Skip to content

Commit

Permalink
generated content from 2023-12-19
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Dec 19, 2023
1 parent 15cde23 commit e880865
Show file tree
Hide file tree
Showing 104 changed files with 2,369 additions and 0 deletions.
103 changes: 103 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -220503,3 +220503,106 @@ vulnerability,CVE-2023-6906,vulnerability--ac300e25-a0ae-40f4-956b-9642ac996794
vulnerability,CVE-2023-6898,vulnerability--bb365456-26bf-4b5a-9c3f-218d238ef399
vulnerability,CVE-2023-6901,vulnerability--ef3562ac-a3f1-4c97-822a-636d95b880ba
vulnerability,CVE-2023-6894,vulnerability--227abbb0-3d2f-4c27-afe0-ccc15d0b138d
vulnerability,CVE-2023-5005,vulnerability--acbfd536-5ddb-4ce0-9fb3-b9060544648d
vulnerability,CVE-2023-5384,vulnerability--cf6fe2ac-a55f-457b-8305-e666f6538d27
vulnerability,CVE-2023-5115,vulnerability--a2437a63-5ff2-4ccb-a9e7-0bd8e05c4298
vulnerability,CVE-2023-5348,vulnerability--dc7cde43-0fe6-4e81-a476-6bd0c5921819
vulnerability,CVE-2023-5056,vulnerability--69ac266e-91a2-4549-a67a-ad953d76d494
vulnerability,CVE-2023-5949,vulnerability--be5a323e-019b-4b75-a54a-48768fabccd7
vulnerability,CVE-2023-5886,vulnerability--105a1f04-be03-42ad-9e63-35aa69d7c764
vulnerability,CVE-2023-5882,vulnerability--ee6adfbf-b295-4407-9cb2-ba1f681fe806
vulnerability,CVE-2023-5236,vulnerability--c66dd706-a13f-4d8c-9b55-294ff4458c71
vulnerability,CVE-2023-23584,vulnerability--ac22f035-8d48-490a-b529-a8b4a8c0c0cb
vulnerability,CVE-2023-23570,vulnerability--6bd4e7fa-f165-4c90-8d12-d92d8de8c6ed
vulnerability,CVE-2023-23576,vulnerability--4c2a5ac4-0986-4627-83a3-0f9c3ecfc322
vulnerability,CVE-2023-32230,vulnerability--6dd878f3-130b-48bd-8074-a15154afad21
vulnerability,CVE-2023-32726,vulnerability--307e14df-f561-4b54-8a3c-5e30fda331c1
vulnerability,CVE-2023-32728,vulnerability--4e248f56-2517-4fe9-a190-868016dfea58
vulnerability,CVE-2023-32725,vulnerability--b1aa77f0-4c03-45ed-987c-4a8f50968c12
vulnerability,CVE-2023-32727,vulnerability--cbcbc691-fe34-4b1a-a5b3-15ccd85500fc
vulnerability,CVE-2023-47558,vulnerability--1b109a47-d8d4-44a0-914f-85d492e8ff0c
vulnerability,CVE-2023-47530,vulnerability--3521eb75-2d7c-43c4-ad70-019d07c94f0f
vulnerability,CVE-2023-47506,vulnerability--369f3404-774c-4c76-b566-2b1304330639
vulnerability,CVE-2023-47754,vulnerability--c06aad4c-4210-417d-9bac-0a498c83388b
vulnerability,CVE-2023-47789,vulnerability--23f48024-51ef-4225-9f45-eed69e236f4a
vulnerability,CVE-2023-47038,vulnerability--e23531b1-49ad-4501-8c22-b9f9637795c3
vulnerability,CVE-2023-47741,vulnerability--70d13579-9517-4fcf-9c49-8d3f265955e1
vulnerability,CVE-2023-47806,vulnerability--345e7c74-1047-4277-84a0-4907a08e33ca
vulnerability,CVE-2023-47787,vulnerability--b62795bc-e1ec-412f-9646-7d406db7766b
vulnerability,CVE-2023-4320,vulnerability--b086ddf8-0c77-407f-b2f9-4a568e2fda83
vulnerability,CVE-2023-4311,vulnerability--0d98a43b-1b93-412e-8fff-eef4b2da5c53
vulnerability,CVE-2023-4724,vulnerability--30eb00bc-1128-4803-bb38-2a9927b63f63
vulnerability,CVE-2023-28053,vulnerability--f6068545-d2fc-43f5-aa20-3f03fa8240c2
vulnerability,CVE-2023-41314,vulnerability--a5453c3f-742b-4807-87ed-9957dafe648f
vulnerability,CVE-2023-41967,vulnerability--c4ba9c22-306f-4d31-8145-a6dbd187fcd4
vulnerability,CVE-2023-35867,vulnerability--aad3fb77-599b-48a3-9130-7da9c5d66164
vulnerability,CVE-2023-33214,vulnerability--f9b081ca-85d7-474b-bad5-5955f7a75382
vulnerability,CVE-2023-33331,vulnerability--f81b5973-4479-4ba6-99a0-e641f989fe80
vulnerability,CVE-2023-22439,vulnerability--cea31258-dec2-497b-8dd4-e86e9d8238e8
vulnerability,CVE-2023-34168,vulnerability--64f62123-f1d6-478d-81dc-47cef96b9278
vulnerability,CVE-2023-39509,vulnerability--e79afd75-b901-4f5e-84e5-efef662895e3
vulnerability,CVE-2023-49843,vulnerability--fd542580-4681-498e-993c-6f4115ee7574
vulnerability,CVE-2023-49855,vulnerability--49ae4bbb-4db8-4c0b-bbdb-958cd0c1fdc3
