Skip to content

Commit

Permalink
generated content from 2024-02-06
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 6, 2024
1 parent bf761b5 commit 3706441
Show file tree
Hide file tree
Showing 158 changed files with 3,611 additions and 0 deletions.
157 changes: 157 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -224442,3 +224442,160 @@ vulnerability,CVE-2021-46902,vulnerability--5165aa03-51fa-4bb0-938f-2c1a9a1fc724
vulnerability,CVE-2021-46903,vulnerability--6dc1543f-8fba-4aae-9667-18c169049af2
vulnerability,CVE-2021-4435,vulnerability--f068e540-a17b-49e1-abb5-8a8a27a515fd
vulnerability,CVE-2019-25159,vulnerability--60760793-106a-464b-9c7b-7e6e9a47dd94
vulnerability,CVE-2024-22386,vulnerability--c7932789-ca41-4008-8238-720790d8247d
vulnerability,CVE-2024-22202,vulnerability--3a70f753-8d75-445d-b4dc-2ee58a38ef57
vulnerability,CVE-2024-22208,vulnerability--96aaa633-a3b9-43ab-b170-b53dcbfb8128
vulnerability,CVE-2024-22567,vulnerability--3e02b0ff-48b9-49a8-b549-ebc8553b7f96
vulnerability,CVE-2024-22667,vulnerability--d74be2fe-91bf-4135-8d59-1d3cd34038b3
vulnerability,CVE-2024-20004,vulnerability--609cf739-b275-4d7f-8b8c-da3d484db991
vulnerability,CVE-2024-20011,vulnerability--ff7bca5a-aa5f-4df6-b891-96245c50c526
vulnerability,CVE-2024-20007,vulnerability--976950a9-35b3-4a2c-8687-a67a9bbfc923
vulnerability,CVE-2024-20002,vulnerability--88ad76a8-843c-46e7-9c11-5452162a791d
vulnerability,CVE-2024-20012,vulnerability--2999f104-07e8-4515-bea0-15a697adc3f4
vulnerability,CVE-2024-20006,vulnerability--123a6329-47da-4604-aff1-3eed390e90aa
vulnerability,CVE-2024-20010,vulnerability--86230d74-abe1-42af-934e-c2cd440377c9
vulnerability,CVE-2024-20013,vulnerability--13362953-a0bd-4657-85c8-da01b15ed3e3
vulnerability,CVE-2024-20015,vulnerability--4c606075-53c6-4582-9132-37269853a77d
vulnerability,CVE-2024-20016,vulnerability--ff794bbf-a4a7-43e0-9df1-cc08f67b4b9d
vulnerability,CVE-2024-20001,vulnerability--91aa0b9d-055d-4e2c-af76-270f41ec8e91
vulnerability,CVE-2024-20009,vulnerability--6f271e11-c904-4a48-aed6-86be67f4d6f5
vulnerability,CVE-2024-20003,vulnerability--95cd3a3b-9cac-46d4-a524-7dd2e502994b
vulnerability,CVE-2024-1210,vulnerability--69239f81-c15e-47c8-9baf-75e77c61da8d
vulnerability,CVE-2024-1072,vulnerability--cc36d289-b46f-47d9-ab5c-ef79f0313318
vulnerability,CVE-2024-1208,vulnerability--0695da71-5390-4f69-a580-054a6f3441b0
vulnerability,CVE-2024-1121,vulnerability--3e1f8ebb-51de-46b1-a3b3-6a8a7397b638
vulnerability,CVE-2024-1046,vulnerability--663471cf-fae2-49ae-9488-c8e5db247fc3
vulnerability,CVE-2024-1092,vulnerability--539428b2-0f18-47a5-9841-00300a7aad34
vulnerability,CVE-2024-1075,vulnerability--f2460bf8-ae8b-4a5f-a0a8-7787c615ba6b
vulnerability,CVE-2024-1052,vulnerability--1fbbf783-a7a0-49c8-a682-9d471a70cfca
vulnerability,CVE-2024-1225,vulnerability--fba45991-1b96-43ad-93da-b799ca99b0f2
vulnerability,CVE-2024-1177,vulnerability--c16e39a8-d958-42aa-826d-dbbb0ff0f07f
vulnerability,CVE-2024-1209,vulnerability--eae8ff1f-4da7-4cc8-9ff3-c7addc8d5289
vulnerability,CVE-2024-23196,vulnerability--023fae25-3406-41c3-bff6-42ab12951a66
vulnerability,CVE-2024-23108,vulnerability--8995cf5c-4884-4179-bec0-db3f7def330e
vulnerability,CVE-2024-23054,vulnerability--e3672cff-ff6d-43bf-b4a7-764b4274355b
vulnerability,CVE-2024-23109,vulnerability--05dd5b68-0e44-4e51-82cd-acfb53838396
