Skip to content

Commit

Permalink
generated content from 2024-09-05
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 5, 2024
1 parent 00378b6 commit 10e277a
Show file tree
Hide file tree
Showing 178 changed files with 4,071 additions and 0 deletions.
177 changes: 177 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -248144,3 +248144,180 @@ vulnerability,CVE-2024-6119,vulnerability--8b0b6611-d013-4b84-b5df-102cd3716472
vulnerability,CVE-2024-6343,vulnerability--500baed5-4cde-48b0-b1a7-509e0d94e7f1
vulnerability,CVE-2024-6232,vulnerability--c2621e6e-ff39-4bc9-8c99-4b67b61e044d
vulnerability,CVE-2023-49233,vulnerability--16aa053d-6a0f-4b44-a196-184d2be3a2f0
vulnerability,CVE-2024-44957,vulnerability--4016d9a1-237d-44c8-9011-bccbd5ec78e4
vulnerability,CVE-2024-44949,vulnerability--35186636-d995-44b8-bbc3-d791c82fc943
vulnerability,CVE-2024-44962,vulnerability--0a3914d2-357b-483f-9c5d-95fdcd6801a5
vulnerability,CVE-2024-44953,vulnerability--62375671-6685-455e-9512-a6747ee845b3
vulnerability,CVE-2024-44976,vulnerability--38e55648-02fb-4261-9c8d-4765ac5a1ada
vulnerability,CVE-2024-44964,vulnerability--3fa725be-0bf6-46dc-bdff-08851a7499d6
vulnerability,CVE-2024-44819,vulnerability--e22f1acd-392d-4dd9-baac-50c97586a870
vulnerability,CVE-2024-44965,vulnerability--eee64a26-430b-4c9e-8f73-18cf82468d0e
vulnerability,CVE-2024-44400,vulnerability--f3917da4-956f-43b1-ab11-7cba978bbdb7
vulnerability,CVE-2024-44951,vulnerability--71755cfd-e7d5-4b1d-af99-f3210407cd1b
vulnerability,CVE-2024-44997,vulnerability--5b507624-0fbf-40fe-ab5b-1bd2499b0c6f
vulnerability,CVE-2024-44993,vulnerability--e6ef725e-4126-4cf9-9d16-e2eaee0473fe
vulnerability,CVE-2024-44980,vulnerability--fd23f71e-ee5d-4576-9717-c9a46faf4322
vulnerability,CVE-2024-44971,vulnerability--c60080f0-e42c-411b-afbd-df190a1323c4
vulnerability,CVE-2024-44818,vulnerability--3a238bcd-49a1-4390-bcce-84005b3f18f5
vulnerability,CVE-2024-44988,vulnerability--6f7bc1bd-b930-465b-ac00-c1ce55fc28ff
vulnerability,CVE-2024-44982,vulnerability--b987ec50-e74e-4dfe-af11-637a1fb2c0e5
vulnerability,CVE-2024-44999,vulnerability--6ad339e3-2259-4a72-adcd-0f06faf2143a
vulnerability,CVE-2024-44808,vulnerability--e5f543b0-93df-4a21-b490-d5da9f5fe672
vulnerability,CVE-2024-44956,vulnerability--47d218dd-fbb1-49f9-8335-3d871fcfe5d5
vulnerability,CVE-2024-44969,vulnerability--8475c9d7-8105-44ce-b3a7-af6599c39979
vulnerability,CVE-2024-44966,vulnerability--05f9439e-236c-4d8b-b4b0-13db1bc3dcb0
vulnerability,CVE-2024-44959,vulnerability--8046485b-6435-4304-bcc8-14575663a077
vulnerability,CVE-2024-44948,vulnerability--c10d692c-9c21-4381-b49d-1abb6c11a93f
vulnerability,CVE-2024-44986,vulnerability--c4874c95-a507-4f2a-bda3-039011503273
vulnerability,CVE-2024-44820,vulnerability--26a33fb6-51ff-4733-a5f9-bba75a77adfe
vulnerability,CVE-2024-44977,vulnerability--36666ae3-4ea0-44a2-8b66-d0da44d08dea
vulnerability,CVE-2024-44383,vulnerability--670c24fd-942f-46f5-97eb-3dd47a891fb8
vulnerability,CVE-2024-44975,vulnerability--5819866c-05da-49dd-8204-a8e5d4cb7dbf
