Skip to content

Commit

Permalink
generated content from 2024-02-03
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 3, 2024
1 parent ad7c99a commit 0c2ffbb
Show file tree
Hide file tree
Showing 148 changed files with 3,381 additions and 0 deletions.
147 changes: 147 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -224263,3 +224263,150 @@ vulnerability,CVE-2023-5841,vulnerability--a96e8e74-664c-4bec-b623-b00ba55a17bc
vulnerability,CVE-2023-47256,vulnerability--f78b07bc-3cf7-443d-b445-db18d40d9a8f
vulnerability,CVE-2023-47867,vulnerability--d3e7f752-12cb-455a-951f-de790737a328
vulnerability,CVE-2023-47257,vulnerability--182b34d7-86e7-4fd9-9359-1ebbb7a6307c
vulnerability,CVE-2022-40744,vulnerability--0158e544-6085-463f-b6e0-940897d1f7fc
vulnerability,CVE-2022-34381,vulnerability--455b9e80-9c42-4f40-af95-9599b0129545
vulnerability,CVE-2024-21780,vulnerability--78add149-7c40-4be9-b133-158332eaee48
vulnerability,CVE-2024-21485,vulnerability--ea061c50-5aad-4461-9996-f87f32a298cb
vulnerability,CVE-2024-21399,vulnerability--c317f9ca-2d2e-4a61-a328-c9777ed55292
vulnerability,CVE-2024-21845,vulnerability--ff3ca549-169e-4abd-a0b0-022e7c0c2c9c
vulnerability,CVE-2024-21851,vulnerability--1f930bd5-22b3-4bc0-9e88-2da36e83521e
vulnerability,CVE-2024-21860,vulnerability--e11c1a3d-25ec-4496-b522-2c49aa99abec
vulnerability,CVE-2024-21863,vulnerability--37aa396c-a403-41f1-89ae-d9ab53d804dd
vulnerability,CVE-2024-22902,vulnerability--b52dd5e1-f54e-4c8e-84a3-515952f704f1
vulnerability,CVE-2024-22900,vulnerability--1c498eb8-8fb3-4110-97ee-2cf2a8830e14
vulnerability,CVE-2024-22108,vulnerability--14a4f29e-d9e9-412b-8a62-dd443c4304f5
vulnerability,CVE-2024-22320,vulnerability--e27d4acc-78f9-4925-bd85-280b378e3dbf
vulnerability,CVE-2024-22319,vulnerability--26b8f7f1-0206-4ec6-810b-2d7974a945f1
vulnerability,CVE-2024-22901,vulnerability--7b8bb75f-992c-4a44-9552-78ee6aeca8b0
vulnerability,CVE-2024-22899,vulnerability--628add9e-91e7-4f26-9b89-58cf1b8c06f3
vulnerability,CVE-2024-22779,vulnerability--78db41d2-ac36-4965-b85e-18a67a6d31b3
vulnerability,CVE-2024-22903,vulnerability--b1d1c950-5af3-4639-b7c7-a50b499d924b
vulnerability,CVE-2024-22107,vulnerability--5b173e98-0232-401c-902c-ee372ae3f528
vulnerability,CVE-2024-22533,vulnerability--0e47b844-065e-4a29-8dac-f3c4a669473d
vulnerability,CVE-2024-22851,vulnerability--ba381246-7800-498d-a2ed-892c035fddb9
vulnerability,CVE-2024-1185,vulnerability--866ee757-cf56-405a-b31a-980ceb679b1d
vulnerability,CVE-2024-1189,vulnerability--c43172be-b84a-4928-a8ac-a56cff66ff85
vulnerability,CVE-2024-1188,vulnerability--a8777705-68f1-40ba-b9a2-cb6d782c5aff
vulnerability,CVE-2024-1194,vulnerability--c30bc156-2374-4015-95d1-2ba51e80f052
vulnerability,CVE-2024-1196,vulnerability--97427e8f-6a5f-4690-a2bc-7673016e56d9
vulnerability,CVE-2024-1191,vulnerability--3eb7c1ea-6885-46b2-b094-e10e84b70143
vulnerability,CVE-2024-1201,vulnerability--2819a24d-c52b-43ec-bf97-e823a19ac111
vulnerability,CVE-2024-1186,vulnerability--a1cad6ce-061f-4134-9b1b-5c851ce50e84
vulnerability,CVE-2024-1198,vulnerability--cb008b0c-b047-4683-928d-6c5d19cc0363
vulnerability,CVE-2024-1047,vulnerability--2022d592-bb45-417b-9dea-8cc3c4f8fceb
vulnerability,CVE-2024-1195,vulnerability--e354292c-737d-470e-8d02-13cc717ca5a7
vulnerability,CVE-2024-1073,vulnerability--7272834c-9f16-4c88-a46d-68381804b959
