diff --git a/mapping.csv b/mapping.csv index 21b4420a54..e0cdec49c6 100644 --- a/mapping.csv +++ b/mapping.csv @@ -255054,3 +255054,5 @@ vulnerability,CVE-2024-51998,vulnerability--a73807de-9048-42da-8953-9ad9ceb19898 vulnerability,CVE-2024-51987,vulnerability--4f936f10-64c7-45f2-8aef-631fa9e9d45a vulnerability,CVE-2024-47072,vulnerability--7d6c5968-f20c-4cc0-8034-cbc7c0971fe8 vulnerability,CVE-2024-8424,vulnerability--8da1c123-f7a4-44a2-bb9d-f97b46aa710a +vulnerability,CVE-2024-48011,vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1 +vulnerability,CVE-2024-45759,vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593 diff --git a/objects/vulnerability/vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json b/objects/vulnerability/vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json new file mode 100644 index 0000000000..ae2f9f9f96 --- /dev/null +++ b/objects/vulnerability/vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4a1b5eee-bab1-4df2-9044-4444bf6e7d2f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-08T03:23:07.944236Z", + "modified": "2024-11-08T03:23:07.944236Z", + "name": "CVE-2024-48011", + "description": "Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48011" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593.json b/objects/vulnerability/vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593.json new file mode 100644 index 0000000000..659218de8a --- /dev/null +++ b/objects/vulnerability/vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--077b2c26-ed37-482e-b55b-f62920292c89", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-08T03:23:08.096949Z", + "modified": "2024-11-08T03:23:08.096949Z", + "name": "CVE-2024-45759", + "description": "Dell PowerProtect Data Domain, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an escalation of privilege vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to unauthorized execution of certain commands to overwrite system config of the application. Exploitation may lead to denial of service of system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45759" + } + ] + } + ] +} \ No newline at end of file