Skip to content

Commit

Permalink
generated content from 2024-02-09
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 9, 2024
1 parent 2763aa7 commit 4e5dfcb
Show file tree
Hide file tree
Showing 90 changed files with 2,047 additions and 0 deletions.
89 changes: 89 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -224828,3 +224828,92 @@ vulnerability,CVE-2023-38369,vulnerability--e17882d7-8dcc-4911-833f-5291cc7491b9
vulnerability,CVE-2023-38995,vulnerability--9e99db4b-ecfb-4791-9374-7d61340250a5
vulnerability,CVE-2023-46914,vulnerability--8c83cabd-d323-45b9-b3a1-c38baad10d2f
vulnerability,CVE-2023-43017,vulnerability--db54d9dd-9b8c-44cd-aecb-fb96fd9b5b61
vulnerability,CVE-2024-1329,vulnerability--7709acef-5740-48cf-b66c-3bd2d928b7a4
vulnerability,CVE-2024-1150,vulnerability--912a11f6-f682-4d45-acc3-2955de202af0
vulnerability,CVE-2024-1149,vulnerability--e79868da-f3c3-4fbe-abdb-c73323ef6005
vulnerability,CVE-2024-1312,vulnerability--68667195-5b26-4da7-a365-54b0f159b35a
vulnerability,CVE-2024-1207,vulnerability--992913a9-e1d1-4f28-aa2c-a993b9c76a8e
vulnerability,CVE-2024-0985,vulnerability--8dbaae05-4c42-4cab-8844-9f61a0415a61
vulnerability,CVE-2024-0242,vulnerability--92a03d5b-bf71-4951-8769-f8173d9a6db1
vulnerability,CVE-2024-0511,vulnerability--71a76839-ad72-4fd2-a460-2845caa5fe9d
vulnerability,CVE-2024-0965,vulnerability--492d9be8-0b14-43de-ae8f-0cab91fdc565
vulnerability,CVE-2024-24113,vulnerability--fa26887d-6f92-4f1b-8991-14e1f26a510c
vulnerability,CVE-2024-24885,vulnerability--17f125b5-f90a-4413-8fa4-cd6c76947f85
vulnerability,CVE-2024-24836,vulnerability--914db902-3e92-47bb-90cc-40dfdd17e287
vulnerability,CVE-2024-24820,vulnerability--f6868b12-1fe4-4ced-9a8a-8de05017e28d
vulnerability,CVE-2024-24881,vulnerability--8ceffcaf-5bce-4ae2-822b-875a9f21fc87
vulnerability,CVE-2024-24014,vulnerability--636a2b2d-e1b9-4238-8e47-53134d6bce20
vulnerability,CVE-2024-24498,vulnerability--02cfe5f8-0e66-4320-ab6e-52b87ca50369
vulnerability,CVE-2024-24003,vulnerability--299409f9-e258-44ab-b24c-eeb273b97093
vulnerability,CVE-2024-24829,vulnerability--f30d7c24-942b-4d2e-b506-ba59b418724d
vulnerability,CVE-2024-24880,vulnerability--6018d8d2-c126-4cd7-92d6-e51590159295
vulnerability,CVE-2024-24215,vulnerability--9e4135b0-93c1-4bea-adc3-59e280772806
vulnerability,CVE-2024-24879,vulnerability--e3e5e6cb-1567-4fe3-b5a6-5a392e41645a
vulnerability,CVE-2024-24017,vulnerability--183a40fe-d23b-4068-9d18-9c6634bd373d
vulnerability,CVE-2024-24494,vulnerability--94812110-23df-4f64-a3eb-3c75abcc4c92
vulnerability,CVE-2024-24018,vulnerability--a881d6f1-2f4e-4764-928d-ee2f682267e1
vulnerability,CVE-2024-24216,vulnerability--3090df76-dcae-40c6-91f8-b329218bdda2
vulnerability,CVE-2024-24321,vulnerability--e8fc8d87-ccd1-4cc9-ad97-268118ad4624
vulnerability,CVE-2024-24830,vulnerability--35d3dd20-9d8a-42f4-ad05-2163424e6b1a
vulnerability,CVE-2024-24495,vulnerability--52e65e48-afaa-4dd4-aaa1-bb8eb5b21d1b
vulnerability,CVE-2024-24024,vulnerability--00b07f1b-9fd2-484b-85fb-75604588dd31
vulnerability,CVE-2024-24393,vulnerability--b9df823b-d471-43cd-b95f-89f2b0fb67db
vulnerability,CVE-2024-24213,vulnerability--e64090dc-4063-4686-9079-29e3e4845294
vulnerability,CVE-2024-24821,vulnerability--3df9ebf7-4da6-4ee9-92ed-727b375dd6c7
vulnerability,CVE-2024-24115,vulnerability--e29fe1fd-3de9-4b8f-a500-7646b14bae91
vulnerability,CVE-2024-24021,vulnerability--e3e433af-5a26-435b-b728-7d68f301b1a6
vulnerability,CVE-2024-24202,vulnerability--2f03984d-eefa-4e9f-bfb1-6abeca09b235
vulnerability,CVE-2024-24825,vulnerability--7f65b5ec-e876-4fb2-872b-fdea5b03cf9a
vulnerability,CVE-2024-24834,vulnerability--2da9c2e4-f3e8-4ca2-94bb-950b736e7ba4
vulnerability,CVE-2024-24023,vulnerability--8f6008e5-fa24-4b01-807b-92321a66a903
