optionally match the device in sysfb_disable()\n\nIn aperture_remove_conflicting_pci_devices(), we currently only\ncall sysfb_disable() on vga class devices. This leads to the\nfollowing problem when the pimary device is not VGA compatible:\n\n1. A PCI device with a non-VGA class is the boot display\n2. That device is probed first and it is not a VGA device so\n sysfb_disable() is not called, but the device resources\n are freed by aperture_detach_platform_device()\n3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()\n4. NULL pointer dereference via sysfb_disable() since the resources\n have already been freed by aperture_detach_platform_device() when\n it was called by the other device.\n\nFix this by passing a device pointer to sysfb_disable() and checking\nthe device to determine if we should execute it or not.\n\nv2: Fix build when CONFIG_SCREEN_INFO is not set\nv3: Move device check into the mutex\n Drop primary variable in aperture_remove_conflicting_pci_devices()\n Drop __init on pci sysfb_pci_dev_is_enabled()",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-46698"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--645a1e9b-79fc-42b4-a6f3-69b4221d30f5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0edb8f85-6e5e-42b5-b424-17544244ee02",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-14T00:33:48.439175Z",
"modified": "2024-09-14T00:33:48.439175Z",
"name": "CVE-2024-43756",
"description": "Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43756"
}
]
}
]
}
Loading

0 comments on commit d805348

Please sign in to comment.