vulnerability,CVE-2024-1184,vulnerability--3bb92a29-0546-49aa-a81d-07b22fc6a6fa
vulnerability,CVE-2024-1197,vulnerability--1e59261d-d509-401f-bdf5-960cd243ff43
vulnerability,CVE-2024-1187,vulnerability--d9c52f5a-e6b6-4c31-a3c0-91361adf252c
vulnerability,CVE-2024-1162,vulnerability--6fe082b9-e072-4636-84ad-0b8a9ac4650c
vulnerability,CVE-2024-1190,vulnerability--104939c3-c8bc-48c6-8119-3eae1635e279
vulnerability,CVE-2024-1143,vulnerability--b5b53611-2539-4415-bc16-1a2f47661497
vulnerability,CVE-2024-1193,vulnerability--0c1d0a78-611a-4c5a-aedb-6a96a249d0c7
vulnerability,CVE-2024-1192,vulnerability--79123629-040c-4171-aaa7-df2552353b15
vulnerability,CVE-2024-1199,vulnerability--4d433978-a043-425d-9885-a1e6a3a9db0b
vulnerability,CVE-2024-23553,vulnerability--7c5b0a17-37f6-4de7-823c-c749e55775ee
vulnerability,CVE-2024-23895,vulnerability--8a33d1b6-fba4-4f5b-9e16-35c7f36b8925
vulnerability,CVE-2024-23831,vulnerability--e1646292-e4c1-467b-9120-37b86d11ddca
vulnerability,CVE-2024-23746,vulnerability--3803bf1e-d650-4e31-92ca-9d7aed3fecd8
vulnerability,CVE-2024-23824,vulnerability--b9013307-cbf7-4702-92b5-b062bc017e4a
vulnerability,CVE-2024-23635,vulnerability--9a3cf004-8c03-40cf-8d18-c5e8d8854b0a
vulnerability,CVE-2024-23978,vulnerability--fccc4236-5ae2-4667-9cf1-a38ee79effa0
vulnerability,CVE-2024-25006,vulnerability--bb74e4f8-d3e3-4310-9a35-341cdc904b69
vulnerability,CVE-2024-0685,vulnerability--bd2d57f5-d7c4-4a91-9638-d03f7afd5b07
vulnerability,CVE-2024-0253,vulnerability--4658efcb-5b39-42f7-b079-1261bc9a5c65
vulnerability,CVE-2024-0963,vulnerability--92f5f320-04fc-4f63-839b-63147a5578ca
vulnerability,CVE-2024-0269,vulnerability--7e6c1dfd-bbf5-41fa-83c5-22a5241f9dc7
vulnerability,CVE-2024-0844,vulnerability--7d338818-c1ce-4619-882d-ad3a46ae2ad3
vulnerability,CVE-2024-0338,vulnerability--592fed5e-bae1-41d1-b88b-5a34eec6249d
vulnerability,CVE-2024-0285,vulnerability--1b4298d1-6ee7-48ed-b273-d3aeee8e5238
vulnerability,CVE-2024-24482,vulnerability--020d074d-51c0-4393-b9c5-20e485251735
vulnerability,CVE-2024-24757,vulnerability--6be7a3dc-26d2-4cde-aebc-a8406de1932a
vulnerability,CVE-2024-24760,vulnerability--01d35c73-7fe5-4a18-a5af-04ff40945806
vulnerability,CVE-2024-24161,vulnerability--3f6b3c90-02c0-4d62-983d-4baa7c9b9695
vulnerability,CVE-2024-24160,vulnerability--6646e541-f674-4a00-8333-b9818e678b2e
vulnerability,CVE-2024-24388,vulnerability--998e71ad-e338-45bd-a838-79f3c891f0d9
vulnerability,CVE-2024-24560,vulnerability--dcd15393-9f00-4a94-87a8-b609134425b4
vulnerability,CVE-2024-24029,vulnerability--7091b010-e4f0-406f-9332-c7e83be30b89
vulnerability,CVE-2024-24470,vulnerability--ccf401c9-3034-45c1-a67f-89acfabd3e84
vulnerability,CVE-2024-24524,vulnerability--680cd5df-2136-41fa-b0af-0cca89841fc5
vulnerability,CVE-2023-49118,vulnerability--25fdced0-48dc-4f3d-aed2-724bb7cf49ac
vulnerability,CVE-2023-41274,vulnerability--fcf916eb-a6a8-4ed5-bd65-d55d8b34f4e8
vulnerability,CVE-2023-41282,vulnerability--946b5165-82d6-4070-8937-81739ebf133c
vulnerability,CVE-2023-41279,vulnerability--ac89114f-e520-44ea-a614-bf3dc3ffba28
vulnerability,CVE-2023-41276,vulnerability--8f6aed29-98b5-4a64-ba27-726987e2b835
vulnerability,CVE-2023-41283,vulnerability--9662cb7d-eee5-45e8-b3dd-7aedcd07606d