vulnerability,CVE-2023-49821,vulnerability--9e4061c2-6615-445d-bb24-44fe683e1f39
vulnerability,CVE-2023-49761,vulnerability--c1f6e322-3292-470e-b51c-db63676a423d
vulnerability,CVE-2023-49148,vulnerability--7388e822-7885-493b-94da-d199a754e560
vulnerability,CVE-2023-49853,vulnerability--0a805119-823d-4c13-b34d-ee267eb3bab2
vulnerability,CVE-2023-49155,vulnerability--daeb99aa-8d21-441a-a80e-7dcfdacdded3
vulnerability,CVE-2023-49153,vulnerability--0dd7dfb2-771c-4e4e-abbd-60a3332607b1
vulnerability,CVE-2023-49854,vulnerability--2ec57039-2e74-4bf1-b034-7306140515d6
vulnerability,CVE-2023-49163,vulnerability--0f4975e1-bee0-4cae-bf6c-c11f8150b7a8
vulnerability,CVE-2023-49819,vulnerability--53ff96b0-6ab6-41df-80fa-fa65d7ab7ad2
vulnerability,CVE-2023-49840,vulnerability--3b9f80a3-64a2-4774-b519-c9100e90a540
vulnerability,CVE-2023-49760,vulnerability--a96a3c6b-8d17-417a-92a4-ad2f089602bf
vulnerability,CVE-2023-49759,vulnerability--1f68471a-4790-4e41-b8d8-d15623746941
vulnerability,CVE-2023-49844,vulnerability--735c3aec-1887-461c-b210-ec30dda63a29
vulnerability,CVE-2023-49763,vulnerability--1d311a67-524d-44af-bb87-5591290ace56
vulnerability,CVE-2023-51385,vulnerability--d0dee8b3-9608-45c7-9227-de4316d92283
vulnerability,CVE-2023-51384,vulnerability--a3ecc728-00bc-4a53-89ce-ed151b049f49
vulnerability,CVE-2023-3629,vulnerability--e7302df3-81c9-4f96-b710-3e0000fa3159
vulnerability,CVE-2023-3430,vulnerability--d4d3741b-781d-4529-9851-d1f22321f270
vulnerability,CVE-2023-3628,vulnerability--4a8d0c7d-6d6c-4945-a628-3d4dc1db4fe3
vulnerability,CVE-2023-46686,vulnerability--31b00495-fead-46d4-b1c8-f07f333d6898
vulnerability,CVE-2023-46617,vulnerability--aec1027f-d125-47dd-9ebc-4f2ca23d0176
vulnerability,CVE-2023-46212,vulnerability--76684ed5-12ca-4146-aad4-30d9026b6ccf
vulnerability,CVE-2023-46177,vulnerability--da1995ca-ce94-401a-831d-7deb2ec1c7f7
vulnerability,CVE-2023-46154,vulnerability--cf53989b-e759-4c6b-b140-3c1fe8707aa1
vulnerability,CVE-2023-48795,vulnerability--1942cac1-0fe7-4d62-ad45-992cda8f583d
vulnerability,CVE-2023-48772,vulnerability--0ec61a25-f38f-4bf3-ba8d-ee64c349bb35
vulnerability,CVE-2023-48768,vulnerability--38440b1e-8ef8-4445-9a14-5d95049df8b9
vulnerability,CVE-2023-48762,vulnerability--26850ecc-429f-44a0-808a-978cdc6b2c1e
vulnerability,CVE-2023-48778,vulnerability--c25c7266-0719-4fce-b6a5-cde6630b63f2
vulnerability,CVE-2023-48769,vulnerability--0c146041-e99e-4e38-8f70-616ef43d238e
vulnerability,CVE-2023-48751,vulnerability--0f588b2f-cf10-4403-b32c-512c1c03c463
vulnerability,CVE-2023-48755,vulnerability--f2b2d352-f0db-43de-a1a9-2a971889766e
vulnerability,CVE-2023-48766,vulnerability--9cb90d8f-c595-4d04-9803-bd6c722b484b
vulnerability,CVE-2023-48781,vulnerability--fb986ebf-8df7-4e7c-ae32-fa2f5a5c51ff
vulnerability,CVE-2023-48773,vulnerability--e2008f26-4295-4cbf-88ee-3cd63f99b49e
vulnerability,CVE-2023-24590,vulnerability--00eab2de-50f1-4582-984a-11432c71a611
vulnerability,CVE-2023-50979,vulnerability--5801f05f-0c7a-4ac9-85e7-d4b827ff0d0e
vulnerability,CVE-2023-50980,vulnerability--60e0ef9a-dd19-43c4-b3eb-98d0616a458a
vulnerability,CVE-2023-50372,vulnerability--5a2efc64-c7f4-4802-a592-b9dc136382b5
vulnerability,CVE-2023-50981,vulnerability--934580e8-8406-4fa5-bb77-ca03a8c07490
vulnerability,CVE-2023-6228,vulnerability--797a7cfb-7be8-4f9f-bb05-ea516426e1ac
vulnerability,CVE-2023-6927,vulnerability--1516a357-a6d6-40a8-84f5-0115cfe5636f
vulnerability,CVE-2023-6203,vulnerability--0f3051bd-4612-4753-b1ae-e2e7992b4dea
vulnerability,CVE-2023-6817,vulnerability--a209c328-67ea-4915-9d86-f94075ecda81
vulnerability,CVE-2023-6272,vulnerability--385efe65-425d-4a4a-8cdf-6d3104692885
vulnerability,CVE-2023-6065,vulnerability--23dfc916-3554-4989-9cbd-2b70a31482a0
vulnerability,CVE-2023-6691,vulnerability--4ebbdab3-31ce-4778-b76f-41a7f56908ee
