Skip to content

Commit

Permalink
generated content from 2024-03-01
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Mar 1, 2024
1 parent 2d7b3f5 commit 0cee589
Show file tree
Hide file tree
Showing 148 changed files with 3,381 additions and 0 deletions.
147 changes: 147 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -226816,3 +226816,150 @@ vulnerability,CVE-2020-36786,vulnerability--9187c9c8-0abc-40dc-ab6d-1064882bbe00
vulnerability,CVE-2020-36781,vulnerability--92d3147f-137f-4f80-a6ad-1bd7201bac02
vulnerability,CVE-2020-36778,vulnerability--13d2c501-9234-4bc9-9f1c-c0c38e3622ee
vulnerability,CVE-2020-36779,vulnerability--29a71ac2-3d1f-4dda-acc3-e570bdf62932
vulnerability,CVE-2023-52479,vulnerability--c024eed9-649e-402b-9dcd-2b0976b5eea5
vulnerability,CVE-2023-52492,vulnerability--2b2699ba-2676-4d75-b3e4-f6800376ceb7
vulnerability,CVE-2023-52494,vulnerability--168f8e85-0ff3-4d8d-873d-dbdb1ce45686
vulnerability,CVE-2023-52495,vulnerability--2f94825e-a08d-472e-981b-f38701fb641f
vulnerability,CVE-2023-52482,vulnerability--95084b22-43d0-4595-b5db-bd5d25d0f79d
vulnerability,CVE-2023-52488,vulnerability--b73dc48f-4150-41f8-8f4a-176b7c943338
vulnerability,CVE-2023-52491,vulnerability--1ca771cb-502d-4f17-bd47-6b2acf294f67
vulnerability,CVE-2023-52487,vulnerability--240d8c22-7e45-4295-86e1-164689249ade
vulnerability,CVE-2023-52490,vulnerability--c5233b78-7ca8-4fa4-bcba-55d22aa48d8b
vulnerability,CVE-2023-52476,vulnerability--ac86276a-09a7-4606-9b10-95ce6dc56676
vulnerability,CVE-2023-52498,vulnerability--f832de1a-deac-4ddf-9317-3bd0a3b240a3
vulnerability,CVE-2023-52483,vulnerability--f4bf26b6-690a-4bce-bbcd-5ebdeb250c66
vulnerability,CVE-2023-52489,vulnerability--77298dc8-756d-4db2-ac15-979fa0f956e0
vulnerability,CVE-2023-52478,vulnerability--5297280d-1020-4674-905b-7d6c15f6fe25
vulnerability,CVE-2023-52486,vulnerability--dee86549-a817-4aaf-84c9-a5d9e5a85790
vulnerability,CVE-2023-52497,vulnerability--2cb875e6-df06-4caa-b063-9f9c9366632a
vulnerability,CVE-2023-52485,vulnerability--e1f4ad96-6ed1-4c4e-83dc-053a684f4aec
vulnerability,CVE-2023-52496,vulnerability--2de7451a-9cc4-4371-9d23-6d9ffd43a2da
vulnerability,CVE-2023-52481,vulnerability--2b8acdaf-6450-4eb6-9e1d-de33b67175e6
vulnerability,CVE-2023-52475,vulnerability--a07b96ac-67df-4f7c-a7ff-bba0e73e5d8d
vulnerability,CVE-2023-52484,vulnerability--4d21c076-4db7-4cbd-a5fe-070aca8bcb18
vulnerability,CVE-2023-52480,vulnerability--8306e031-83b3-4798-905a-247d34599f5e
vulnerability,CVE-2023-52477,vulnerability--05b69ac0-fadc-464a-b4f8-00eb044ac5cf
vulnerability,CVE-2023-52493,vulnerability--6b18d904-13d1-400b-807e-e1de56a568fb
vulnerability,CVE-2023-6090,vulnerability--02dd091a-5035-4533-83d5-692215d6e1c3
vulnerability,CVE-2023-6132,vulnerability--2e91ca56-2f9c-47bc-a8e4-58e237f653ef
vulnerability,CVE-2023-1841,vulnerability--9c188e8d-ff8e-4c0c-ba25-986c54d2fb5b
vulnerability,CVE-2023-38372,vulnerability--34d407d2-a1b2-44a9-b4b5-e45d573c9c38