vulnerability,CVE-2024-44984,vulnerability--d5b660c1-0893-4a7c-9e68-876fb8d222d0
vulnerability,CVE-2024-44955,vulnerability--6c190049-1f81-462c-8467-3c30ac646d23
vulnerability,CVE-2024-44963,vulnerability--105d57bb-fcfc-4dbb-a060-5e3a951c502a
vulnerability,CVE-2024-44981,vulnerability--c2e4f360-63ce-4a1e-8ee4-752f64117b74
vulnerability,CVE-2024-44952,vulnerability--7e5410d3-8403-4d96-9976-99118bcbb0ba
vulnerability,CVE-2024-44994,vulnerability--19f795cf-12d1-48b3-a448-6f9fd3f43bf0
vulnerability,CVE-2024-44985,vulnerability--d7a7322f-005d-4299-a5ee-c2ff2207fc1e
vulnerability,CVE-2024-44961,vulnerability--9f7f7206-1389-407d-ab2a-395607fcb239
vulnerability,CVE-2024-44821,vulnerability--222a63ea-2d05-40c5-8ee0-30791a718e0c
vulnerability,CVE-2024-44859,vulnerability--6028fb8b-3b78-4dfe-a7c8-bdb2f7120289
vulnerability,CVE-2024-44989,vulnerability--31efa31e-4c24-404e-b519-9102439a41c0
vulnerability,CVE-2024-44979,vulnerability--0a0269fb-fa83-408f-8eb7-5226ac71625d
vulnerability,CVE-2024-44968,vulnerability--72f0baba-580c-4955-adb2-5fb5cbce664a
vulnerability,CVE-2024-44990,vulnerability--661f662e-b46c-40d1-8882-daa809efe7ad
vulnerability,CVE-2024-44974,vulnerability--5d9c6ed1-2b4c-4149-b17a-905f73fc6d19
vulnerability,CVE-2024-44992,vulnerability--30df9cea-840f-48df-acfc-9db0d58e5e50
vulnerability,CVE-2024-44954,vulnerability--72149dcc-988a-4254-a969-7fee36f31df8
vulnerability,CVE-2024-44967,vulnerability--59fb98cb-39e5-45d8-b2b4-4dbf14cc437e
vulnerability,CVE-2024-44983,vulnerability--fb8919da-aca1-4360-8047-1f5764fbadc8
vulnerability,CVE-2024-44958,vulnerability--fb4516e8-8c9f-462d-8736-7feb8bcb4070
vulnerability,CVE-2024-44817,vulnerability--9de16b29-97ad-4aa7-a230-171fecc02cab
vulnerability,CVE-2024-44995,vulnerability--7df677b4-0bcc-4d71-b363-ad5ff4ae5ebd
vulnerability,CVE-2024-44960,vulnerability--b547f751-1b4a-4aa5-bc24-2656e888a65a
vulnerability,CVE-2024-44996,vulnerability--076988e3-2c79-4148-bed3-3ec7d6250b2c
vulnerability,CVE-2024-44991,vulnerability--2d3d2c00-294e-4a6b-8395-aa6f915bfbdf
vulnerability,CVE-2024-44972,vulnerability--14f0f73b-3658-4ece-be41-0444d782f8a6
vulnerability,CVE-2024-44987,vulnerability--9e6b3f08-fe15-4604-b352-2a1bb74b4eb6
vulnerability,CVE-2024-44998,vulnerability--fe63ff0a-a1c3-48dc-b6ef-fb40ead2f0b4
vulnerability,CVE-2024-44950,vulnerability--13579950-3ee5-4c1f-9200-1297b9f93e60
vulnerability,CVE-2024-44978,vulnerability--429df43a-4457-4056-8fb8-e099f68a53b8
vulnerability,CVE-2024-44970,vulnerability--ca1fbf6b-ba2b-4510-a6c5-13ecd5c5e221
vulnerability,CVE-2024-44973,vulnerability--be991b75-b1cf-4b65-8eed-93582efc60c5
vulnerability,CVE-2024-6926,vulnerability--ad804364-65ec-4777-826f-67c89a5b79e9
vulnerability,CVE-2024-6888,vulnerability--6aa3255a-9d3f-4a83-8a3a-a6d866cc6072
vulnerability,CVE-2024-6722,vulnerability--1c578baa-767a-472f-b8cd-1ba031e939f1
vulnerability,CVE-2024-6889,vulnerability--6adeeb77-7632-4736-b79c-5a9d301b586b
vulnerability,CVE-2024-6020,vulnerability--7517301c-ce35-4fd6-903f-cd9d2afe3f03
vulnerability,CVE-2024-42039,vulnerability--305a87a6-eb67-46f1-86b0-1e4dff1a7ba2
