Skip to content

Commit

Permalink
generated content from 2024-01-07
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 7, 2024
1 parent 150f5fe commit 5681ff5
Show file tree
Hide file tree
Showing 10 changed files with 207 additions and 0 deletions.
9 changes: 9 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -221903,3 +221903,12 @@ vulnerability,CVE-2024-0246,vulnerability--6e148511-dd63-4d50-9718-ecd0610d89a4
vulnerability,CVE-2024-0247,vulnerability--08906699-7f9c-4a65-bdbb-3a8e88665b4b
vulnerability,CVE-2022-46839,vulnerability--e8f318dd-b99b-406c-a2e1-3640e3c50e81
vulnerability,CVE-2022-36677,vulnerability--76a80d95-9bf8-4693-894e-7719ffc2fc2f
vulnerability,CVE-2023-39853,vulnerability--9f3fad8b-5be2-48fd-87f2-3af8b3a8cf2e
vulnerability,CVE-2023-51441,vulnerability--45cc5481-6c0d-4683-8e47-994c28f86192
vulnerability,CVE-2023-46953,vulnerability--c68c68a0-9b22-4a47-b8e5-297e4fc00744
vulnerability,CVE-2023-50612,vulnerability--0dee25ab-83f7-42d8-849a-ebd0c48be6fd
vulnerability,CVE-2023-50609,vulnerability--ec2dbaac-b482-4014-85f5-7af4f90045c7
vulnerability,CVE-2023-50121,vulnerability--16305560-83d5-4854-a43f-987c1278aa46
vulnerability,CVE-2023-6801,vulnerability--9db18988-0df8-4012-8213-d9f0a6a376a6
vulnerability,CVE-2023-6798,vulnerability--c525c510-f3b0-4ed9-bcca-98a1c800b676
vulnerability,CVE-2024-0260,vulnerability--6c6b2141-c25c-422f-a519-ec7d4c6ec100
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--88df71f7-2cce-4a40-b7ad-f5da1f291e94",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0dee25ab-83f7-42d8-849a-ebd0c48be6fd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:31.991386Z",
"modified": "2024-01-07T00:31:31.991386Z",
"name": "CVE-2023-50612",
"description": "Insecure Permissions vulnerability in fit2cloud Cloud Explorer Lite version 1.4.1, allow local attackers to escalate privileges and obtain sensitive information via the cloud accounts parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-50612"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--07c06acd-d407-4ffe-bdcd-3839bfb8bfe7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16305560-83d5-4854-a43f-987c1278aa46",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:32.007147Z",
"modified": "2024-01-07T00:31:32.007147Z",
"name": "CVE-2023-50121",
"description": "Autel EVO NANO drone flight control firmware version 1.6.5 is vulnerable to denial of service (DoS).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-50121"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--633c905b-c37f-4c94-8eac-46357d14ec2a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--45cc5481-6c0d-4683-8e47-994c28f86192",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:31.25028Z",
"modified": "2024-01-07T00:31:31.25028Z",
"name": "CVE-2023-51441",
"description": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF\nThis issue affects Apache Axis: through 1.3.\n\nAs Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied. The Apache Axis project does not expect to create an Axis 1.x release \nfixing this problem, though contributors that would like to work towards\n this are welcome.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-51441"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f7b96433-889a-4ebd-a6cc-41751f804dd9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--6c6b2141-c25c-422f-a519-ec7d4c6ec100",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:40.098681Z",
"modified": "2024-01-07T00:31:40.098681Z",
"name": "CVE-2024-0260",
"description": "A vulnerability, which was classified as problematic, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file change_password_teacher.php of the component Password Change. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249816.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0260"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6d4a2954-90a9-4835-a355-01ca954f53e1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9db18988-0df8-4012-8213-d9f0a6a376a6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:32.184714Z",
"modified": "2024-01-07T00:31:32.184714Z",
"name": "CVE-2023-6801",
"description": "The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6801"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--68d4802a-0290-44cc-af56-ea36818bff79",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9f3fad8b-5be2-48fd-87f2-3af8b3a8cf2e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:31.149304Z",
"modified": "2024-01-07T00:31:31.149304Z",
"name": "CVE-2023-39853",
"description": "SQL Injection vulnerability in Dzzoffice version 2.01, allows remote attackers to obtain sensitive information via the doobj and doevent parameters in the Network Disk backend module.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39853"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--18cd5016-0421-4fde-91d8-289d2f12956e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--c525c510-f3b0-4ed9-bcca-98a1c800b676",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:32.193575Z",
"modified": "2024-01-07T00:31:32.193575Z",
"name": "CVE-2023-6798",
"description": "The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check when updating settings in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with author-level access or above to change the plugin's settings including proxy settings, which are also exposed to authors.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6798"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ef32c37b-3902-4cd9-ada6-3624b4e6690d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--c68c68a0-9b22-4a47-b8e5-297e4fc00744",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:31.338577Z",
"modified": "2024-01-07T00:31:31.338577Z",
"name": "CVE-2023-46953",
"description": "SQL Injection vulnerability in ABO.CMS v.5.9.3, allows remote attackers to execute arbitrary code via the d parameter in the Documents module.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46953"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--85b9931b-1f64-4a7f-93f5-bce02793706d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--ec2dbaac-b482-4014-85f5-7af4f90045c7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-07T00:31:31.996605Z",
"modified": "2024-01-07T00:31:31.996605Z",
"name": "CVE-2023-50609",
"description": "Cross Site Scripting (XSS) vulnerability in AVA teaching video application service platform version 3.1, allows remote attackers to execute arbitrary code via a crafted script to ajax.aspx.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-50609"
}
]
}
]
}

0 comments on commit 5681ff5

Please sign in to comment.