Skip to content

Commit

Permalink
generated content from 2025-01-23
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 23, 2025
1 parent 692d77b commit 69f6a0c
Show file tree
Hide file tree
Showing 38 changed files with 851 additions and 0 deletions.
37 changes: 37 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -264609,3 +264609,40 @@ vulnerability,CVE-2025-24460,vulnerability--78b7f111-a50d-4d4a-b60b-67bd33bc82d6
vulnerability,CVE-2025-24461,vulnerability--948a7597-75c8-4eda-b579-0639a3993671
vulnerability,CVE-2025-24012,vulnerability--aa4d0da7-bb78-4f43-8509-19e26772c46e
vulnerability,CVE-2025-24457,vulnerability--1b772270-f6c7-4db9-8256-8c7c493730c5
vulnerability,CVE-2024-34235,vulnerability--edeb49e2-65d1-466c-a183-a4ba1d3799f2
vulnerability,CVE-2024-56923,vulnerability--76290d7b-7b9b-4367-af39-3edd57749ab3
vulnerability,CVE-2024-56914,vulnerability--00fa2ef8-5f69-4a06-b19a-201f7e4db423
vulnerability,CVE-2024-56924,vulnerability--d89a9009-b085-4fa2-9dde-4c8009a5024f
vulnerability,CVE-2024-42013,vulnerability--2754e085-b695-41fb-a039-69c8629574ab
vulnerability,CVE-2024-42012,vulnerability--a885d2f2-5dd0-4424-8a9d-07deda43d3f3
vulnerability,CVE-2024-55488,vulnerability--5bd5ba93-78d4-4a5c-bee4-6e598550bc04
vulnerability,CVE-2024-55957,vulnerability--a041d906-6bfc-40b6-8c96-d0b3023dc3d1
vulnerability,CVE-2024-24430,vulnerability--d9d003fd-e6bc-4653-bcdc-2ec3b0fc6ea4
vulnerability,CVE-2024-24429,vulnerability--9230a447-f93c-48d7-971c-4c5f73798b47
vulnerability,CVE-2024-24432,vulnerability--616abcdc-95c6-46c5-9275-7384c0e02271
vulnerability,CVE-2023-36998,vulnerability--3dbd6b3a-4ffc-4597-9c91-1a29fa29b8d2
vulnerability,CVE-2023-37013,vulnerability--2dc8b479-505f-4579-877e-7d4a20e3dbaf
vulnerability,CVE-2023-37017,vulnerability--85df8f34-68ea-47a2-8d19-e6c901aa1c04
vulnerability,CVE-2023-37016,vulnerability--00cf0042-690f-4db6-827c-6e8ce939daa2
vulnerability,CVE-2023-37020,vulnerability--3653a010-ed20-4bce-acad-a8dcc3375120
vulnerability,CVE-2023-37018,vulnerability--2e8d9a08-b385-4a24-8923-13b0a462cf48
vulnerability,CVE-2023-37008,vulnerability--ee67ae95-9d70-46bb-bb2c-b43253f33f4e
vulnerability,CVE-2023-37022,vulnerability--6979ae47-3b6c-441e-802a-7ee28dcdbb8f
vulnerability,CVE-2023-37012,vulnerability--e7578fdc-01ad-48c7-bfa9-f1e34791826c
vulnerability,CVE-2023-37006,vulnerability--55589396-084a-4a5c-92a6-434f6fd933a6
vulnerability,CVE-2023-37015,vulnerability--ba1678f2-f370-4a9d-813c-ed4018a88adf
vulnerability,CVE-2023-37021,vulnerability--44e05092-b620-45ac-ac41-7beac75aa6dd
vulnerability,CVE-2023-37002,vulnerability--6106d275-297d-4639-bbf3-e0a4ab1ea139
vulnerability,CVE-2023-37011,vulnerability--457c9f78-e105-4062-8597-386b36351157
vulnerability,CVE-2023-37010,vulnerability--57088e5a-5114-4e8a-befb-be33858fea7d
vulnerability,CVE-2023-37003,vulnerability--152d9cb5-134b-4d7b-a6f7-ebea18531dc9
vulnerability,CVE-2023-37005,vulnerability--992a6abb-d3b8-4456-8dbb-94fbe9377f02
vulnerability,CVE-2023-37009,vulnerability--1bc817b9-1cb6-4a76-9bbb-bc8cf1ad296f
vulnerability,CVE-2023-37014,vulnerability--981ba483-b76e-48ac-9b5a-0a205cf604c8
vulnerability,CVE-2023-37023,vulnerability--89269e8d-0655-4c35-a9da-9c2255f68a2a
vulnerability,CVE-2023-37019,vulnerability--e031dfb5-6348-49cc-8d69-9b1db8327fc2
vulnerability,CVE-2023-37777,vulnerability--ff0e8b30-de10-4e53-bbfc-ea1562bd39ac
vulnerability,CVE-2023-37004,vulnerability--26b6b0f2-72d8-46fe-b107-a3d3cd544582
vulnerability,CVE-2023-37007,vulnerability--dd29e8f0-c65d-496a-8195-138ff66a6dfa
vulnerability,CVE-2025-22980,vulnerability--2ea6dd6c-cf5a-4584-895d-7586c9dce80d
vulnerability,CVE-2025-0625,vulnerability--ce4b6e5c-de0e-486d-bbe3-1f277a0fd4b5
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--48bee5bd-27da-4b00-89d1-b3f65c70f541",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00cf0042-690f-4db6-827c-6e8ce939daa2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.783768Z",
"modified": "2025-01-23T00:19:18.783768Z",
"name": "CVE-2023-37016",
"description": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37016"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d28a044b-ab0f-4002-a972-69297803c733",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00fa2ef8-5f69-4a06-b19a-201f7e4db423",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:13.791754Z",
"modified": "2025-01-23T00:19:13.791754Z",
"name": "CVE-2024-56914",
"description": "D-Link DSL-3782 v1.01 is vulnerable to Buffer Overflow in /New_GUI/ParentalControl.asp.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-56914"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a2f336f6-3276-4731-a8da-bc47e98d7073",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--152d9cb5-134b-4d7b-a6f7-ebea18531dc9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.818083Z",
"modified": "2025-01-23T00:19:18.818083Z",
"name": "CVE-2023-37003",
"description": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `E-RAB Setup Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37003"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8eccedc3-d3f8-42f8-ba37-e2b035bc0947",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1bc817b9-1cb6-4a76-9bbb-bc8cf1ad296f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.825761Z",
"modified": "2025-01-23T00:19:18.825761Z",
"name": "CVE-2023-37009",
"description": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Notification` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37009"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--780f8b01-6db7-40fd-ba84-e3134599bbdb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--26b6b0f2-72d8-46fe-b107-a3d3cd544582",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.843567Z",