vulnerability,CVE-2024-42642,vulnerability--00cc8cfd-1707-4c22-a6d3-a91cf419d87b
vulnerability,CVE-2024-20503,vulnerability--7cf2dfb7-8390-48bc-806d-59699c4ed3f9
vulnerability,CVE-2024-20505,vulnerability--2fba7ef6-7db2-4ffd-808e-8b9020cc334d
vulnerability,CVE-2024-20469,vulnerability--ca4f28a3-fe4b-46a6-af83-0d14d02cdbe3
vulnerability,CVE-2024-20497,vulnerability--7c7aae01-c131-4261-8a13-c1c652ae7ed7
vulnerability,CVE-2024-20439,vulnerability--60558e66-83a5-4906-8a6f-55cb95cab72a
vulnerability,CVE-2024-20506,vulnerability--51b2455d-d127-465f-9da1-c6f2c785535a
vulnerability,CVE-2024-20440,vulnerability--ece4760d-da14-4bf6-907d-ddf18d1d7781
vulnerability,CVE-2024-8325,vulnerability--91957e58-a976-4af9-bfc1-b617d04873a0
vulnerability,CVE-2024-8119,vulnerability--bd601f0c-5d56-40df-9967-f37f185d1e4a
vulnerability,CVE-2024-8416,vulnerability--56d58479-e006-4cbb-993b-09da76eac40d
vulnerability,CVE-2024-8102,vulnerability--e76cc310-3ec6-4d8d-af63-23fb23ea8f1d
vulnerability,CVE-2024-8409,vulnerability--87e5ca26-753a-456e-9c33-2728bae188b0
vulnerability,CVE-2024-8117,vulnerability--2075d1c3-c139-42d0-a3cb-611d56285bf0
vulnerability,CVE-2024-8106,vulnerability--3cf0caed-c0be-4a03-ab19-0797cb27b20b
vulnerability,CVE-2024-8121,vulnerability--0c000f7d-0754-4cce-8330-b8aa521c4cfa
vulnerability,CVE-2024-8410,vulnerability--8723e4c3-e379-4157-9f84-38bf7c24cfac
vulnerability,CVE-2024-8415,vulnerability--46fd8673-a3e6-49dc-8cf2-37e2d28d37d0
vulnerability,CVE-2024-8417,vulnerability--7dcdd964-6fb4-4e35-88be-d1d8c7419bee
vulnerability,CVE-2024-8412,vulnerability--5abb03a3-e8be-4c85-a63c-6dedc2d7ebd8
vulnerability,CVE-2024-8408,vulnerability--9443176e-dbb0-4f2c-a51a-2c6633c344f9
vulnerability,CVE-2024-8289,vulnerability--7d46ad56-740e-43b9-8d5d-01756e36e132
vulnerability,CVE-2024-8123,vulnerability--61cdf83b-2434-4d8f-8500-52a6a4ca9e55
vulnerability,CVE-2024-8411,vulnerability--1a64c8bd-dab8-4cd6-8f13-34fab8f6ded1
vulnerability,CVE-2024-8418,vulnerability--b0d3815e-6d70-42ab-ba15-fda7e1013664
vulnerability,CVE-2024-8318,vulnerability--578a2215-eedb-4f73-98f1-770ff5c3fc7e
vulnerability,CVE-2024-8391,vulnerability--f59854db-1e03-487f-afb2-4b72c3d215f9
vulnerability,CVE-2024-8298,vulnerability--6884c0fa-0d3f-4923-bd07-36d06b5dfc59
vulnerability,CVE-2024-8407,vulnerability--aadf2efe-6b81-4e0f-b5d9-4b8338a5c153
vulnerability,CVE-2024-8414,vulnerability--78751ec4-d04a-44bc-b05c-45f5f35ef9f8
vulnerability,CVE-2024-8104,vulnerability--1c7104cf-8564-4c57-bc44-7441fa822249
vulnerability,CVE-2024-8413,vulnerability--aa1bf261-8185-40b7-9661-4b5c1b5e160b
vulnerability,CVE-2024-39921,vulnerability--adba3f73-a259-4dab-9540-10b84f0a75ea
vulnerability,CVE-2024-34640,vulnerability--1841d0c4-1de7-477f-bcb8-3d1827a72d72
vulnerability,CVE-2024-34655,vulnerability--4fa02f7a-1f97-4d00-a9e4-289441dbad29
vulnerability,CVE-2024-34645,vulnerability--97c1917e-9724-4e42-b651-cfda6650b477
vulnerability,CVE-2024-34641,vulnerability--063fdefd-deb9-4182-bca3-3dd55797df7d
vulnerability,CVE-2024-34649,vulnerability--82f5dfe8-300a-40b5-8684-229cbb47d94d
