Skip to content

Commit

Permalink
generated content from 2024-01-13
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 13, 2024
1 parent bdbd21f commit 308b1f4
Show file tree
Hide file tree
Showing 130 changed files with 2,967 additions and 0 deletions.
129 changes: 129 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -222623,3 +222623,132 @@ vulnerability,CVE-2024-0422,vulnerability--62da88a6-9f92-4c74-9d1f-2b8e6c18b8ac
vulnerability,CVE-2022-4958,vulnerability--68c41ba0-8cee-44b3-aa8c-bc598190e2af
vulnerability,CVE-2022-4959,vulnerability--68342e6f-eff1-4fe7-8430-669b43c40e04
vulnerability,CVE-2022-40361,vulnerability--1e734a09-7736-4959-899c-c7ad53c65a6a
vulnerability,CVE-2023-5356,vulnerability--d26c97cf-3ec6-4371-985d-efe7d3e856cf
vulnerability,CVE-2023-7028,vulnerability--aac30230-6b26-4497-b4dd-57cda4856d23
vulnerability,CVE-2023-52339,vulnerability--887f3f50-ddcb-413b-9835-03ca8faec992
vulnerability,CVE-2023-52026,vulnerability--957b4a2f-1ba4-41d8-9383-d781b802fda3
vulnerability,CVE-2023-4812,vulnerability--07761e21-97b2-450a-827f-3cecacd812b0
vulnerability,CVE-2023-28897,vulnerability--d518a581-6ea6-460b-a9ac-06aa1c90f568
vulnerability,CVE-2023-28899,vulnerability--4c8891d1-40b3-48ca-ad92-dc8cc1d237a3
vulnerability,CVE-2023-28898,vulnerability--73f6b3a2-cee5-45e7-899b-bfe82ad769f2
vulnerability,CVE-2023-42463,vulnerability--e70bbc25-b2b5-4cab-821a-b5df3a5f14d1
vulnerability,CVE-2023-30014,vulnerability--227cebdb-8131-4e55-828b-04b18678cb0d
vulnerability,CVE-2023-30015,vulnerability--2a653d89-6ee0-44d5-9730-8ccf3269f83f
vulnerability,CVE-2023-30016,vulnerability--1ad40576-0a5d-42a9-b9e0-59309e20d46c
vulnerability,CVE-2023-37117,vulnerability--a165cdbe-c5b1-4104-b748-559a87c20b8f
vulnerability,CVE-2023-34061,vulnerability--9942c649-9292-4cba-94e3-33d9941e89f3
vulnerability,CVE-2023-49801,vulnerability--372c33d0-2f83-4cc0-a550-a03a101d3efa
vulnerability,CVE-2023-49261,vulnerability--c2c96b02-670f-45d6-af32-c08ceffe571f
vulnerability,CVE-2023-49258,vulnerability--1c973b85-e511-4eee-9031-53bfd0902793
vulnerability,CVE-2023-49647,vulnerability--13db15a4-b5e9-46cb-90fe-cd7bb5de374d
vulnerability,CVE-2023-49099,vulnerability--7d5eff1b-de30-47fa-bdfb-74b28305c145
vulnerability,CVE-2023-49253,vulnerability--899242fb-5638-480f-8f19-8d6e3bfe2a11
vulnerability,CVE-2023-49260,vulnerability--379dc69c-055b-43ae-a91c-12c18a149be0
vulnerability,CVE-2023-49259,vulnerability--e40169f0-3f56-44a9-837c-a548096b8f57
vulnerability,CVE-2023-49262,vulnerability--c3536761-847f-445f-9bea-fb2714226380
vulnerability,CVE-2023-49569,vulnerability--086fdd54-7aaa-4dc7-8c97-7a5527fe42cc
vulnerability,CVE-2023-49255,vulnerability--1e0b16c7-32e8-47da-8d62-d3b40093866f
vulnerability,CVE-2023-49568,vulnerability--6fd08d8c-8ac4-4436-a472-67d04c1568a1
vulnerability,CVE-2023-49098,vulnerability--cff8bf2d-5106-48a4-ad89-67e385d8beb9
vulnerability,CVE-2023-49257,vulnerability--8357af51-c9d7-4543-8ec7-fdbecc498adf
vulnerability,CVE-2023-49256,vulnerability--eec781c5-b5c4-40ca-acc0-5ccc17505bba
vulnerability,CVE-2023-49254,vulnerability--517c4e55-5f24-4b3d-8f58-40c274073ca2
vulnerability,CVE-2023-51806,vulnerability--a69f9eef-87de-44ba-83d2-5a35d2b64508
