Skip to content

Commit

Permalink
generated content from 2024-01-23
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 23, 2024
1 parent 30c0cd7 commit bf1bd76
Show file tree
Hide file tree
Showing 56 changed files with 1,265 additions and 0 deletions.
55 changes: 55 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -223408,3 +223408,58 @@ vulnerability,CVE-2024-0774,vulnerability--efc19104-4d89-48f5-b870-1f555c9165b4
vulnerability,CVE-2024-0771,vulnerability--8c7b7c89-ebfb-411d-96e8-06ce577b0224
vulnerability,CVE-2024-0773,vulnerability--e3f38658-1a56-4ce8-ad7f-a4d547e0da5f
vulnerability,CVE-2024-0770,vulnerability--b72f7bc0-1520-442e-8fc7-1310087d2891
vulnerability,CVE-2021-42141,vulnerability--21e147bf-7077-4dd7-991c-492e60b37c04
vulnerability,CVE-2023-7170,vulnerability--4a77d5ec-49ac-4bd8-a909-6e13f7a4c70d
vulnerability,CVE-2023-7082,vulnerability--6502bc88-a31c-43f0-b5d0-f4a6ae265966
vulnerability,CVE-2023-7194,vulnerability--3cfe0d4a-eb74-4a3b-ab59-a34cc46130c9
vulnerability,CVE-2023-52354,vulnerability--9f3ce386-93d3-4e37-9520-6aeacf518bb9
vulnerability,CVE-2023-47158,vulnerability--7819d05e-daca-42a6-9ab7-63a663c11802
vulnerability,CVE-2023-47747,vulnerability--c805d2b5-05e0-4ce8-b3fd-9aab9ba47add
vulnerability,CVE-2023-47141,vulnerability--1c16e56d-c984-4aac-ad3c-b1ca071f910f
vulnerability,CVE-2023-47352,vulnerability--37370695-5293-47d3-a288-23947079ec72
vulnerability,CVE-2023-47152,vulnerability--83beeb93-4e27-4da1-afe3-90d3ffc85154
vulnerability,CVE-2023-47746,vulnerability--fc30ccd0-438d-430e-b264-1765bca4880f
vulnerability,CVE-2023-44395,vulnerability--783a8f79-f26b-47bd-8f9a-6470862a9cb5
vulnerability,CVE-2023-27859,vulnerability--9feb32fc-1ad6-41a3-b178-25ff3886dc67
vulnerability,CVE-2023-48118,vulnerability--377fce8d-f7d0-4470-b646-7f1cc6f7d080
vulnerability,CVE-2023-45193,vulnerability--730decae-a149-45c5-be9f-06dbb35328e9
vulnerability,CVE-2023-24135,vulnerability--8c0f4c42-6d38-4639-8810-aa6034bae2b3
vulnerability,CVE-2023-50308,vulnerability--7d187488-321b-4040-9e81-18cc6ed93f2b
vulnerability,CVE-2023-6625,vulnerability--a336d045-e2a1-4e94-9c1b-09b21ffb1685
vulnerability,CVE-2023-6456,vulnerability--805c0d73-45b8-40cb-823d-a4beaa40bfdb
vulnerability,CVE-2023-6290,vulnerability--6f188145-aeb9-4524-9c21-8fdcd2479a56
vulnerability,CVE-2023-6626,vulnerability--f347e8df-9b65-4b7c-89ad-b8c767a28ff3
vulnerability,CVE-2023-6447,vulnerability--52f7624b-054b-453d-9818-7aa100780e67
vulnerability,CVE-2023-6384,vulnerability--d8791f65-90ab-4da2-8574-e710e3b23b9e
vulnerability,CVE-2020-36772,vulnerability--fbc8cf2f-0657-4fb2-9a71-9105cc38c9b1
vulnerability,CVE-2020-36771,vulnerability--3c0c1e8c-e711-4f98-b1ad-2e5f0163a6d7
vulnerability,CVE-2017-20189,vulnerability--591c20c6-049b-486c-8fe0-e89bdd325249
vulnerability,CVE-2024-23678,vulnerability--fbd3206f-1fde-454a-9e9c-741be87f3d6c
vulnerability,CVE-2024-23770,vulnerability--7b70baf4-dc48-4e34-b332-05a99225536f
vulnerability,CVE-2024-23752,vulnerability--c6ec834e-8cda-46f4-b171-91ff92cd26e9
vulnerability,CVE-2024-23677,vulnerability--fe1f156a-bb8a-427e-9ab5-f21dde77d536
vulnerability,CVE-2024-23340,vulnerability--733908bf-2b68-48ef-b6a4-ad248cf23d47
vulnerability,CVE-2024-23771,vulnerability--6ba51c0c-e8c1-4c26-8be7-95ffe7e9868a
vulnerability,CVE-2024-23345,vulnerability--83edee83-d229-4618-9c4a-e8c2727bc2d1
vulnerability,CVE-2024-23676,vulnerability--6be325b9-b43a-4bbb-8f32-d04b0776a5af
vulnerability,CVE-2024-23768,vulnerability--b70beec4-0e8f-4255-85e2-9ebf8ae3095c
vulnerability,CVE-2024-23339,vulnerability--21d5ef5a-1639-409f-b146-49296253ddb8
vulnerability,CVE-2024-23675,vulnerability--7fe915d7-36d8-4a3d-8dfe-a3b50e5de345
vulnerability,CVE-2024-23342,vulnerability--08808855-a624-42a3-847f-d8b99b857912
vulnerability,CVE-2024-21484,vulnerability--7627f586-06cf-42b1-9d5e-48875eb537c5
vulnerability,CVE-2024-22113,vulnerability--ee1b46cc-e0ba-479a-bffb-8e4a524f736d
vulnerability,CVE-2024-22233,vulnerability--fdf341e1-13df-455a-806b-c3ca68e24965
vulnerability,CVE-2024-22895,vulnerability--28b1b4e0-54bf-44d0-9af8-a419a389455e
vulnerability,CVE-2024-0782,vulnerability--6ab0805e-9df0-4044-83ad-11936f4a28ef
vulnerability,CVE-2024-0781,vulnerability--d26ac2f5-85e8-40d0-b08d-0490f85b62d2
vulnerability,CVE-2024-0204,vulnerability--58617a34-d40e-4eac-a792-5a4693bd4d0a
vulnerability,CVE-2024-0784,vulnerability--de100313-d13d-4fbf-bfdc-3be424926604