vulnerability,CVE-2023-6911,vulnerability--58d88c03-7e1a-48e9-96d6-13653db70215
vulnerability,CVE-2023-6295,vulnerability--e2b91088-4833-4f61-95e7-78c69ab0d4e4
vulnerability,CVE-2023-6289,vulnerability--5baff70c-6cf6-4c8e-b4e4-fdbaed541f39
vulnerability,CVE-2023-6483,vulnerability--d1734ba8-f7be-41aa-9d38-d15f75c2ceb6
vulnerability,CVE-2023-6077,vulnerability--93c8da60-66dd-4905-9b9c-8e777624d5df
vulnerability,CVE-2023-6907,vulnerability--7b030740-749c-4afb-9dcf-3f58c1b83bf6
vulnerability,CVE-2023-6918,vulnerability--2fd471bc-66aa-4e17-a29d-18ee017ef707
vulnerability,CVE-2023-6222,vulnerability--1c752b5c-5a95-42aa-adf0-3ee21dd5c5ac
vulnerability,CVE-2023-6908,vulnerability--ce2dc5f4-8ebc-4b73-beb2-e78708c9442f
vulnerability,CVE-2023-6778,vulnerability--39760cd8-997c-4bd2-8fc2-26818785336f
vulnerability,CVE-2023-6355,vulnerability--f2f8a885-e2a4-40f8-8894-d2d35c4d62f0
vulnerability,CVE-2023-6909,vulnerability--6ffd87a0-2151-4481-9fbb-0da8402dc607
vulnerability,CVE-2023-40691,vulnerability--b64caaef-56a4-4144-9ab0-dc0ec129f938
vulnerability,CVE-2022-41677,vulnerability--d7210591-c979-4f64-9d55-7c4e0539397c
vulnerability,CVE-2022-45809,vulnerability--d1a90037-f8b8-4767-a61b-f762ebb750d3
vulnerability,CVE-2022-40312,vulnerability--01bde9c4-f427-483a-a008-486607baf95a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ba308a75-95fd-4fe7-bd30-06fd6fcb3c94",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00eab2de-50f1-4582-984a-11432c71a611",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:50.372356Z",
"modified": "2023-12-19T00:28:50.372356Z",
"name": "CVE-2023-24590",
"description": "\n\n\nA format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.\n\nThis issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\n\n\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-24590"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9ff610cb-350d-47f0-a4b5-450827c499de",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01bde9c4-f427-483a-a008-486607baf95a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:29:00.679215Z",
"modified": "2023-12-19T00:29:00.679215Z",
"name": "CVE-2022-40312",
"description": "Server-Side Request Forgery (SSRF) vulnerability in GiveWP GiveWP – Donation Plugin and Fundraising Platform.This issue affects GiveWP – Donation Plugin and Fundraising Platform: from n/a through 2.25.1.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-40312"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ef23fd8b-0d87-4c45-8efa-309e24e7dc1f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a805119-823d-4c13-b34d-ee267eb3bab2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:49.656034Z",
"modified": "2023-12-19T00:28:49.656034Z",
"name": "CVE-2023-49853",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in PayTR Ödeme ve Elektronik Para Kuruluşu A.Ş. PayTR Taksit Tablosu – WooCommerce.This issue affects PayTR Taksit Tablosu – WooCommerce: from n/a through 1.3.1.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49853"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9e716593-e86d-44cf-a673-fd74bb90d8fd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c146041-e99e-4e38-8f70-616ef43d238e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:50.154464Z",
"modified": "2023-12-19T00:28:50.154464Z",
"name": "CVE-2023-48769",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Blue Coral Chat Bubble – Floating Chat with Contact Chat Icons, Messages, Telegram, Email, SMS, Call me back.This issue affects Chat Bubble – Floating Chat with Contact Chat Icons, Messages, Telegram, Email, SMS, Call me back: from n/a through 2.3.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48769"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8088d0d6-cee9-4aec-8ba6-0d7585adc881",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d98a43b-1b93-412e-8fff-eef4b2da5c53",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:48.860412Z",