vulnerability,CVE-2023-51698,vulnerability--b464e40f-3d3b-4a69-847b-8ce48abed1df
vulnerability,CVE-2023-51978,vulnerability--10f0ebbe-842a-474e-9e21-9ff41d444153
vulnerability,CVE-2023-51790,vulnerability--813d4970-7dfb-480d-8ca9-54b1a128c1a7
vulnerability,CVE-2023-51949,vulnerability--d76bf4cc-858d-4b88-99f1-0ddb0a5174e6
vulnerability,CVE-2023-46805,vulnerability--8ccf1077-0644-4943-a680-1f6f4ba34444
vulnerability,CVE-2023-2030,vulnerability--f64facb0-8d54-44af-8f85-1bf4d60033b8
vulnerability,CVE-2023-48297,vulnerability--6320d74a-1d7b-4534-a303-7d8737e30347
vulnerability,CVE-2023-48909,vulnerability--53cc8c1f-0a11-4226-ba56-60260e71ad5b
vulnerability,CVE-2023-48166,vulnerability--a8327979-2b5b-40ee-9b81-e4520f6c67fa
vulnerability,CVE-2023-31033,vulnerability--900e998c-c1e2-4e00-aa51-6a0ec8959325
vulnerability,CVE-2023-31024,vulnerability--d0229be1-a7f5-4d83-9d7e-c30b9bb83916
vulnerability,CVE-2023-31030,vulnerability--467e8ba4-c079-42c6-a7e6-f10134c71b9f
vulnerability,CVE-2023-31025,vulnerability--435b77ec-faef-4403-839d-a0905f4ba4d3
vulnerability,CVE-2023-31031,vulnerability--75987cee-2251-40ae-9707-1e056e18a600
vulnerability,CVE-2023-31035,vulnerability--e2912f84-af28-43ee-8e2b-f27c4c0095af
vulnerability,CVE-2023-31034,vulnerability--625e2d9a-288d-48f9-8861-1e841c8d9f9f
vulnerability,CVE-2023-31036,vulnerability--7a709d19-8422-407d-8f65-1a3a36e6ca21
vulnerability,CVE-2023-31032,vulnerability--f41c8048-f576-444e-80ff-60b57eb81fbd
vulnerability,CVE-2023-31211,vulnerability--63bfe16d-0d22-4076-b375-d41490bb7941
vulnerability,CVE-2023-31029,vulnerability--40954a00-310a-4717-928d-1dc4312f685e
vulnerability,CVE-2023-0437,vulnerability--d785d5a6-2518-4b4b-9d27-5fd41cdc49aa
vulnerability,CVE-2023-50919,vulnerability--ce15b4e1-a70b-4713-b60e-f35bde03ac17
vulnerability,CVE-2023-50920,vulnerability--4614a1a8-03dc-45a8-9e38-58f6e076fd34
vulnerability,CVE-2023-36842,vulnerability--a15b091f-084c-433c-99b5-005bd20dccf4
vulnerability,CVE-2023-6740,vulnerability--db8f435b-1339-4e4f-bfc2-7b1a70bd4cc6
vulnerability,CVE-2023-6040,vulnerability--d6f7e012-344f-406a-8eb9-eb59dc2d104d
vulnerability,CVE-2023-6683,vulnerability--a445b4c9-1db1-4575-b7c9-e146027fe937
vulnerability,CVE-2023-6955,vulnerability--473743d4-e54c-4338-b564-431ffb3a0069
vulnerability,CVE-2023-6735,vulnerability--a8c4e19e-0ce0-4376-aa02-70654c6eeb1a
vulnerability,CVE-2023-40250,vulnerability--f31d2048-de77-482c-b59e-27d3cbe20f9f
vulnerability,CVE-2023-40362,vulnerability--f3c71516-5cac-4e0e-8793-aede439d6d95
vulnerability,CVE-2010-10011,vulnerability--053cbb7c-d00b-4664-8c37-274aa8eb21f7
vulnerability,CVE-2016-20021,vulnerability--21a06598-61f9-48c1-9189-d1c5db03cea4
vulnerability,CVE-2024-23173,vulnerability--e183728a-7007-4e9d-952e-775fc8c0cae6
vulnerability,CVE-2024-23177,vulnerability--bf56683a-d9de-403d-bb22-63f9989537f1
vulnerability,CVE-2024-23178,vulnerability--aef4eb7f-a4db-4cf9-b3cb-dea2ce72faf7
vulnerability,CVE-2024-23172,vulnerability--cbbc66a0-822d-4a04-b6a9-0fceb43739b5
vulnerability,CVE-2024-23171,vulnerability--309df6aa-5780-4b36-87fc-acf7277cfb05
vulnerability,CVE-2024-23179,vulnerability--3695133f-cb2a-43ef-a8d9-c80fe8ef026d