vulnerability,CVE-2023-41292,vulnerability--e2a75aeb-1e31-4915-811b-5acde015aff7
vulnerability,CVE-2023-41277,vulnerability--5d056773-6879-4197-8ec8-847746ecfe9f
vulnerability,CVE-2023-41273,vulnerability--d4d6c7b9-fb2b-4d02-ab69-41d00e3e3e97
vulnerability,CVE-2023-41275,vulnerability--4ee3995d-df9a-4297-b6ab-ff8f32d8313b
vulnerability,CVE-2023-41278,vulnerability--2eede58c-b3d2-4163-b65e-fae993bcacb0
vulnerability,CVE-2023-41281,vulnerability--ffe636ae-24d2-4f85-846b-dd6f3fdc31ff
vulnerability,CVE-2023-41280,vulnerability--94d5d202-56a9-4498-92c4-df38c08de404
vulnerability,CVE-2023-45026,vulnerability--096a6cc2-f3f6-4408-bc10-cb970785a2e7
vulnerability,CVE-2023-45025,vulnerability--55769618-cdb1-4db3-833f-bc2c4b92f16b
vulnerability,CVE-2023-45028,vulnerability--0d8a20d1-e350-42f5-9f91-83fceba09586
vulnerability,CVE-2023-45027,vulnerability--0118736b-e329-4467-90a7-51193281fe48
vulnerability,CVE-2023-45037,vulnerability--81f8d446-2f0f-4879-8d1d-1e280f4b07c3
vulnerability,CVE-2023-45734,vulnerability--981ffdd6-1e8d-48c6-a8a1-db44f65eaeb3
vulnerability,CVE-2023-45036,vulnerability--025a3078-e00d-46ed-b253-d8002e594d70
vulnerability,CVE-2023-45035,vulnerability--04d69c0f-c25b-40bc-889f-8487731d0cb4
vulnerability,CVE-2023-46344,vulnerability--bc6f98ad-cd4d-4078-9e93-e342093a6d41
vulnerability,CVE-2023-46159,vulnerability--5750ed6d-77d4-4c1d-9ed4-d53db5b7f2f9
vulnerability,CVE-2023-46045,vulnerability--44605fb1-7a83-4a95-b3b9-a51cff0d7dfe
vulnerability,CVE-2023-43756,vulnerability--9168f8f7-1464-436d-905a-cae3cd6d7e05
vulnerability,CVE-2023-32333,vulnerability--2211c48a-1587-4d0e-ae17-571437384424
vulnerability,CVE-2023-32967,vulnerability--de2d576b-5b7e-4c7b-aa68-1251a6f4e915
vulnerability,CVE-2023-51072,vulnerability--7cc33154-08f2-42ed-a531-3fe5e55c7458
vulnerability,CVE-2023-51820,vulnerability--c78a8ee5-2d0f-419e-8e8a-959f5f0e0e4b
vulnerability,CVE-2023-51838,vulnerability--24a7236e-faf6-4133-8e55-f663659bdd40
vulnerability,CVE-2023-37530,vulnerability--bbf3f161-83e8-474a-b5ba-95dd561c813d
vulnerability,CVE-2023-37531,vulnerability--6e39e462-5510-48fb-a7b2-f1ab1758f28d
vulnerability,CVE-2023-37527,vulnerability--51fdcb81-f478-4717-85eb-d482eaf47b0f
vulnerability,CVE-2023-37529,vulnerability--072a0a13-1e52-4ea8-bc1a-937eae79ce34
vulnerability,CVE-2023-6672,vulnerability--613f98b1-cfa5-4f94-b91f-07c9f2fe23eb
vulnerability,CVE-2023-6675,vulnerability--a1c8efe2-446e-4639-ab76-3262c9ec413e
vulnerability,CVE-2023-6387,vulnerability--cef1e0dd-f476-4663-8766-585e096ebc2d
vulnerability,CVE-2023-6673,vulnerability--8ee945cd-5862-43c5-8f31-e624728bdaf6
vulnerability,CVE-2023-6676,vulnerability--d7611c6d-3196-490c-b61b-1e4239c751cf
vulnerability,CVE-2023-38263,vulnerability--bb134414-bd25-47b2-a9f4-5395beb22728
vulnerability,CVE-2023-38020,vulnerability--977db0c5-5512-441e-9685-3fd082afdc7e
vulnerability,CVE-2023-38273,vulnerability--b06589f1-e5c4-4321-bd32-decd9dba5b14
vulnerability,CVE-2023-38019,vulnerability--59353303-8591-4af7-b57f-c6a480d53ec9
vulnerability,CVE-2023-50326,vulnerability--6bd5987e-9d6b-45de-9696-ab1dd9d1e574
vulnerability,CVE-2023-50935,vulnerability--d8f9a68e-539f-4fbe-b647-69018595c9f9
vulnerability,CVE-2023-50488,vulnerability--853aaffd-b08e-49ab-b2ff-9d9b900227cd
vulnerability,CVE-2023-50359,vulnerability--83f89778-05b4-4a8c-8931-26d299cf6c93