vulnerability,CVE-2024-23049,vulnerability--5f1d7595-9fd6-49d2-9659-bdb944d1c493
vulnerability,CVE-2024-0254,vulnerability--4edd132c-d6ac-4e86-aa39-31cfebc977ca
vulnerability,CVE-2024-0372,vulnerability--aeaed4c3-b788-446b-88b9-d759f47aaf5f
vulnerability,CVE-2024-0790,vulnerability--457aa9ce-2099-4332-9e2b-9ea8ec483292
vulnerability,CVE-2024-0585,vulnerability--3d970a61-5bee-49f3-916b-189b8d333f53
vulnerability,CVE-2024-0678,vulnerability--eaf81110-9ee8-4a1d-bc62-fa7afcc2491b
vulnerability,CVE-2024-0791,vulnerability--2af8c719-c111-424d-96cf-16e43a83abc7
vulnerability,CVE-2024-0597,vulnerability--73acc0f7-64ae-4f31-9c71-78f67b320dca
vulnerability,CVE-2024-0691,vulnerability--e68370f7-926d-4e55-92b7-8b7d1c6dd52e
vulnerability,CVE-2024-0969,vulnerability--3cd9d21a-849c-4ac7-8df1-baa034441052
vulnerability,CVE-2024-0834,vulnerability--b11196ae-c442-4289-863b-687d6f8a3be6
vulnerability,CVE-2024-0371,vulnerability--876ad71a-bd2c-4a00-974a-5ef4c17b7d0e
vulnerability,CVE-2024-0859,vulnerability--13c235af-6a9f-4946-b792-d17f9daeabba
vulnerability,CVE-2024-0509,vulnerability--cf1dad3d-0024-4edf-af74-fffceb747077
vulnerability,CVE-2024-0374,vulnerability--6f029672-0d01-4f72-a927-8ae6eab94dd3
vulnerability,CVE-2024-0323,vulnerability--9e53034f-870c-40ee-b19b-bcc66c542a39
vulnerability,CVE-2024-0954,vulnerability--1c5201b7-3a19-4b8f-a676-2d00f618b50e
vulnerability,CVE-2024-0384,vulnerability--a350e79a-f51c-4e98-824b-d725f1d4cf0c
vulnerability,CVE-2024-0797,vulnerability--0132b38c-8491-400a-ae36-c80a0b9ccae5
vulnerability,CVE-2024-0508,vulnerability--a5e5a5c8-a5a8-4363-aee4-3f8e316b8ba2
vulnerability,CVE-2024-0370,vulnerability--f69e9ce0-5f8c-42ec-98e4-4de81ea75f55
vulnerability,CVE-2024-0380,vulnerability--a7883dda-d067-40df-9cf3-e6a2dcccd6c3
vulnerability,CVE-2024-0699,vulnerability--dbb43ff8-a6f5-4d3a-9c26-40fbbf48db11
vulnerability,CVE-2024-0660,vulnerability--2514ce1f-36f7-4ef8-8bff-f37480c8f239
vulnerability,CVE-2024-0586,vulnerability--0528098b-aa25-437f-897b-3c5ac4cf62c5
vulnerability,CVE-2024-0701,vulnerability--f3e2015c-eb80-40c7-b598-38da6f8f40a0
vulnerability,CVE-2024-0324,vulnerability--ce5af52a-dc18-4525-b39c-181d30bbcbd6
vulnerability,CVE-2024-0373,vulnerability--c9dfdbf8-a6a1-43b0-9af7-00f43c3149f7
vulnerability,CVE-2024-0835,vulnerability--ea3bca84-7e19-4d5e-8972-c344f6a23e4e
vulnerability,CVE-2024-0964,vulnerability--b6e0258f-18f0-4465-b617-688fc07b2288
vulnerability,CVE-2024-0869,vulnerability--52bd5b14-c7f2-4eac-8242-f014eae5bf34
vulnerability,CVE-2024-0823,vulnerability--7d286061-c1e1-451c-9558-3b6193961565
vulnerability,CVE-2024-0612,vulnerability--389de116-61f6-48b5-b624-3f4884beb0d3
vulnerability,CVE-2024-0659,vulnerability--6cbebba5-23fc-4991-bb1b-540413673074
vulnerability,CVE-2024-0255,vulnerability--a7974965-9b4d-4f38-8f6e-b78f8e8b70d8
vulnerability,CVE-2024-0202,vulnerability--32e856f1-f953-4dbc-9b8b-e329867fbc39
vulnerability,CVE-2024-0953,vulnerability--f4079c11-cc23-4cbe-8252-a240f30c76fc
vulnerability,CVE-2024-0630,vulnerability--44dcbc6b-2fca-4292-bf9e-a0c82fe7330b
vulnerability,CVE-2024-0761,vulnerability--10986cfe-e44e-4d0d-b94d-beb896dfa3ee
vulnerability,CVE-2024-0668,vulnerability--9688691e-599b-4792-80c4-2565286f92d4
vulnerability,CVE-2024-0428,vulnerability--d4d8192e-b3a3-4b75-a15b-a8b9e6067604
vulnerability,CVE-2024-0382,vulnerability--10b511c7-2473-4e26-af74-f87e93322944