vulnerability,CVE-2024-23301,vulnerability--e4697c8d-b8cd-4957-8162-27a3432f2fd7
vulnerability,CVE-2024-23174,vulnerability--51c266ba-165f-4d65-8916-cb4798f4ac5e
vulnerability,CVE-2024-21587,vulnerability--cadaf612-7999-43be-bc12-8c8c21762d94
vulnerability,CVE-2024-21606,vulnerability--6901785c-7f6a-4129-a44b-7f4108d74c46
vulnerability,CVE-2024-21600,vulnerability--519a799b-c3b7-4b2d-977a-f7bf7cd74c63
vulnerability,CVE-2024-21585,vulnerability--e0cd1c21-3567-44e9-b044-f09d01bcbf47
vulnerability,CVE-2024-21612,vulnerability--25df2234-0251-4d1b-a5f1-11e6872f4bd0
vulnerability,CVE-2024-21887,vulnerability--92d8812e-9d54-474e-9c9d-97f8a316eec8
vulnerability,CVE-2024-21594,vulnerability--03094c96-ba42-4155-99db-b2af03e33534
vulnerability,CVE-2024-21607,vulnerability--e65432c2-7226-4be2-9a37-941f849056a2
vulnerability,CVE-2024-21601,vulnerability--9ac0c304-385d-4e69-943e-6ff6621a9b42
vulnerability,CVE-2024-21595,vulnerability--8ed330b3-0a85-48e3-b7ee-44b21f85f228
vulnerability,CVE-2024-21604,vulnerability--cd4d11a1-c91f-4588-81d8-c21361e11334
vulnerability,CVE-2024-21639,vulnerability--c3a45434-5f0a-4eb2-9300-2478375899d0
vulnerability,CVE-2024-21603,vulnerability--bea77cf8-68f2-4365-83bd-8b5bc47ea281
vulnerability,CVE-2024-21614,vulnerability--b7a1006a-04d6-4500-a5c4-fb3ce84d3841
vulnerability,CVE-2024-21613,vulnerability--43a6457d-9722-484f-b9ed-cd2c203e3db8
vulnerability,CVE-2024-21589,vulnerability--beec453f-0185-49da-aa12-fe00d80968ff
vulnerability,CVE-2024-21655,vulnerability--6dee4368-3531-4121-983e-9f31fb333879
vulnerability,CVE-2024-21597,vulnerability--54f2c24f-5ccd-4138-b596-5b86fd811d2f
vulnerability,CVE-2024-21591,vulnerability--5b65b2aa-82a0-4f9b-a046-7e0249e3e7e5
vulnerability,CVE-2024-21611,vulnerability--8c3da32d-7f80-4571-bfb7-fe7179d298d4
vulnerability,CVE-2024-21616,vulnerability--9089d152-e572-4d16-a463-c7df65e0665f
vulnerability,CVE-2024-21596,vulnerability--0d8ffc61-d826-4a55-84bc-2f897b3313ee
vulnerability,CVE-2024-21654,vulnerability--c976b0b2-5934-4340-89e4-99453d31a9a7
vulnerability,CVE-2024-21617,vulnerability--b0be1ee7-078c-45fa-9287-d2912fd487e4
vulnerability,CVE-2024-21602,vulnerability--ac652b4a-db5e-49d5-957b-a7f8f566a052
vulnerability,CVE-2024-21599,vulnerability--4cb3c394-52b9-499c-9685-e6c0978567c7
vulnerability,CVE-2024-22206,vulnerability--b87ae984-97f5-4f0b-b280-88f9351bfd25
vulnerability,CVE-2024-22494,vulnerability--c8e0a32f-422f-45ba-bc62-30bc56a3f870
vulnerability,CVE-2024-22137,vulnerability--83c3be31-8541-4925-94e1-cee7ff35e562
vulnerability,CVE-2024-22027,vulnerability--995987e9-91f6-4381-b929-2314242e38d1
vulnerability,CVE-2024-22493,vulnerability--b09b6150-cd78-4885-ab91-3796c3d426f9
vulnerability,CVE-2024-22142,vulnerability--93f88a77-4f73-49c8-a281-3a7afd55d053
vulnerability,CVE-2024-22492,vulnerability--b74cbce8-54a3-4935-b999-45d624491354
vulnerability,CVE-2024-0475,vulnerability--280a3eaa-fea1-4a27-8a2e-c56f8c54e43d
vulnerability,CVE-2024-0454,vulnerability--1fff9fef-c66c-4362-889a-28f557af33e3
vulnerability,CVE-2024-0464,vulnerability--b72049ab-5161-48c5-9a20-40bbe82f664f
vulnerability,CVE-2024-0467,vulnerability--a07dfd8c-2d90-4b10-a4ce-8f46f2dc2157