vulnerability,CVE-2023-50938,vulnerability--2e1a2d3c-bf57-4b6d-8e59-be59c326a445
vulnerability,CVE-2023-50328,vulnerability--c2d81b51-eb84-4895-bedd-57945cfd8e6b
vulnerability,CVE-2023-50936,vulnerability--e660d879-02b8-4044-b4f1-bd1574a6db90
vulnerability,CVE-2023-50933,vulnerability--87f667fc-6dd6-46a2-9dd6-5836e891e356
vulnerability,CVE-2023-50940,vulnerability--2cf8b1e5-038f-4257-83da-b4bbeef2744d
vulnerability,CVE-2023-50934,vulnerability--487068e9-1bb9-4091-8c18-31625a072e20
vulnerability,CVE-2023-50327,vulnerability--01f8e8b2-0684-4548-92e8-74048ce3bc52
vulnerability,CVE-2023-50962,vulnerability--722ae5ef-0b71-4a61-a70a-0a508ae338c0
vulnerability,CVE-2023-50941,vulnerability--e1cd56f5-52e8-49df-b9b4-bcf435262a45
vulnerability,CVE-2023-50937,vulnerability--cbcd9efe-efcf-495a-95da-354bbcfe1686
vulnerability,CVE-2023-39611,vulnerability--4ecbaf3f-6498-4c28-bfd5-240024d5520b
vulnerability,CVE-2023-39297,vulnerability--44577f9b-5e1e-4b8d-bca1-6a3b7d63f65e
vulnerability,CVE-2023-39302,vulnerability--3593061c-52f5-4661-9f59-4a8771dd1372
vulnerability,CVE-2023-39303,vulnerability--e2e9b67b-0db8-491d-9f08-6c88f501faf5
vulnerability,CVE-2023-48792,vulnerability--89a97d8f-f43b-461b-8d22-d1757a0baf0f
vulnerability,CVE-2023-48645,vulnerability--86e62677-0f25-4c7b-8b79-57571cf71672
vulnerability,CVE-2023-48793,vulnerability--3a439b77-b83e-4e2c-b553-db3613ffa752
vulnerability,CVE-2023-47561,vulnerability--7cf60242-c848-4554-87f7-e912d33df505
vulnerability,CVE-2023-47568,vulnerability--f3e8eb2f-1dbe-45ca-9423-71377da49c70
vulnerability,CVE-2023-47148,vulnerability--6dd127c0-ea3d-4092-b6d3-59f29daeae6a
vulnerability,CVE-2023-47142,vulnerability--e5409c6a-4a12-489f-baf2-86cb5af5a432
vulnerability,CVE-2023-47567,vulnerability--a030d792-6d2d-4b68-94e6-e7efcf9d8149
vulnerability,CVE-2023-47562,vulnerability--1a278778-cf5f-4c9e-bf18-c186a83ddb57
vulnerability,CVE-2023-47144,vulnerability--b12af3e9-1705-4be2-989c-e2d8e1b57331
vulnerability,CVE-2023-47566,vulnerability--f20b5be4-7a21-4f69-b568-b233defb1334
vulnerability,CVE-2023-47143,vulnerability--596fd7ec-4f91-4015-ae1c-13ddaa451755
vulnerability,CVE-2023-47564,vulnerability--9c462175-a9cf-4e01-bc2d-1ad436a39520
vulnerability,CVE-2020-29504,vulnerability--37442058-fbc5-4224-9525-7ed1abd4f6e4
vulnerability,CVE-2020-24682,vulnerability--01eda1b1-0e4b-40a1-925a-649620b3c5a5
vulnerability,CVE-2020-24681,vulnerability--fba825b7-5147-43f6-9503-0259fc16dc9b
vulnerability,CVE-2021-21575,vulnerability--50f12ca5-cff2-4910-a2b8-8c9421f792dc
vulnerability,CVE-2021-22282,vulnerability--d1be0164-2276-4bd0-8af6-96df7ee0e3a5
vulnerability,CVE-2021-22281,vulnerability--f9a19942-702e-4c6b-b8bc-f1e90795d30a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9f50da32-2872-47bd-9ab9-4bc8be66317f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0118736b-e329-4467-90a7-51193281fe48",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-03T00:27:32.193536Z",
"modified": "2024-02-03T00:27:32.193536Z",
"name": "CVE-2023-45027",
"description": "A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.5.2645 build 20240116 and later\nQuTS hero h5.1.5.2647 build 20240118 and later\nQuTScloud c5.1.5.2651 and later\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-45027"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ac77f3f6-4cf2-4452-96c3-7dfead755eb6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0158e544-6085-463f-b6e0-940897d1f7fc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-03T00:27:27.093466Z",