vulnerability,CVE-2024-34653,vulnerability--f41fccf0-73cf-42d0-82bb-1962dd92a30c
vulnerability,CVE-2024-34656,vulnerability--8894554b-6451-4dde-898f-33e01adea865
vulnerability,CVE-2024-34648,vulnerability--406771c5-fa6b-4e54-a2ad-9babf9c7d359
vulnerability,CVE-2024-34658,vulnerability--19428281-13e3-431a-bf45-6657fef78c50
vulnerability,CVE-2024-34661,vulnerability--29ce0093-6203-4be2-8e17-37ec0ff2dfb9
vulnerability,CVE-2024-34659,vulnerability--b86c9195-aa1e-47c7-84ef-e4f910b4e1ac
vulnerability,CVE-2024-34647,vulnerability--5b48ffa3-c4fa-49ac-887e-43fb42651922
vulnerability,CVE-2024-34660,vulnerability--3954fcef-258b-400a-9808-57e711a48d46
vulnerability,CVE-2024-34642,vulnerability--e468470b-d0fe-406d-aed7-a73b1886f3df
vulnerability,CVE-2024-34643,vulnerability--de444fd2-5393-48de-a619-b45831c92fb3
vulnerability,CVE-2024-34646,vulnerability--506cfc90-0cc0-4e2e-857c-3939186ad12e
vulnerability,CVE-2024-34638,vulnerability--a2f509f4-d3bf-4613-a8cd-90759c64b811
vulnerability,CVE-2024-34654,vulnerability--8a2d8bda-3d10-43e7-ae82-9776ae3d546c
vulnerability,CVE-2024-34651,vulnerability--f86c1ea8-4080-4b8c-9d24-cfb204261d13
vulnerability,CVE-2024-34652,vulnerability--f541039f-e729-4309-a438-546545ba77a1
vulnerability,CVE-2024-34644,vulnerability--bae4d3ad-bc58-4ce6-9edd-d05c959ed243
vulnerability,CVE-2024-34657,vulnerability--0fc045a6-bb74-4f38-9bc0-f8d4f60ae9d0
vulnerability,CVE-2024-34639,vulnerability--b9cdea19-6fe2-4144-a61e-56f7ed75b72c
vulnerability,CVE-2024-34637,vulnerability--90c4ba99-3b06-47e3-8eb5-c8e402476c5e
vulnerability,CVE-2024-34650,vulnerability--df9bc0a9-3951-41f4-bee5-2340f9b6ace0
vulnerability,CVE-2024-7950,vulnerability--701caa6f-bbca-4df4-a24f-039f5753c2b0
vulnerability,CVE-2024-7786,vulnerability--95885127-ba25-463c-9dcf-a224e99ee4f7
vulnerability,CVE-2024-7834,vulnerability--0c4da37a-7e39-4f84-a986-564e00e7b1fb
vulnerability,CVE-2024-7012,vulnerability--fee3def9-f5e8-4ff5-8d46-623c11e3cbe0
vulnerability,CVE-2024-7870,vulnerability--3a241fa1-1f32-46dd-8049-e15d18902a10
vulnerability,CVE-2024-7077,vulnerability--a89355b4-f854-4dca-b691-e7b9874dd817
vulnerability,CVE-2024-7078,vulnerability--66728ef5-9753-459f-b769-872ea2d9f747
vulnerability,CVE-2024-7076,vulnerability--583a3156-07c7-41b8-93c4-6e62574a0204
vulnerability,CVE-2024-7923,vulnerability--b2c868fa-5a13-4c19-9476-d15060c531e5
vulnerability,CVE-2024-41716,vulnerability--9fa38d99-14a7-4829-9599-1ff74fcc8f30
vulnerability,CVE-2024-41927,vulnerability--6df8067e-42c3-4674-9f5c-45f313c850e2
vulnerability,CVE-2024-43402,vulnerability--cb4648d5-93c7-48c9-bbaa-bd146cc85a95
vulnerability,CVE-2024-43853,vulnerability--907c0407-dd19-4597-886b-e15c21cbe50c
vulnerability,CVE-2024-43405,vulnerability--d38a3450-4a60-4c13-b053-6aa5ac0d25bb
vulnerability,CVE-2024-2166,vulnerability--066db537-d1c2-4559-a463-6556c58d7802
vulnerability,CVE-2024-45443,vulnerability--03ebf39d-9a6e-4ee9-971b-1dbadab3a091
vulnerability,CVE-2024-45692,vulnerability--aafd1188-971b-492c-855a-1bdf3e83f1d5
vulnerability,CVE-2024-45050,vulnerability--bd507e96-fd5f-49a9-b4a0-b28f1abaa28a