vulnerability,CVE-2024-0466,vulnerability--b683c079-b7a5-48da-8731-a3839bd5efd3
vulnerability,CVE-2024-0460,vulnerability--0b102a5d-49fa-4b2b-8013-79240036036c
vulnerability,CVE-2024-0474,vulnerability--066cfbd9-b198-46da-b1bb-2dd73e6640ad
vulnerability,CVE-2024-0472,vulnerability--e37772a6-1f66-4408-8e00-e360e15919ad
vulnerability,CVE-2024-0468,vulnerability--4785d978-96c5-4f26-b37e-1d0687284071
vulnerability,CVE-2024-0463,vulnerability--8c2a569e-f752-4144-8a52-1725f04fa88e
vulnerability,CVE-2024-0462,vulnerability--eaac9a77-fa43-41ff-bc08-d679806d483b
vulnerability,CVE-2024-0470,vulnerability--0dd49e7d-f086-4c18-9f49-a02d0c3f7a00
vulnerability,CVE-2024-0230,vulnerability--7d83caf1-7443-439f-9154-e763181dc602
vulnerability,CVE-2024-0471,vulnerability--255209af-ac00-4952-ad84-1d8ca39146a5
vulnerability,CVE-2024-0469,vulnerability--84da451f-a3da-47e0-bfaa-b4a3bf6d095b
vulnerability,CVE-2024-0473,vulnerability--57977edd-870e-4dc3-85bb-4699f171ca79
vulnerability,CVE-2024-0461,vulnerability--6ea8638d-6f7f-4ccc-bf3b-ae6b795551c0
vulnerability,CVE-2024-0465,vulnerability--2ea3860a-8a25-401b-9fee-dbb054a6e380
vulnerability,CVE-2024-0459,vulnerability--7d5c65dd-5abf-4481-9aae-a03dc2da2447
vulnerability,CVE-2022-4960,vulnerability--a2fafd41-45d3-4946-813a-d05ceccc37b9
vulnerability,CVE-2022-4961,vulnerability--6af41b7a-43c2-436f-a53e-f06fa5d1bdf5
vulnerability,CVE-2022-4962,vulnerability--ad6c1bb9-cf21-4682-8a1d-83613778c324
vulnerability,CVE-2022-48619,vulnerability--ba4a5d1a-b370-4583-9f02-73d151515fe0
vulnerability,CVE-2022-48620,vulnerability--30a936e7-2e1d-4519-ba8f-fb884d4f23c9
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--459f9e4c-096d-4bca-9b9c-f931e229d541",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03094c96-ba42-4155-99db-b2af03e33534",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-13T00:28:39.125606Z",
"modified": "2024-01-13T00:28:39.125606Z",
"name": "CVE-2024-21594",
"description": "\nA Heap-based Buffer Overflow vulnerability in the Network Services Daemon (NSD) of Juniper Networks Junos OS allows authenticated, low privileged, local attacker to cause a Denial of Service (DoS).\n\nOn an SRX 5000 Series device, when executing a specific command repeatedly, memory is corrupted, which leads to a Flow Processing Daemon (flowd) crash.\n\nThe NSD process has to be restarted to restore services.\n\nIf this issue occurs, it can be checked with the following command:\n\nuser@host> request security policies check\nThe following log message can also be observed:\n\nError: policies are out of sync for PFE node<number>.fpc<number>.pic<number>.\nThis issue affects:\n\nJuniper Networks Junos OS on SRX 5000 Series\n\n\n\n * All versions earlier than 20.4R3-S6;\n * 21.1 versions earlier than 21.1R3-S5;\n * 21.2 versions earlier than 21.2R3-S4;\n * 21.3 versions earlier than 21.3R3-S3;\n * 21.4 versions earlier than 21.4R3-S3;\n * 22.1 versions earlier than 22.1R3-S1;\n * 22.2 versions earlier than 22.2R3;\n * 22.3 versions earlier than 22.3R2.\n\n\n\n\n\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21594"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0954668d-7bd9-493f-bbf0-5ce9ed95a26d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--053cbb7c-d00b-4664-8c37-274aa8eb21f7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-13T00:28:32.645012Z",