"modified": "2024-02-03T00:27:27.093466Z",
"name": "CVE-2022-40744",
"description": "IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236441.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-40744"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3a6635b4-f438-4efd-bbf3-9d3777026b9c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01d35c73-7fe5-4a18-a5af-04ff40945806",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-03T00:27:31.59613Z",
"modified": "2024-02-03T00:27:31.59613Z",
"name": "CVE-2024-24760",
"description": "mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24760"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2c5babc9-4982-4fb6-9991-39c91aeba3aa",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01eda1b1-0e4b-40a1-925a-649620b3c5a5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-03T00:27:36.682171Z",
"modified": "2024-02-03T00:27:36.682171Z",
"name": "CVE-2020-24682",
"description": "Unquoted Search Path or Element vulnerability in B&R Industrial Automation Automation Studio, B&R Industrial Automation NET/PVI allows Target Programs with Elevated Privileges.This issue affects Automation Studio: from 4.0 through 4.6, from 4.7.0 before 4.7.7 SP, from 4.8.0 before 4.8.6 SP, from 4.9.0 before 4.9.4 SP; NET/PVI: from 4.0 through 4.6, from 4.7.0 before 4.7.7, from 4.8.0 before 4.8.6, from 4.9.0 before 4.9.4.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2020-24682"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ab42c98e-f02b-4a81-afc1-dfa47cdb1a01",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01f8e8b2-0684-4548-92e8-74048ce3bc52",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-03T00:27:33.47353Z",
"modified": "2024-02-03T00:27:33.47353Z",
"name": "CVE-2023-50327",
"description": "IBM PowerSC 1.3, 2.0, and 2.1 uses insecure HTTP methods which could allow a remote attacker to perform unauthorized file request modification. IBM X-Force ID: 275109.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-50327"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4b022e36-be80-4247-bd15-becc4780536d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--020d074d-51c0-4393-b9c5-20e485251735",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-03T00:27:31.580214Z",
"modified": "2024-02-03T00:27:31.580214Z",
"name": "CVE-2024-24482",
"description": "Aprktool before 2.9.3 on Windows allows ../ and /.. directory traversal.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24482"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7e162f13-06d6-4c7f-853b-dce3b9e94263",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--025a3078-e00d-46ed-b253-d8002e594d70",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-03T00:27:32.213252Z",
"modified": "2024-02-03T00:27:32.213252Z",
"name": "CVE-2023-45036",
"description": "A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.3.2578 build 20231110 and later\nQuTS hero h5.1.3.2578 build 20231110 and later\nQuTScloud c5.1.5.2651 and later\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-45036"
}
]
}
]
}
Loading

0 comments on commit 0c2ffbb

Please sign in to comment.