vulnerability,CVE-2024-45447,vulnerability--a1d3a653-c1ca-4e98-b521-4cdbf3732213
vulnerability,CVE-2024-45008,vulnerability--740d8372-06c3-4ae1-843c-572255b22c04
vulnerability,CVE-2024-45170,vulnerability--9e78453b-2cb0-449d-98f5-cd6b23c10ffe
vulnerability,CVE-2024-45006,vulnerability--1ffcda4a-a517-44b7-a87f-f24472e6d09e
vulnerability,CVE-2024-45172,vulnerability--9b0876fd-c929-4c4e-9053-54342939e639
vulnerability,CVE-2024-45003,vulnerability--6a836865-2375-4eb2-b84e-f029cc9d9577
vulnerability,CVE-2024-45001,vulnerability--9a4d8584-4a33-42b8-ba30-1d7c29cc5814
vulnerability,CVE-2024-45506,vulnerability--06d0a43b-a15f-4c11-b374-2caac892ba6d
vulnerability,CVE-2024-45449,vulnerability--258bdce2-db18-4bc7-9eaf-651e924ab1c4
vulnerability,CVE-2024-45450,vulnerability--ebf66ec6-c8ed-4c66-8360-099e88894f59
vulnerability,CVE-2024-45314,vulnerability--424c96bb-52a7-4ccb-a2ed-c07ced8282d5
vulnerability,CVE-2024-45052,vulnerability--a4abbf45-ad4e-4aae-b693-55935ee31dc9
vulnerability,CVE-2024-45399,vulnerability--e08c55db-0ea1-4d86-bada-41e04be323a9
vulnerability,CVE-2024-45177,vulnerability--99059bed-1301-4d90-bb0d-483e6f19fcab
vulnerability,CVE-2024-45507,vulnerability--f3e6cb8e-a7d5-4b26-a1b7-e073b5228a4f
vulnerability,CVE-2024-45004,vulnerability--6a5ce122-621b-4d23-a18b-b084c48092ff
vulnerability,CVE-2024-45195,vulnerability--d4f13b5a-29ff-4352-8bcf-309aca22fdf8
vulnerability,CVE-2024-45076,vulnerability--e6e6bcb7-cb8e-4eae-b215-214f65d49b61
vulnerability,CVE-2024-45005,vulnerability--08fe4833-f3e4-41c5-b647-08ffd6c6504c
vulnerability,CVE-2024-45444,vulnerability--0ce6d1b4-5de1-4d33-8dec-2eeedf6c217c
vulnerability,CVE-2024-45446,vulnerability--726b9970-4280-4af6-a00c-588953194f72
vulnerability,CVE-2024-45007,vulnerability--fa7e00ae-173d-469a-a8c7-c21433711c52
vulnerability,CVE-2024-45429,vulnerability--6e1ef55d-9c74-4bb9-b201-a6c688f22a22
vulnerability,CVE-2024-45053,vulnerability--1d07e766-fe7c-4adf-aaca-0ae26c904209
vulnerability,CVE-2024-45174,vulnerability--a9390f3f-9b45-4ff8-b943-7a9ff86f1d64
vulnerability,CVE-2024-45441,vulnerability--9d85f7dc-25a8-4b12-8035-7bb07a315b6a
vulnerability,CVE-2024-45074,vulnerability--14e4fca4-5d98-4ac8-a42b-052ef1d7cdf0
vulnerability,CVE-2024-45002,vulnerability--18485a36-31f6-49fc-aebb-e0f41363542a
vulnerability,CVE-2024-45395,vulnerability--58a6c61c-d958-4646-9a48-3561840fe98b
vulnerability,CVE-2024-45448,vulnerability--44b9caba-984b-4901-ad46-79c1f20ecdfb
vulnerability,CVE-2024-45075,vulnerability--aac05c24-1b97-43ec-bccf-96802f013d86
vulnerability,CVE-2024-45442,vulnerability--6d148919-b744-4279-87de-a7477ca5b36f
vulnerability,CVE-2024-45000,vulnerability--308e7756-305b-4fc9-891c-aac0c97df13c
vulnerability,CVE-2024-45445,vulnerability--18bc1acc-188f-40d7-a09e-4522c09ff04c
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e7aad53c-655d-40c3-a2e0-4ce0b72558aa",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00cc8cfd-1707-4c22-a6d3-a91cf419d87b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-05T00:19:27.535855Z",
"modified": "2024-09-05T00:19:27.535855Z",
"name": "CVE-2024-42642",