vulnerability,CVE-2024-0221,vulnerability--ca554faa-e45e-4565-be36-1c5942e4345f
vulnerability,CVE-2024-0709,vulnerability--5e5dc13e-3b79-49e4-8f6e-656530ed7a16
vulnerability,CVE-2024-0448,vulnerability--3e00ffb5-21e8-4390-80c7-3508e3a50001
vulnerability,CVE-2024-0796,vulnerability--37ccd8a2-58ec-4b95-8163-1b9b7d52456d
vulnerability,CVE-2024-0366,vulnerability--ffd60b3d-7884-499b-971e-0ce5726beb11
vulnerability,CVE-2024-0961,vulnerability--dc03bde0-13ff-432f-ad67-d47f29f96033
vulnerability,CVE-2024-24807,vulnerability--d31adabe-64d0-43bd-8924-5f54fdb66299
vulnerability,CVE-2024-24469,vulnerability--eaf1edf9-e904-49a5-b04a-614bf54e7cdb
vulnerability,CVE-2024-24595,vulnerability--76216138-a19a-4acd-a333-38394d43c488
vulnerability,CVE-2024-24258,vulnerability--7355410a-aea2-4796-9c54-680cd161efff
vulnerability,CVE-2024-24857,vulnerability--4acbbf0a-6964-444a-828e-390366bed339
vulnerability,CVE-2024-24265,vulnerability--82e996d8-b1d1-4b3d-9717-abc76a7b2ccf
vulnerability,CVE-2024-24259,vulnerability--a4113f71-f153-4358-80e8-91595a47a18b
vulnerability,CVE-2024-24865,vulnerability--9b80b51e-1116-40eb-a112-c0b5e630d5d1
vulnerability,CVE-2024-24397,vulnerability--7d0df243-cd46-44f1-a483-7b0b4fd83d80
vulnerability,CVE-2024-24846,vulnerability--dd602b14-cd79-40f5-a96d-9de98b863230
vulnerability,CVE-2024-24468,vulnerability--b2030243-9747-4a2d-b56e-8ddd3fb3001b
vulnerability,CVE-2024-24396,vulnerability--e529e1a2-cade-4aff-83e3-2ce026f37a3c
vulnerability,CVE-2024-24864,vulnerability--4908b9a3-77bd-4c87-89ba-dc49708509d7
vulnerability,CVE-2024-24847,vulnerability--2d048898-f3b3-4fac-998f-cd0222f860f1
vulnerability,CVE-2024-24768,vulnerability--b400d221-197b-42db-a6eb-fd64a2f428d8
vulnerability,CVE-2024-24870,vulnerability--b95d2db4-accd-413b-aff4-a937aa0e994a
vulnerability,CVE-2024-24267,vulnerability--1fa9f30d-2e5d-4937-b453-274a7895d19e
vulnerability,CVE-2024-24859,vulnerability--bbedad29-8642-4cdb-90fa-6d51b4e9b900
vulnerability,CVE-2024-24574,vulnerability--80630ceb-9f89-4dfa-8ba9-a8099d33e730
vulnerability,CVE-2024-24559,vulnerability--98cc7f9a-340d-4589-b157-0a47c7c8b1c6
vulnerability,CVE-2024-24266,vulnerability--0e439f8c-231b-40f1-9190-ed8b8c4908f0
vulnerability,CVE-2024-24838,vulnerability--b4a38aa2-a625-4314-a36c-6e363df474b1
vulnerability,CVE-2024-24848,vulnerability--697fb734-785f-4f0e-aabc-4e549053aaf7
vulnerability,CVE-2024-24762,vulnerability--d45f5fa4-f7ec-48b5-9e83-69ca74c46660
vulnerability,CVE-2024-24861,vulnerability--83390b43-81e9-4a29-ae7b-480c9d890f98
vulnerability,CVE-2024-24260,vulnerability--45885653-b9d2-4d0c-8c4e-ca74930fe53f
vulnerability,CVE-2024-24841,vulnerability--68d408c8-cb38-4c4a-bfee-a0545c9e7b34
vulnerability,CVE-2024-24860,vulnerability--b6c4f08e-c70f-4b9a-b092-4ba8ae636c1f
vulnerability,CVE-2024-24263,vulnerability--d720fb39-6900-4cd2-a7ad-f18be3058f5f
vulnerability,CVE-2024-24543,vulnerability--503a018a-f4b1-430e-b7c5-17597e2f2c56
vulnerability,CVE-2024-24855,vulnerability--84157b54-07fa-4063-b44e-df1674a1c005
vulnerability,CVE-2024-24262,vulnerability--076e8876-59e4-4bf5-904e-bf4c2acec8e7
vulnerability,CVE-2024-24839,vulnerability--be8035a5-4232-4427-95e0-e7fdb17c6974
vulnerability,CVE-2024-24866,vulnerability--e4dd8f92-726c-452e-bc8f-9575c0766b54
vulnerability,CVE-2024-24858,vulnerability--d20c9986-c8a2-4245-aecc-7ae47aa7bc44