vulnerability,CVE-2023-38367,vulnerability--9079fda7-0251-41dd-9b38-ece3cc3052e3
vulnerability,CVE-2023-47874,vulnerability--ef76aa72-f28d-43a4-aca3-eb542ff2f1c3
vulnerability,CVE-2023-27545,vulnerability--3c041ce5-e212-4a7d-a6c7-cdfa4a54d6bd
vulnerability,CVE-2023-51529,vulnerability--61d90f44-1ac7-4c16-a082-f41d5eebe337
vulnerability,CVE-2023-51530,vulnerability--8fae8698-fc30-4eaf-b047-629dccf8afa6
vulnerability,CVE-2023-51802,vulnerability--9ec3094b-9a95-48fa-9b7a-fe3311b899db
vulnerability,CVE-2023-51800,vulnerability--35c06b7a-6f0d-449a-b625-57a79996aedf
vulnerability,CVE-2023-51531,vulnerability--07689ec7-b6de-4e0f-9546-188b8b57f9ad
vulnerability,CVE-2023-51696,vulnerability--b84096a0-f210-48b2-a250-2d2049e7ba68
vulnerability,CVE-2023-51801,vulnerability--728d3afb-130b-4e16-be60-459db38ea4eb
vulnerability,CVE-2023-51528,vulnerability--505f8d2d-d24d-41e4-8574-0078199948df
vulnerability,CVE-2023-25921,vulnerability--80cc033f-f897-48d2-bbb4-ea7a9705fc66
vulnerability,CVE-2023-25926,vulnerability--d332bbe7-60a9-4442-a00d-0cd5d70b31d0
vulnerability,CVE-2023-50905,vulnerability--acd42170-43b5-4fdf-a91a-bd7c7405304e
vulnerability,CVE-2024-20765,vulnerability--268f2fec-d928-4821-8313-f6ef58e67dbc
vulnerability,CVE-2024-22871,vulnerability--90307e28-3988-42a2-ba70-5acd149e434d
vulnerability,CVE-2024-1982,vulnerability--83432cc0-1f19-4626-8b39-39abd8e61b56
vulnerability,CVE-2024-1949,vulnerability--1a35dfae-7050-402f-9b2f-bdcdaec14159
vulnerability,CVE-2024-1468,vulnerability--b2cc591d-6c2c-4644-b3e0-e9abb0e8894c
vulnerability,CVE-2024-1434,vulnerability--d1bcaa4a-fae0-4c58-a6a0-83e38f726138
vulnerability,CVE-2024-1953,vulnerability--c6c40fad-f955-4027-ae0c-896fd0b507bb
vulnerability,CVE-2024-1888,vulnerability--c39e73ac-71c9-4d42-a1ea-f79a06166ce5
vulnerability,CVE-2024-1437,vulnerability--b045b25f-4fd8-46b4-afc9-7627a8b8f046
vulnerability,CVE-2024-1939,vulnerability--e3664337-1ac2-4a3a-bf08-ce12ac2716b3
vulnerability,CVE-2024-1595,vulnerability--1c5843f2-94a1-4061-9b84-411c8d6d5f1c
vulnerability,CVE-2024-1942,vulnerability--8ebbaf8c-e232-4c89-b23a-bbe9a9102518
vulnerability,CVE-2024-1976,vulnerability--82c22767-105b-4734-87af-4e3500710639
vulnerability,CVE-2024-1977,vulnerability--912827e9-732d-4926-b53e-9205665e525f
vulnerability,CVE-2024-1981,vulnerability--0c67a7be-090b-491b-a34f-4c076ed21a6b
vulnerability,CVE-2024-1952,vulnerability--a01e4428-0b10-49e6-abf7-17738feec27b
vulnerability,CVE-2024-1887,vulnerability--bb0132ff-3877-475b-b674-f75ee9217d62
vulnerability,CVE-2024-1619,vulnerability--fdf274dd-ff8c-4844-a66c-74a83b88558b
vulnerability,CVE-2024-1341,vulnerability--52b9c6df-5696-447c-ba92-652ef8ec5136
vulnerability,CVE-2024-1978,vulnerability--f22cfb8c-df80-4b32-beb4-21222b286df9
vulnerability,CVE-2024-1435,vulnerability--c4e4547c-af2d-442d-8a6a-a3dd08927243
vulnerability,CVE-2024-1908,vulnerability--5a668236-c515-4777-8600-8288f5750d08
vulnerability,CVE-2024-1938,vulnerability--9daf9750-0bbd-40b1-835e-1c1a76afac92