"modified": "2024-01-13T00:28:32.645012Z",
"name": "CVE-2010-10011",
"description": "A vulnerability, which was classified as problematic, was found in Acritum Femitter Server 1.04. Affected is an unknown function. The manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250446 is the identifier assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2010-10011"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9e7b9ead-ecaf-40ce-984b-53b5d4d3d9e9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--066cfbd9-b198-46da-b1bb-2dd73e6640ad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-13T00:28:39.283545Z",
"modified": "2024-01-13T00:28:39.283545Z",
"name": "CVE-2024-0474",
"description": "A vulnerability classified as critical was found in code-projects Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250579.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0474"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--42857f86-a27c-4f7a-b509-91340cfb05e1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07761e21-97b2-450a-827f-3cecacd812b0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-13T00:28:29.519368Z",
"modified": "2024-01-13T00:28:29.519368Z",
"name": "CVE-2023-4812",
"description": "An issue has been discovered in GitLab EE affecting all versions starting from 15.3 before 16.5.6, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2. The required CODEOWNERS approval could be bypassed by adding changes to a previously approved merge request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4812"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8f4f03c9-589c-49f9-8135-0ccf2473156e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--086fdd54-7aaa-4dc7-8c97-7a5527fe42cc",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-13T00:28:30.356887Z",
"modified": "2024-01-13T00:28:30.356887Z",
"name": "CVE-2023-49569",
"description": "A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved.\n\nApplications are only affected if they are using the ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using \"Plain\" versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue.\nThis is a go-git implementation issue and does not affect the upstream git cli.\n\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49569"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5585027f-e19f-4d15-8bc5-8d06c09c799d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b102a5d-49fa-4b2b-8013-79240036036c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-13T00:28:39.281964Z",
"modified": "2024-01-13T00:28:39.281964Z",
"name": "CVE-2024-0460",
"description": "A vulnerability was found in code-projects Faculty Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/pages/student-print.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250565 was assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0460"
}
]
}
]
}
Loading

0 comments on commit 308b1f4

Please sign in to comment.