vulnerability,CVE-2024-24350,vulnerability--fa40ef4c-3f9e-4413-b5c5-f9dd1587cc1d
vulnerability,CVE-2024-24886,vulnerability--aa305e23-89b2-4b3b-b278-7777f8d21656
vulnerability,CVE-2024-24499,vulnerability--95392fd8-a6ee-4741-bcc9-897b3d7fbf52
vulnerability,CVE-2024-24877,vulnerability--e63de127-ff15-425c-8af4-06cd9d9bb4bd
vulnerability,CVE-2024-24878,vulnerability--43b340cb-b64a-415a-b415-fadff0c58642
vulnerability,CVE-2024-24871,vulnerability--f3801fd8-8cf6-465f-85af-d7ea74c4f456
vulnerability,CVE-2024-24091,vulnerability--3fe01c6d-dd8f-46de-b500-90e7f88c40f4
vulnerability,CVE-2024-24496,vulnerability--b20bb0ec-247f-41b1-a3ed-7cff7a853c80
vulnerability,CVE-2024-24025,vulnerability--1f1ee9bf-4657-4ce3-bbff-a2413d380e17
vulnerability,CVE-2024-24497,vulnerability--f32833c5-7ee7-406f-a213-3a17ba3dc6f6
vulnerability,CVE-2024-24026,vulnerability--ac0ac2dc-9be3-4404-9169-b30603d816a2
vulnerability,CVE-2024-24034,vulnerability--1e31dc5a-0eff-4dc2-845e-1a97432fe654
vulnerability,CVE-2024-23452,vulnerability--f996fa01-52e5-4bc7-9402-f2f31693004e
vulnerability,CVE-2024-23764,vulnerability--35b3368e-6aea-4b54-97a1-c2fd4691e42f
vulnerability,CVE-2024-23756,vulnerability--ca445945-bc02-42c8-85e9-380eb3a87d78
vulnerability,CVE-2024-23660,vulnerability--067a3b34-52d8-48ca-b51a-8b6f47041f49
vulnerability,CVE-2024-22464,vulnerability--4f7397f0-dea1-427b-aa73-4048bf2ce983
vulnerability,CVE-2024-22795,vulnerability--584bc6e7-d3d1-48c5-af71-dae3214106d5
vulnerability,CVE-2024-22394,vulnerability--90ed0889-f39d-4c82-b130-ecfa36af4e63
vulnerability,CVE-2024-22836,vulnerability--0f6b94cc-172f-406d-90dd-50d0258affef
vulnerability,CVE-2024-25146,vulnerability--79db44c2-d745-4999-b4b9-45ecce960e39
vulnerability,CVE-2024-25107,vulnerability--f2487aaf-7669-44bf-96f1-ba3cc656d6dc
vulnerability,CVE-2024-25189,vulnerability--f688f91c-e3af-4232-815f-9746a3711ffa
vulnerability,CVE-2024-25191,vulnerability--50212b87-141f-4fe2-92e3-6842ae5601b2
vulnerability,CVE-2024-25106,vulnerability--cc77fb9a-ea27-4177-974a-f90e4382eff0
vulnerability,CVE-2024-25190,vulnerability--5b32abfe-ed94-430d-bff3-89ecebfe6501
vulnerability,CVE-2024-25144,vulnerability--8b49da36-9199-45fd-842f-95ab25e75a95
vulnerability,CVE-2024-25148,vulnerability--65dd19b7-6073-42b1-a3e3-4bbdff2c0d03
vulnerability,CVE-2023-42282,vulnerability--fa9add93-11ce-4ac9-8f2e-08b2550af114
vulnerability,CVE-2023-6517,vulnerability--e32d7124-70c3-4b4e-979a-196703c618d9
vulnerability,CVE-2023-6564,vulnerability--e0abbf48-c489-43d2-ac46-e51d5727fa8c
vulnerability,CVE-2023-6515,vulnerability--ccc86ca3-95f4-4b4d-9a1d-2cb1ea2bb9d4
vulnerability,CVE-2023-6519,vulnerability--e212f06b-3c7c-4afa-b792-1fae42880ecc
vulnerability,CVE-2023-6518,vulnerability--e571b83e-7cdb-4aa7-b258-62bd5a3a1d0d
vulnerability,CVE-2023-49101,vulnerability--681233d2-63b3-4039-b523-898290958737
vulnerability,CVE-2023-50061,vulnerability--8e747570-25dc-4843-bb4c-016dcc55a2d3
vulnerability,CVE-2023-47131,vulnerability--8a1c5d9b-ffcf-454b-9cc9-b42a30f35d0b
vulnerability,CVE-2023-47020,vulnerability--2f3e4900-13ec-482d-9963-7e4b6198ab12
vulnerability,CVE-2023-47798,vulnerability--70f88780-d25d-4c6d-903c-cba702ff1433
vulnerability,CVE-2023-47132,vulnerability--dc37c29c-c252-40af-a90e-dc0e7ded3881
vulnerability,CVE-2023-48974,vulnerability--e22bf95f-28cb-4434-87fc-974239e9fdbc
vulnerability,CVE-2023-51630,vulnerability--d676505d-fb4e-4cb6-bcc2-dbfea23a97f6
vulnerability,CVE-2023-40265,vulnerability--0d39161e-7414-4297-9f22-7fda3c992862
vulnerability,CVE-2023-40263,vulnerability--10b507b8-121b-447d-90bd-92aa4e4f8706
vulnerability,CVE-2023-40262,vulnerability--76b5f1f6-fe73-4ffa-9e24-7528743ba636
vulnerability,CVE-2023-40264,vulnerability--dc526664-0d0a-445b-92c9-5f0c18469c16