"modified": "2023-12-19T00:28:48.860412Z",
"name": "CVE-2023-4311",
"description": "The Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 is vulnerable to arbitrary file upload due to insufficient checks in a plugin shortcode.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4311"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ffca4590-6756-4371-aa83-b67ed84bb376",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0dd7dfb2-771c-4e4e-abbd-60a3332607b1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:49.660168Z",
"modified": "2023-12-19T00:28:49.660168Z",
"name": "CVE-2023-49153",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Saiful Islam Add to Cart Text Changer and Customize Button, Add Custom Icon.This issue affects Add to Cart Text Changer and Customize Button, Add Custom Icon: from n/a through 2.0.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49153"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2786368e-fa1e-4b64-851a-7f264905634f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ec61a25-f38f-4bf3-ba8d-ee64c349bb35",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:50.127404Z",
"modified": "2023-12-19T00:28:50.127404Z",
"name": "CVE-2023-48772",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Arul Prasad J Prevent Landscape Rotation.This issue affects Prevent Landscape Rotation: from n/a through 2.0.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48772"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bee1f346-146d-4103-aa37-202bb38a33cf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f3051bd-4612-4753-b1ae-e2e7992b4dea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:50.613404Z",
"modified": "2023-12-19T00:28:50.613404Z",
"name": "CVE-2023-6203",
"description": "The Events Calendar WordPress plugin before 6.2.8.1 discloses the content of password protected posts to unauthenticated users via a crafted request",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6203"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6a8b714c-e7c0-427f-9bef-faf2b163c758",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f4975e1-bee0-4cae-bf6c-c11f8150b7a8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:49.665174Z",
"modified": "2023-12-19T00:28:49.665174Z",
"name": "CVE-2023-49163",
"description": "Cross-Site Request Forgery (CSRF) vulnerability in Michael Winkler teachPress.This issue affects teachPress: from n/a through 9.0.5.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49163"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--547fdf48-717b-4577-a7e7-987a832d6904",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f588b2f-cf10-4403-b32c-512c1c03c463",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:50.155661Z",
"modified": "2023-12-19T00:28:50.155661Z",
"name": "CVE-2023-48751",
"description": "Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database allows Accessing Functionality Not Properly Constrained by ACLs, Cross Site Request Forgery.This issue affects Participants Database: from n/a through 2.5.5.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48751"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--01dffbbe-8981-40bf-af36-420bae9eb4be",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--105a1f04-be03-42ad-9e63-35aa69d7c764",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-12-19T00:28:48.5247Z",
"modified": "2023-12-19T00:28:48.5247Z",
"name": "CVE-2023-5886",
"description": "The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not check nonce tokens early enough in the request lifecycle, allowing attackers with the ability to upload files to make logged in users perform unwanted actions leading to PHAR deserialization, which may lead to remote code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5886"
}
]
}
]
}
Loading

0 comments on commit e880865

Please sign in to comment.