vulnerability,CVE-2024-0776,vulnerability--7be2fdfe-73a4-43c2-a55a-bd2dfdae7710
vulnerability,CVE-2024-0430,vulnerability--6501a8c2-17a9-40e2-8864-884ca632ce13
vulnerability,CVE-2024-0778,vulnerability--51339c1b-c643-479a-ba89-ddbe94a9831f
vulnerability,CVE-2024-0605,vulnerability--b874e4dd-73d2-4e88-9646-32d25bfd3c33
vulnerability,CVE-2024-0783,vulnerability--c0c0ae4d-a031-40e3-98cd-ec8269a1ef89
vulnerability,CVE-2024-0775,vulnerability--6de0e1a5-2454-4619-a038-f89b1d0c3923
vulnerability,CVE-2024-0606,vulnerability--4bba30c0-e5e3-4598-86a5-18f73bd601ce
vulnerability,CVE-2022-45790,vulnerability--9ab20e8d-c595-421c-8e8f-f33eca3cbf22
vulnerability,CVE-2022-45792,vulnerability--e1c8bc96-54c4-4cdf-9bb2-0e3057f7957a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3143b82a-58d7-4930-b999-8d973bcc15d1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08808855-a624-42a3-847f-d8b99b857912",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:40.625547Z",
"modified": "2024-01-23T00:29:40.625547Z",
"name": "CVE-2024-23342",
"description": "The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA (Edwards-curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman). Versions 0.18.0 and prior are vulnerable to the Minerva attack. As of time of publication, no known patched version exists.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23342"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--204aa828-43c3-416e-92e0-8b9fd3447fa8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1c16e56d-c984-4aac-ad3c-b1ca071f910f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:30.809486Z",
"modified": "2024-01-23T00:29:30.809486Z",
"name": "CVE-2023-47141",
"description": "IIBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query. IBM X-Force ID: 270264.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-47141"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5cf8cb09-ebd7-42ab-b8fa-4c14becd9273",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21d5ef5a-1639-409f-b146-49296253ddb8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:40.619953Z",
"modified": "2024-01-23T00:29:40.619953Z",
"name": "CVE-2024-23339",
"description": "hoolock is a suite of lightweight utilities designed to maintain a small footprint when bundled. Starting in version 2.0.0 and prior to version 2.2.1, utility functions related to object paths (`get`, `set`, and `update`) did not block attempts to access or alter object prototypes. Starting in version 2.2.1, the `get`, `set` and `update` functions throw a `TypeError` when a user attempts to access or alter inherited properties.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23339"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5a2d4d7d-ece7-40bf-b5d4-b00971b691ff",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21e147bf-7077-4dd7-991c-492e60b37c04",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:29.147849Z",
"modified": "2024-01-23T00:29:29.147849Z",
"name": "CVE-2021-42141",
"description": "An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. One incorrect handshake could complete with different epoch numbers in the packets Client_Hello, Client_key_exchange, and Change_cipher_spec, which may cause denial of service.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-42141"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--07f1bfce-3973-4f49-9b01-c8a86e36d655",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--28b1b4e0-54bf-44d0-9af8-a419a389455e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:40.718907Z",
"modified": "2024-01-23T00:29:40.718907Z",
"name": "CVE-2024-22895",
"description": "DedeCMS 5.7.112 has a File Upload vulnerability via uploads/dede/module_upload.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22895"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c87a8a24-b812-4276-aef6-15ea006010ca",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--37370695-5293-47d3-a288-23947079ec72",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:30.811195Z",
"modified": "2024-01-23T00:29:30.811195Z",
"name": "CVE-2023-47352",
"description": "Technicolor TC8715D devices have predictable default WPA2 security passwords. An attacker who scans for SSID and BSSID values may be able to predict these passwords.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-47352"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fc823d9c-deae-46e1-ae78-f4069e5024d7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--377fce8d-f7d0-4470-b646-7f1cc6f7d080",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:32.148799Z",