vulnerability,CVE-2023-27318,vulnerability--a56ef54c-bf57-4dcc-9bb0-f60dc0c083e4
vulnerability,CVE-2023-4637,vulnerability--b2a13312-8a72-4261-b390-c17bd8ef2fdf
vulnerability,CVE-2023-22817,vulnerability--d661b83f-a86f-4350-8ec3-2c5c2b3069e0
vulnerability,CVE-2023-22819,vulnerability--7c9476b5-c598-47c4-b7a2-43e916b3db8c
vulnerability,CVE-2023-51951,vulnerability--745981f5-3a3c-44d2-90f2-9ff0e211961e
vulnerability,CVE-2023-51504,vulnerability--136872e3-6e21-40a1-a00a-9b5e009f036e
vulnerability,CVE-2023-34042,vulnerability--5e69ac13-574c-478e-8893-13f877e1de91
vulnerability,CVE-2023-7014,vulnerability--1e20f303-6112-45cc-af36-51d5b46f7008
vulnerability,CVE-2023-7077,vulnerability--71a9e2b1-d23e-40ac-89a5-b7d4622b6a17
vulnerability,CVE-2023-7029,vulnerability--e5958ae1-f11a-41e1-bf0b-5c83617321ee
vulnerability,CVE-2023-7216,vulnerability--49311c9c-7e15-4623-9446-c79052fca37c
vulnerability,CVE-2023-6953,vulnerability--642436a8-6f38-43f3-8fc6-f554ae9fddcd
vulnerability,CVE-2023-6557,vulnerability--97039530-3041-47e8-afde-0216cbfc699d
vulnerability,CVE-2023-6933,vulnerability--ac3aecec-e2db-4032-8bc5-b4029c6e52a9
vulnerability,CVE-2023-6700,vulnerability--78222c16-4457-4d51-b229-d93e14e3eb36
vulnerability,CVE-2023-6635,vulnerability--1078b4db-e543-406e-80ad-2dfe3282ec34
vulnerability,CVE-2023-6989,vulnerability--306fdc2d-2474-4ffc-be2f-e378365c9072
vulnerability,CVE-2023-6982,vulnerability--6ac68c92-7fe3-4439-9e62-59d6f2c4c726
vulnerability,CVE-2023-6701,vulnerability--8649d0f9-63b8-42b6-af36-982cdde3eb71
vulnerability,CVE-2023-6983,vulnerability--28cff72c-46ea-4ae7-a077-05c433b4e346
vulnerability,CVE-2023-6808,vulnerability--4dc034ce-3204-4c67-8cb5-87a0c758bad4
vulnerability,CVE-2023-6959,vulnerability--dfcb9f23-d467-4a04-b4c1-2bc4d10105e8
vulnerability,CVE-2023-6846,vulnerability--cb2acdbf-895c-488d-9694-e9be3e1a490c
vulnerability,CVE-2023-6996,vulnerability--1c1fd295-6d15-45f1-a187-ddf94ffb51a0
vulnerability,CVE-2023-6963,vulnerability--1c5e0941-a52f-4c49-a0e2-ed1ff05b98cd
vulnerability,CVE-2023-6925,vulnerability--ca697df3-82e9-4be5-9688-5114c4e29997
vulnerability,CVE-2023-6807,vulnerability--a6856bf8-fb69-46af-a6d2-431d7bc471cd
vulnerability,CVE-2023-6985,vulnerability--4204a0df-06cc-489a-b779-9aa2b65bdb5b
vulnerability,CVE-2023-6526,vulnerability--5c61caef-c984-4473-b24a-cebfdd13c402
vulnerability,CVE-2023-6884,vulnerability--1bcda52a-41e9-40d3-a0cf-c5be3c007f41
vulnerability,CVE-2023-6874,vulnerability--21b4f3cb-15ee-4ef5-85a2-a07158d7276c
vulnerability,CVE-2023-6028,vulnerability--57e7f272-10d9-47c1-bea4-9f0906a336a8
vulnerability,CVE-2023-52138,vulnerability--cf28305b-9721-43c5-9286-ab1a4250bb6a
vulnerability,CVE-2023-50782,vulnerability--b76e475e-8e85-488b-9fc3-b90f56f38864
vulnerability,CVE-2023-50781,vulnerability--69da1773-b818-4bb8-a635-6278edd63deb
vulnerability,CVE-2023-5677,vulnerability--ae81ec5d-656d-470b-8255-35ad884b962e
vulnerability,CVE-2023-5249,vulnerability--913e2355-e2be-45c7-bbc7-d6f8d29b6277
vulnerability,CVE-2023-5643,vulnerability--48ce542c-f207-4a3a-a799-1976ef2e6880
vulnerability,CVE-2023-5800,vulnerability--857315de-ed7a-4c15-9d6e-7d4fa1a0bcb8
vulnerability,CVE-2023-47355,vulnerability--cac7b192-dc57-464b-aecb-844600bf2114
vulnerability,CVE-2021-4436,vulnerability--bb8b0325-5006-4808-9e33-7584b0093450