"description": "Micron Crucial MX500 Series Solid State Drives M3CR046 is vulnerable to Buffer Overflow, which can be triggered by sending specially crafted ATA packets from the host to the drive controller.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42642"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4985ec69-b07a-44f3-b13b-fd8f2a15a437",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03ebf39d-9a6e-4ee9-971b-1dbadab3a091",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-05T00:19:28.991171Z",
"modified": "2024-09-05T00:19:28.991171Z",
"name": "CVE-2024-45443",
"description": "Directory traversal vulnerability in the cust module\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-45443"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--01603d4b-9f70-49aa-a99a-48cb8e562987",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05f9439e-236c-4d8b-b4b0-13db1bc3dcb0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-05T00:19:27.153067Z",
"modified": "2024-09-05T00:19:27.153067Z",
"name": "CVE-2024-44966",
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinfmt_flat: Fix corruption when not offsetting data start\n\nCommit 04d82a6d0881 (\"binfmt_flat: allow not offsetting data start\")\nintroduced a RISC-V specific variant of the FLAT format which does\nnot allocate any space for the (obsolete) array of shared library\npointers. However, it did not disable the code which initializes the\narray, resulting in the corruption of sizeof(long) bytes before the DATA\nsegment, generally the end of the TEXT segment.\n\nIntroduce MAX_SHARED_LIBS_UPDATE which depends on the state of\nCONFIG_BINFMT_FLAT_NO_DATA_START_OFFSET to guard the initialization of\nthe shared library pointer region so that it will only be initialized\nif space is reserved for it.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-44966"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0919598a-2075-4fd9-930a-39283e58db3b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--063fdefd-deb9-4182-bca3-3dd55797df7d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-05T00:19:28.490631Z",
"modified": "2024-09-05T00:19:28.490631Z",
"name": "CVE-2024-34641",
"description": "Improper Export of Android Application Components in FeliCaTest prior to SMR Sep-2024 Release 1 allows local attackers to enable NFC configuration.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-34641"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0108d686-b353-424d-94cf-5af915bd4695",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--066db537-d1c2-4559-a463-6556c58d7802",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-09-05T00:19:28.949735Z",
"modified": "2024-09-05T00:19:28.949735Z",
"name": "CVE-2024-2166",
"description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Forcepoint Email Security (Real Time Monitor modules) allows Reflected XSS.This issue affects Email Security: before 8.5.5 HF003.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-2166"
}
]
}
]
}
Loading

0 comments on commit 10e277a

Please sign in to comment.