From 2841b297754c668d6f9c7577c36fd5905fe7d5db Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Fri, 8 Nov 2024 03:23:37 +0000 Subject: [PATCH] generated content from 2024-11-08 --- mapping.csv | 2 ++ ...-ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json | 22 +++++++++++++++++++ ...-f6c3e495-ac92-4561-8343-1ba33c644593.json | 22 +++++++++++++++++++ 3 files changed, 46 insertions(+) create mode 100644 objects/vulnerability/vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json create mode 100644 objects/vulnerability/vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593.json diff --git a/mapping.csv b/mapping.csv index 21b4420a54..e0cdec49c6 100644 --- a/mapping.csv +++ b/mapping.csv @@ -255054,3 +255054,5 @@ vulnerability,CVE-2024-51998,vulnerability--a73807de-9048-42da-8953-9ad9ceb19898 vulnerability,CVE-2024-51987,vulnerability--4f936f10-64c7-45f2-8aef-631fa9e9d45a vulnerability,CVE-2024-47072,vulnerability--7d6c5968-f20c-4cc0-8034-cbc7c0971fe8 vulnerability,CVE-2024-8424,vulnerability--8da1c123-f7a4-44a2-bb9d-f97b46aa710a +vulnerability,CVE-2024-48011,vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1 +vulnerability,CVE-2024-45759,vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593 diff --git a/objects/vulnerability/vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json b/objects/vulnerability/vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json new file mode 100644 index 0000000000..ae2f9f9f96 --- /dev/null +++ b/objects/vulnerability/vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4a1b5eee-bab1-4df2-9044-4444bf6e7d2f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec6a23cb-38eb-4d3d-9df1-126b82d231c1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-08T03:23:07.944236Z", + "modified": "2024-11-08T03:23:07.944236Z", + "name": "CVE-2024-48011", + "description": "Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48011" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593.json b/objects/vulnerability/vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593.json new file mode 100644 index 0000000000..659218de8a --- /dev/null +++ b/objects/vulnerability/vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--077b2c26-ed37-482e-b55b-f62920292c89", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f6c3e495-ac92-4561-8343-1ba33c644593", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2024-11-08T03:23:08.096949Z", + "modified": "2024-11-08T03:23:08.096949Z", + "name": "CVE-2024-45759", + "description": "Dell PowerProtect Data Domain, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, and 7.7.5.50, contains an escalation of privilege vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to unauthorized execution of certain commands to overwrite system config of the application. Exploitation may lead to denial of service of system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45759" + } + ] + } + ] +} \ No newline at end of file