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--607ed0b8-9110-4680-af27-6e4dc25ae6ac",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0132b38c-8491-400a-ae36-c80a0b9ccae5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-06T00:26:53.960718Z",
"modified": "2024-02-06T00:26:53.960718Z",
"name": "CVE-2024-0797",
"description": "The Active Products Tables for WooCommerce. Professional products tables for WooCommerce store plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several functions in all versions up to, and including, 1.0.6.1. This makes it possible for subscribers and higher to execute functions intended for admin use.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0797"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b610a116-db19-4088-a9fa-f4cdaed7c591",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--023fae25-3406-41c3-bff6-42ab12951a66",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-06T00:26:53.873259Z",
"modified": "2024-02-06T00:26:53.873259Z",
"name": "CVE-2024-23196",
"description": "A race condition was found in the Linux kernel's sound/hda device driver in snd_hdac_regmap_sync() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23196"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--97c01a4e-2104-4138-9cf1-0d3860fa618f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0528098b-aa25-437f-897b-3c5ac4cf62c5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-06T00:26:53.971715Z",
"modified": "2024-02-06T00:26:53.971715Z",
"name": "CVE-2024-0586",
"description": "The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Login/Register Element in all versions up to, and including, 5.9.4 due to insufficient input sanitization and output escaping on the custom login URL. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0586"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--43cd569e-a772-4118-9100-ff548dc7d17c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05dd5b68-0e44-4e51-82cd-acfb53838396",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-06T00:26:53.901565Z",
"modified": "2024-02-06T00:26:53.901565Z",
"name": "CVE-2024-23109",
"description": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23109"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e974648d-2e86-4033-957b-f716429f94b7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0695da71-5390-4f69-a580-054a6f3441b0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-06T00:26:53.852001Z",
"modified": "2024-02-06T00:26:53.852001Z",
"name": "CVE-2024-1208",
"description": "The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.2 via API. This makes it possible for unauthenticated attackers to obtain access to quiz questions.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1208"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--60a6539f-9ae0-4dd6-a121-73c3d3c9962b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--076e8876-59e4-4bf5-904e-bf4c2acec8e7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-06T00:26:54.091397Z",
"modified": "2024-02-06T00:26:54.091397Z",
"name": "CVE-2024-24262",
"description": "media-server v1.0.0 was discovered to contain a Use-After-Free (UAF) vulnerability via the sip_uac_stop_timer function at /uac/sip-uac-transaction.c.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24262"
}
]
}
]
}
Loading

0 comments on commit 3706441

Please sign in to comment.