vulnerability,CVE-2023-40266,vulnerability--c80f4d1a-3bb4-4ac9-bee6-4d9d06cdf7dc
vulnerability,CVE-2023-7169,vulnerability--db6a82cb-a555-4c9d-b936-50de143014cf
vulnerability,CVE-2023-25365,vulnerability--06d2218b-a6a4-4264-9c8f-6558e7507907
vulnerability,CVE-2023-5665,vulnerability--5a65cf53-fdb8-497d-b275-6dc6b67e738a
vulnerability,CVE-2023-27001,vulnerability--6e6c330e-9d34-44a3-9271-9d2b5e832859
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b3b69df0-ed28-473b-aa92-da02ae8886c4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00b07f1b-9fd2-484b-85fb-75604588dd31",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.255587Z",
"modified": "2024-02-09T00:26:26.255587Z",
"name": "CVE-2024-24024",
"description": "An arbitrary File download vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: fileDownload(). An attacker can pass in specially crafted filePath and fieName parameters to perform arbitrary File download.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24024"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--50043fbd-f9b3-4d80-8503-b7edc664cae5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02cfe5f8-0e66-4320-ab6e-52b87ca50369",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.231207Z",
"modified": "2024-02-09T00:26:26.231207Z",
"name": "CVE-2024-24498",
"description": "Unrestricted File Upload vulnerability in Employee Management System 1.0 allows a remote attacker to execute arbitrary code via the edit-photo.php component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24498"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--142ccc5e-e3d9-487b-b16f-39a9531c9a0a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--067a3b34-52d8-48ca-b51a-8b6f47041f49",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.33998Z",
"modified": "2024-02-09T00:26:26.33998Z",
"name": "CVE-2024-23660",
"description": "The Binance Trust Wallet app for iOS in commit 3cd6e8f647fbba8b5d8844fcd144365a086b629f, git tag 0.0.4 misuses the trezor-crypto library and consequently generates mnemonic words for which the device time is the only entropy source, leading to economic losses, as exploited in the wild in July 2023. An attacker can systematically generate mnemonics for each timestamp within an applicable timeframe, and link them to specific wallet addresses in order to steal funds from those wallets.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23660"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cd3dafab-b050-4409-938b-0dd65cd3d662",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06d2218b-a6a4-4264-9c8f-6558e7507907",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:31.052161Z",
"modified": "2024-02-09T00:26:31.052161Z",
"name": "CVE-2023-25365",
"description": "Cross Site Scripting vulnerability found in October CMS v.3.2.0 allows local attacker to execute arbitrary code via the file type .mp3",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-25365"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c9112e81-f14e-4005-b403-9f0db7d0dfa5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d39161e-7414-4297-9f22-7fda3c992862",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:30.524053Z",
"modified": "2024-02-09T00:26:30.524053Z",
"name": "CVE-2023-40265",
"description": "An issue was discovered in Atos Unify OpenScape Xpressions WebAssistant V7 before V7R1 FR5 HF42 P911. It allows authenticated remote code execution via file upload.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40265"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fe662998-f4cc-4f60-8c02-fa47e15d768b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f6b94cc-172f-406d-90dd-50d0258affef",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.397951Z",