vulnerability,CVE-2024-23488,vulnerability--f9a4122f-1081-4693-b8ad-a0e931533285
vulnerability,CVE-2024-23493,vulnerability--db506b5e-a7b9-4f12-ae4b-a7efe361ad4a
vulnerability,CVE-2024-23501,vulnerability--7ea721e8-a062-4925-9d34-4f084832a913
vulnerability,CVE-2024-2009,vulnerability--49659866-8192-41ec-b0db-498e60711b5a
vulnerability,CVE-2024-2015,vulnerability--bed9c15d-69a6-4eac-8c8a-dd503040f98c
vulnerability,CVE-2024-2007,vulnerability--c169e4a7-4898-42fa-a68d-a0fdbedb1158
vulnerability,CVE-2024-2001,vulnerability--d148267c-1056-4332-a09a-e63fdc7ad09c
vulnerability,CVE-2024-2014,vulnerability--2fae0601-5d5a-436f-9b2f-e0c86388217c
vulnerability,CVE-2024-2045,vulnerability--ee9012c5-bec0-491a-9bee-b39498907bba
vulnerability,CVE-2024-2021,vulnerability--dd38a2c3-0fd8-421f-96bc-df5dff83f3a0
vulnerability,CVE-2024-2016,vulnerability--caaadc4a-c693-4673-83bf-5223be8d065d
vulnerability,CVE-2024-26612,vulnerability--f7d808c8-45b1-4ece-ac21-09e90d3f47d4
vulnerability,CVE-2024-26617,vulnerability--feacf238-6d5c-4723-a7c3-92afd1cfe43b
vulnerability,CVE-2024-26614,vulnerability--c562300b-abb8-4d44-b50f-f76a8cbf0a4e
vulnerability,CVE-2024-26611,vulnerability--861f2482-d100-4d5d-a76c-b22e726901bb
vulnerability,CVE-2024-26618,vulnerability--e56b76e1-f517-40e0-b002-62dcb4366564
vulnerability,CVE-2024-26619,vulnerability--15072d46-64e0-4a68-8f34-50e47453756d
vulnerability,CVE-2024-26548,vulnerability--32f0a797-28a8-4366-901f-3acde757a00a
vulnerability,CVE-2024-26613,vulnerability--aab046bb-9588-4c68-aa76-84319ccbe70f
vulnerability,CVE-2024-26608,vulnerability--9d37727d-4fb0-4a30-be0e-3219ed4725e9
vulnerability,CVE-2024-26616,vulnerability--10e1e7c4-7ba8-4ac6-82ac-c13a4bdf9841
vulnerability,CVE-2024-26196,vulnerability--943e1457-8834-4337-931d-fd5b384e8523
vulnerability,CVE-2024-26609,vulnerability--0369a69c-ff30-48ef-9997-37ca979f902c
vulnerability,CVE-2024-26610,vulnerability--df7edde1-2160-4346-b005-af1d2b7251b8
vulnerability,CVE-2024-26615,vulnerability--aa9db191-e1dd-4496-be45-01f933aa28df
vulnerability,CVE-2024-26607,vulnerability--fce1eea9-be37-43a9-9e78-671a51314b98
vulnerability,CVE-2024-26620,vulnerability--cb2d7e98-78ea-47b4-8737-18aef622722d
vulnerability,CVE-2024-27661,vulnerability--865b7161-9db3-4af9-8e2f-31be566073f8
vulnerability,CVE-2024-27290,vulnerability--39de7e01-a613-4a71-9d79-a6287916e770
vulnerability,CVE-2024-27659,vulnerability--c750f570-19d2-4cb0-93bc-654f20a58c44
vulnerability,CVE-2024-27656,vulnerability--ae5c2742-6ab4-40ad-bda0-3bf49cbb65b0
vulnerability,CVE-2024-27658,vulnerability--dad80d4f-4a51-448e-b38f-af831e9bee7d
vulnerability,CVE-2024-27662,vulnerability--5cdc0c38-32ff-4bbe-b5fc-7cbbf1ff28d6
vulnerability,CVE-2024-27094,vulnerability--5b8a6497-4a10-4cb4-bee7-38731332e0bf
vulnerability,CVE-2024-27660,vulnerability--e29057a3-987d-429c-97f9-a5a5380929a5
vulnerability,CVE-2024-27906,vulnerability--d4017623-0dc0-444d-adda-8d8f116c1994