"modified": "2024-01-23T00:29:32.148799Z",
"name": "CVE-2023-48118",
"description": "SQL Injection vulnerability in Quest Analytics LLC IQCRM v.2023.9.5 allows a remote attacker to execute arbitrary code via a crafted request to the Common.svc WSDL page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48118"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--444c2a51-d5da-40a0-8a0b-106cfec6deb1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3c0c1e8c-e711-4f98-b1ad-2e5f0163a6d7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:36.888494Z",
"modified": "2024-01-23T00:29:36.888494Z",
"name": "CVE-2020-36771",
"description": "CloudLinux\n CageFS 7.1.1-1 or below passes the authentication token as command line\n argument. In some configurations this allows local users to view it via\n the process list and gain code execution as another user.\n\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2020-36771"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7241302f-8190-4ff8-8c2e-2ac9d8eb1279",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3cfe0d4a-eb74-4a3b-ab59-a34cc46130c9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:30.655681Z",
"modified": "2024-01-23T00:29:30.655681Z",
"name": "CVE-2023-7194",
"description": "The Meris WordPress theme through 1.1.2 does not sanitise and escape some parameters before outputting them back in the page, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-7194"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5a93c506-7ff2-4a8c-9852-a300a25ebb89",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4a77d5ec-49ac-4bd8-a909-6e13f7a4c70d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:30.647514Z",
"modified": "2024-01-23T00:29:30.647514Z",
"name": "CVE-2023-7170",
"description": "The EventON-RSVP WordPress plugin before 2.9.5 does not sanitise and escape some parameters before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-7170"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f1e35778-a166-4c4b-b385-36a9c7559f7b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4bba30c0-e5e3-4598-86a5-18f73bd601ce",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:40.824718Z",
"modified": "2024-01-23T00:29:40.824718Z",
"name": "CVE-2024-0606",
"description": "An attacker could execute unauthorized script on a legitimate site through UXSS using window.open() by opening a javascript URI leading to unauthorized actions within the user's loaded webpage. This vulnerability affects Focus for iOS < 122.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0606"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--75ff0df1-f42c-4f75-975d-7e7d911311a2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--51339c1b-c643-479a-ba89-ddbe94a9831f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:40.813222Z",
"modified": "2024-01-23T00:29:40.813222Z",
"name": "CVE-2024-0778",
"description": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in Uniview ISC 2500-S up to 20210930. Affected by this issue is the function setNatConfig of the file /Interface/DevManage/VM.php. The manipulation of the argument natAddress/natPort/natServerPort leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251696. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0778"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--28df5f22-7e7c-4c21-a9ce-1a87bce8c702",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--52f7624b-054b-453d-9818-7aa100780e67",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:32.67332Z",
"modified": "2024-01-23T00:29:32.67332Z",
"name": "CVE-2023-6447",
"description": "The EventPrime WordPress plugin before 3.3.6 lacks authentication and authorization, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id/event name.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6447"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0c075856-8910-428e-8035-15463af2ec73",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--58617a34-d40e-4eac-a792-5a4693bd4d0a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-23T00:29:40.790456Z",
"modified": "2024-01-23T00:29:40.790456Z",
"name": "CVE-2024-0204",
"description": "Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0204"
}
]
}
]
}
Loading

0 comments on commit bf1bd76

Please sign in to comment.