"modified": "2024-02-09T00:26:26.397951Z",
"name": "CVE-2024-22836",
"description": "An OS command injection vulnerability exists in Akaunting v3.1.3 and earlier. An attacker can manipulate the company locale when installing an app to execute system commands on the hosting server.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22836"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a52b0e81-3236-4981-b78e-6077d4c53980",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10b507b8-121b-447d-90bd-92aa4e4f8706",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:30.530757Z",
"modified": "2024-02-09T00:26:30.530757Z",
"name": "CVE-2023-40263",
"description": "An issue was discovered in Atos Unify OpenScape Voice Trace Manager V8 before V8 R0.9.11. It allows authenticated command injection via ftp.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40263"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5a5da09c-e006-4a69-8d2b-4913691eaa50",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--17f125b5-f90a-4413-8fa4-cd6c76947f85",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.222027Z",
"modified": "2024-02-09T00:26:26.222027Z",
"name": "CVE-2024-24885",
"description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lê Văn Toản Woocommerce Vietnam Checkout allows Stored XSS.This issue affects Woocommerce Vietnam Checkout: from n/a through 2.0.7.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24885"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5d3ac7fa-3649-471d-a003-b1a96c36e935",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--183a40fe-d23b-4068-9d18-9c6634bd373d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.241188Z",
"modified": "2024-02-09T00:26:26.241188Z",
"name": "CVE-2024-24017",
"description": "A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass crafted offset, limit, and sort parameters to perform SQL injection via /common/dict/list",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24017"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4b05ce5d-e397-44b1-93b9-10a1f04459c1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e31dc5a-0eff-4dc2-845e-1a97432fe654",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.297505Z",
"modified": "2024-02-09T00:26:26.297505Z",
"name": "CVE-2024-24034",
"description": "Setor Informatica S.I.L version 3.0 is vulnerable to Open Redirect via the hprinter parameter, allows remote attackers to execute arbitrary code.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24034"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--87d71691-e61b-4ac5-aba5-d5072df16070",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f1ee9bf-4657-4ce3-bbff-a2413d380e17",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.287639Z",
"modified": "2024-02-09T00:26:26.287639Z",
"name": "CVE-2024-24025",
"description": "An arbitrary File upload vulnerability exists in Novel-Plus v4.3.0-RC1 and prior at com.java2nb.common.controller.FileController: upload(). An attacker can pass in specially crafted filename parameter to perform arbitrary File download.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24025"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--715bf747-c1c4-4ff6-9727-3f473efe299a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--299409f9-e258-44ab-b24c-eeb273b97093",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-09T00:26:26.232208Z",
"modified": "2024-02-09T00:26:26.232208Z",
"name": "CVE-2024-24003",
"description": "jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutMaterialCount() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24003"
}
]
}
]
}
Loading

0 comments on commit 4e5dfcb

Please sign in to comment.