vulnerability,CVE-2024-27655,vulnerability--bf914637-915d-4c86-a7bb-ee45b7f5a69a
vulnerability,CVE-2024-27291,vulnerability--35846607-e60a-4638-a797-862b1818255d
vulnerability,CVE-2024-27294,vulnerability--5730505f-119d-44b1-8f8c-3377c4faa22f
vulnerability,CVE-2024-27292,vulnerability--b85bba86-d17e-4eef-be04-22ee4a5cc697
vulnerability,CVE-2024-27657,vulnerability--75b4e975-8910-4d07-adb7-68f3010633f3
vulnerability,CVE-2024-0403,vulnerability--aeef469d-4580-42d8-bde9-1766ed252c92
vulnerability,CVE-2024-0864,vulnerability--50c8cb16-bc62-4ac2-81c6-9a7851e5c1d0
vulnerability,CVE-2024-0689,vulnerability--85675ddc-2f60-43d0-b441-1ccc99ecd455
vulnerability,CVE-2024-0068,vulnerability--f2258a1d-d988-4520-aa21-e975185bc545
vulnerability,CVE-2024-24988,vulnerability--396bc27f-7438-4cce-876c-94284e0c40a4
vulnerability,CVE-2024-24525,vulnerability--d3881f82-94c1-4767-8c05-7b471dbdc585
vulnerability,CVE-2024-24520,vulnerability--b33840f7-4d23-495a-ab55-08f47deed31c
vulnerability,CVE-2024-24818,vulnerability--b6b0d9f8-5bfc-42e7-bec6-8e29eac954b1
vulnerability,CVE-2024-24110,vulnerability--08b4fb8e-b183-49e8-9985-ff2ff1a547a1
vulnerability,CVE-2024-24028,vulnerability--b06a768a-a0c2-49e8-bc44-8eaea3e86906
vulnerability,CVE-2024-24246,vulnerability--1e7cdefb-4d57-41c1-9b5b-9b5a7ea1ed97
vulnerability,CVE-2024-21752,vulnerability--0e0a4ff5-5168-490b-9471-066e02124e35
vulnerability,CVE-2024-25167,vulnerability--279008a3-30c3-4ac1-b486-41cdeb9d0038
vulnerability,CVE-2024-25292,vulnerability--a48f70b5-7f1e-4716-b99f-6028da9f66f9
vulnerability,CVE-2024-25093,vulnerability--d3d42663-94de-4e71-9b2e-e507381f00ac
vulnerability,CVE-2024-25094,vulnerability--67db70c9-71a6-4b8c-8f29-1d87756ac267
vulnerability,CVE-2024-25291,vulnerability--d9c34aa4-fe59-4670-bd2d-d88b6b5a2969
vulnerability,CVE-2024-25811,vulnerability--0ba6fb2e-f329-4bbc-8df6-abab404dde8d
vulnerability,CVE-2024-25594,vulnerability--1e0cd850-ae29-4265-9654-b331a8fde0d6
vulnerability,CVE-2024-25098,vulnerability--e7e0ac8d-372e-4797-a2ac-daee6912d3b2
vulnerability,CVE-2024-25239,vulnerability--359cf762-5c92-4a2a-9a20-3da06a987bc0
vulnerability,CVE-2024-25180,vulnerability--9b89f0cf-c5d5-4f0a-901f-f075d00abb9d
vulnerability,CVE-2021-46959,vulnerability--3d59114a-3572-43b8-88da-c69a2d170df5
vulnerability,CVE-2021-47055,vulnerability--a4734a01-e988-4cbd-bf36-1fe576dd0107
vulnerability,CVE-2021-47068,vulnerability--689a2b37-e60c-4570-82dc-6e8df701f317
vulnerability,CVE-2021-47057,vulnerability--c42dea90-04df-46f7-8074-86f02b95a09b
vulnerability,CVE-2021-47054,vulnerability--98aa4a17-3553-4d8e-87b6-986645e475f1
vulnerability,CVE-2021-47064,vulnerability--e8784bff-8c2c-4f9f-9ae9-6a0194d7200d
vulnerability,CVE-2021-47016,vulnerability--3f2ba45d-d4d1-48b8-9775-d99418a67276
vulnerability,CVE-2021-47060,vulnerability--63414db8-5c92-483b-a417-9b6b8237467d
vulnerability,CVE-2021-47061,vulnerability--c5e3d79b-9b56-432a-a532-573517dfc367
vulnerability,CVE-2021-47059,vulnerability--a8ea47f8-5c67-4071-9611-edb3075a7075