"modified": "2025-01-23T00:19:18.843567Z",
"name": "CVE-2023-37004",
"description": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial Context Setup Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37004"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c5a42db9-2670-4900-ac9e-1a114c2ae51c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2754e085-b695-41fb-a039-69c8629574ab",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:14.147369Z",
"modified": "2025-01-23T00:19:14.147369Z",
"name": "CVE-2024-42013",
"description": "In GRAU DATA Blocky before 3.1, Blocky-Gui has a Client-Side Enforcement of Server-Side Security vulnerability. An attacker with Windows administrative or debugging privileges can patch a binary in memory or on disk to bypass the password login requirement and gain full access to all functions of the program.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42013"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--35ace6bb-e26e-4942-8a30-90ae60b7299d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2dc8b479-505f-4579-877e-7d4a20e3dbaf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.770415Z",
"modified": "2025-01-23T00:19:18.770415Z",
"name": "CVE-2023-37013",
"description": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a sufficiently large ASN.1 packet over the S1AP interface. An attacker may repeatedly send such an oversized packet to cause the `ogs_sctp_recvmsg` routine to reach an unexpected network state and crash, leading to denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37013"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--513ee71a-c18c-44b2-a262-1918f765c8cd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2e8d9a08-b385-4a24-8923-13b0a462cf48",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.79636Z",
"modified": "2025-01-23T00:19:18.79636Z",
"name": "CVE-2023-37018",
"description": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Capability Info Indication` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37018"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0bf9c824-4d25-4833-9eb1-4c2077bff599",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2ea6dd6c-cf5a-4584-895d-7586c9dce80d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:23.342036Z",
"modified": "2025-01-23T00:19:23.342036Z",
"name": "CVE-2025-22980",
"description": "A SQL Injection vulnerability exists in Senayan Library Management System SLiMS 9 Bulian 9.6.1 via the tempLoanID parameter in the loan form on /admin/modules/circulation/loan.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-22980"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1d3bf710-db37-40c8-ab69-425d7ce31b23",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3653a010-ed20-4bce-acad-a8dcc3375120",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.793344Z",
"modified": "2025-01-23T00:19:18.793344Z",
"name": "CVE-2023-37020",
"description": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Release Complete` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37020"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b478cddd-3432-4f5e-b83a-aed65fb3aeb7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3dbd6b3a-4ffc-4597-9c91-1a29fa29b8d2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.300196Z",
"modified": "2025-01-23T00:19:18.300196Z",
"name": "CVE-2023-36998",
"description": "The NextEPC MME <= 1.0.1 (fixed in commit a8492c9c5bc0a66c6999cb5a263545b32a4109df) contains a stack-based buffer overflow vulnerability in the Emergency Number List decoding method. An attacker may send a NAS message containing an oversized Emergency Number List value to the MME to overwrite the stack with arbitrary bytes. An attacker with a cellphone connection to any base station managed by the MME may exploit this vulnerability without having to authenticate with the LTE core.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-36998"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6f774965-5be6-4dc4-a34e-641a4c5ef0d3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--44e05092-b620-45ac-ac41-7beac75aa6dd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.809143Z",
"modified": "2025-01-23T00:19:18.809143Z",
"name": "CVE-2023-37021",
"description": "Open5GS MME version <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Modification Failure` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37021"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1a00e744-1571-4c88-9673-76cc2595ac47",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--457c9f78-e105-4062-8597-386b36351157",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.812558Z",
"modified": "2025-01-23T00:19:18.812558Z",
"name": "CVE-2023-37011",
"description": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Required` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37011"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5c1c9bb2-8a3c-45f6-854b-2b989d478b99",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--55589396-084a-4a5c-92a6-434f6fd933a6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-23T00:19:18.806648Z",
"modified": "2025-01-23T00:19:18.806648Z",
"name": "CVE-2023-37006",
"description": "Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `Handover Request Ack` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37006"
}
]
}
]
}
Loading

0 comments on commit 69f6a0c

Please sign in to comment.