vulnerability,CVE-2021-47056,vulnerability--1d8a2dbc-e461-45fe-ab2c-90b613bca33e
vulnerability,CVE-2021-47062,vulnerability--1ff93ff1-1721-45c7-b2e3-f6ba14a43ff0
vulnerability,CVE-2021-47063,vulnerability--5e7a519c-c7ba-4d1c-b23e-76d1dcc236c1
vulnerability,CVE-2021-47020,vulnerability--3b26ea4e-de63-4cea-944c-dac143e5fec0
vulnerability,CVE-2021-47067,vulnerability--d451eba7-4a35-4a54-a3a5-64a2ebf83878
vulnerability,CVE-2021-47066,vulnerability--6151d122-428f-4dac-9327-01931bd48712
vulnerability,CVE-2021-47065,vulnerability--30124c95-9b5a-44b9-ab6f-99b164101876
vulnerability,CVE-2021-47058,vulnerability--27e743ae-24a3-4550-9254-0ef4482fc366
vulnerability,CVE-2021-39090,vulnerability--ba30e3dc-bf87-4945-85d9-2180539d7ee8
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e63a4394-5a3c-400a-8eb6-888eed1385a5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02dd091a-5035-4533-83d5-692215d6e1c3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-03-01T00:30:46.46126Z",
"modified": "2024-03-01T00:30:46.46126Z",
"name": "CVE-2023-6090",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Mollie Mollie Payments for WooCommerce.This issue affects Mollie Payments for WooCommerce: from n/a through 7.3.11.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6090"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e101bc64-8b8b-4c9f-a0b7-819ff7b5f52b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0369a69c-ff30-48ef-9997-37ca979f902c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-03-01T00:30:49.310227Z",
"modified": "2024-03-01T00:30:49.310227Z",
"name": "CVE-2024-26609",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: reject QUEUE/DROP verdict parameters\n\nThis reverts commit e0abdadcc6e1.\n\ncore.c:nf_hook_slow assumes that the upper 16 bits of NF_DROP\nverdicts contain a valid errno, i.e. -EPERM, -EHOSTUNREACH or similar,\nor 0.\n\nDue to the reverted commit, its possible to provide a positive\nvalue, e.g. NF_ACCEPT (1), which results in use-after-free.\n\nIts not clear to me why this commit was made.\n\nNF_QUEUE is not used by nftables; \"queue\" rules in nftables\nwill result in use of \"nft_queue\" expression.\n\nIf we later need to allow specifiying errno values from userspace\n(do not know why), this has to call NF_DROP_GETERR and check that\n\"err <= 0\" holds true.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-26609"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--05dce5b1-5fc2-40b5-b180-b91c4fbfa225",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05b69ac0-fadc-464a-b4f8-00eb044ac5cf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-03-01T00:30:45.908132Z",
"modified": "2024-03-01T00:30:45.908132Z",
"name": "CVE-2023-52477",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: hub: Guard against accesses to uninitialized BOS descriptors\n\nMany functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h\naccess fields inside udev->bos without checking if it was allocated and\ninitialized. If usb_get_bos_descriptor() fails for whatever\nreason, udev->bos will be NULL and those accesses will result in a\ncrash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000018\nPGD 0 P4D 0\nOops: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 5 PID: 17818 Comm: kworker/5:1 Tainted: G W 5.15.108-18910-gab0e1cb584e1 #1 <HASH:1f9e 1>\nHardware name: Google Kindred/Kindred, BIOS Google_Kindred.12672.413.0 02/03/2021\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:hub_port_reset+0x193/0x788\nCode: 89 f7 e8 20 f7 15 00 48 8b 43 08 80 b8 96 03 00 00 03 75 36 0f b7 88 92 03 00 00 81 f9 10 03 00 00 72 27 48 8b 80 a8 03 00 00 <48> 83 78 18 00 74 19 48 89 df 48 8b 75 b0 ba 02 00 00 00 4c 89 e9\nRSP: 0018:ffffab740c53fcf8 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffa1bc5f678000 RCX: 0000000000000310\nRDX: fffffffffffffdff RSI: 0000000000000286 RDI: ffffa1be9655b840\nRBP: ffffab740c53fd70 R08: 00001b7d5edaa20c R09: ffffffffb005e060\nR10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000\nR13: ffffab740c53fd3e R14: 0000000000000032 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffffa1be96540000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000018 CR3: 000000022e80c005 CR4: 00000000003706e0\nCall Trace:\nhub_event+0x73f/0x156e\n? hub_activate+0x5b7/0x68f\nprocess_one_work+0x1a2/0x487\nworker_thread+0x11a/0x288\nkthread+0x13a/0x152\n? process_one_work+0x487/0x487\n? kthread_associate_blkcg+0x70/0x70\nret_from_fork+0x1f/0x30\n\nFall back to a default behavior if the BOS descriptor isn't accessible\nand skip all the functionalities that depend on it: LPM support checks,\nSuper Speed capabilitiy checks, U1/U2 states setup.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-52477"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--01b156ad-fe01-4406-ac3c-9b097122638e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07689ec7-b6de-4e0f-9546-188b8b57f9ad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-03-01T00:30:47.185532Z",
"modified": "2024-03-01T00:30:47.185532Z",
"name": "CVE-2023-51531",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Thrive Themes Thrive Automator.This issue affects Thrive Automator: from n/a through 1.17.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-51531"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--98170bb8-4c7e-4ea8-b141-a6d649285962",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08b4fb8e-b183-49e8-9985-ff2ff1a547a1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-03-01T00:30:49.476117Z",
"modified": "2024-03-01T00:30:49.476117Z",
"name": "CVE-2024-24110",
"description": "SQL Injection vulnerability in crmeb_java before v1.3.4 allows attackers to run arbitrary SQL commands via crafted GET request to the component /api/front/spread/people.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24110"
}
]
}
]
}
Loading

0 comments on commit 0cee589

Please sign in to comment.