Skip to content

Commit

Permalink
generated content from 2024-02-17
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 17, 2024
1 parent f290da7 commit 6d73913
Show file tree
Hide file tree
Showing 53 changed files with 1,196 additions and 0 deletions.
52 changes: 52 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -225596,3 +225596,55 @@ vulnerability,CVE-2022-23088,vulnerability--f0f79f1f-1d05-4ad6-98ac-9b62d1487ca0
vulnerability,CVE-2022-23090,vulnerability--b510e7b6-07ad-475b-a627-457f8fb9afc3
vulnerability,CVE-2022-23086,vulnerability--0b1bd7c9-c45a-4edf-9081-4604e7200ce0
vulnerability,CVE-2022-23092,vulnerability--502b3f15-de2a-45e9-888f-f4c2338b9c57
vulnerability,CVE-2023-40085,vulnerability--d07bc693-7735-4c92-bc3e-fb46c8b07f89
vulnerability,CVE-2023-40093,vulnerability--6656e3ae-d5b3-4f9e-8c9f-6c322c271c67
vulnerability,CVE-2023-40122,vulnerability--6577ae1f-83a1-4824-a351-266b1833ce22
vulnerability,CVE-2023-49508,vulnerability--ad12cf80-b1fe-49fe-9419-15aa8348af5c
vulnerability,CVE-2023-45918,vulnerability--8f4586f0-9ede-4881-af31-535b9d1b01bf
vulnerability,CVE-2023-45860,vulnerability--df82b56a-a7c4-4ed7-9abd-c6179602a74a
vulnerability,CVE-2023-6451,vulnerability--e9698784-5f88-4143-97ca-3af8a76e8d7b
vulnerability,CVE-2023-51931,vulnerability--29551eeb-f5b2-4ec8-8c1e-969f72edae23
vulnerability,CVE-2023-21165,vulnerability--6579f117-c40e-4688-9564-6f69079799e4
vulnerability,CVE-2024-22425,vulnerability--ea0285bf-b7a7-423c-b23b-bd10bca55000
vulnerability,CVE-2024-22854,vulnerability--cde89034-0039-4026-94aa-d775bd950238
vulnerability,CVE-2024-22426,vulnerability--70d0e33e-d603-4b1a-8a03-3cc539e479de
vulnerability,CVE-2024-1591,vulnerability--3ff8ce40-6036-400d-ad1f-7da4cf97b7c7
vulnerability,CVE-2024-1342,vulnerability--87c03bc2-d304-4bba-84b8-2e9b7e3fc391
vulnerability,CVE-2024-23591,vulnerability--dbbc3d94-d6dc-4fdc-9aac-c90e2d012a1b
vulnerability,CVE-2024-0019,vulnerability--b8a1d5b7-5871-4486-8517-371ced8450f7
vulnerability,CVE-2024-0041,vulnerability--9e994e97-0486-46d3-8ffa-1366b08015a4
vulnerability,CVE-2024-0021,vulnerability--5735dfb4-a25b-413c-9b33-802ce220855c
vulnerability,CVE-2024-0031,vulnerability--65eac96a-a194-4aef-be30-aaaaf31a75aa
vulnerability,CVE-2024-0038,vulnerability--e59d1781-fb43-446a-b9ad-f64f5305d33d
vulnerability,CVE-2024-0037,vulnerability--ee0f0869-2097-4eb0-9afd-102e29da915a
vulnerability,CVE-2024-0033,vulnerability--7dcca52a-6786-4034-b9e2-4b1c0b35c2b4
vulnerability,CVE-2024-0036,vulnerability--f93748ad-2553-451c-a8cf-2cb4fcc194e5
vulnerability,CVE-2024-0029,vulnerability--6ea75eb6-d082-42a2-a9e6-8b489dec8c9d
vulnerability,CVE-2024-0017,vulnerability--ae364f73-3ce7-443e-94fb-e0bd3f0bd995
vulnerability,CVE-2024-0032,vulnerability--21ac3178-965d-438e-964b-9f2373131ba7
vulnerability,CVE-2024-0018,vulnerability--882a20ff-97f9-4632-8f73-af0515c11b83
vulnerability,CVE-2024-0030,vulnerability--4902054b-28f1-4b69-ad50-6766495c13d5
vulnerability,CVE-2024-0015,vulnerability--09351291-b941-4202-87cf-9a1fae6035a4
vulnerability,CVE-2024-0034,vulnerability--71b50b4c-ae7a-4748-8de4-7c8f2a04847f
vulnerability,CVE-2024-0023,vulnerability--756d2bf1-ca3d-4750-a2a3-37ea0d0589fa
vulnerability,CVE-2024-0020,vulnerability--8e8a9635-7504-4c1b-92aa-21389355faf8
vulnerability,CVE-2024-0014,vulnerability--1feb4342-ec6f-4510-aca6-6bed80138eed
vulnerability,CVE-2024-0016,vulnerability--9a7fa972-a3d3-4990-8fb3-b43f14447dc4
vulnerability,CVE-2024-0035,vulnerability--26225779-5145-4bac-a25a-caa331269d1e
vulnerability,CVE-2024-0040,vulnerability--8409d5b1-a518-472b-8bde-4279ca73c33a
vulnerability,CVE-2024-24758,vulnerability--0904e0fa-533a-423b-aded-3f74d9979668
vulnerability,CVE-2024-24750,vulnerability--996d576c-cc6e-424f-bb7b-ea72eeef91a3
vulnerability,CVE-2024-24377,vulnerability--c864472f-0bb1-465f-a4dd-ec37b91b04b6
vulnerability,CVE-2024-21775,vulnerability--ae8d83f1-3af6-4cbc-afbc-df4785ebd26d
vulnerability,CVE-2024-21915,vulnerability--e3d4a19c-d99f-4d1e-ad4c-4cc7f8f98491
vulnerability,CVE-2024-21983,vulnerability--23f934ee-38f6-4f6c-8703-1a81e32846c9
vulnerability,CVE-2024-21984,vulnerability--08d48d16-570e-43e6-921f-ad10be874ee8
vulnerability,CVE-2024-21987,vulnerability--45b78b01-3140-4ca7-8933-72752304d248
vulnerability,CVE-2024-25466,vulnerability--9f322d53-0dc6-4a00-b967-75858e383313
vulnerability,CVE-2024-25627,vulnerability--69d2617e-b661-419d-b652-0ae8b9801236
vulnerability,CVE-2024-25628,vulnerability--aba8bc9f-5ae8-465b-af00-697c07645e20
vulnerability,CVE-2024-25083,vulnerability--39084c2d-996b-4d60-aac9-325474c9b32b
vulnerability,CVE-2024-25415,vulnerability--e216f36a-6e39-461a-887b-c6debd6733fb
vulnerability,CVE-2024-25320,vulnerability--afb50c34-0cb0-4710-99dd-3fea2c2cc938
vulnerability,CVE-2024-25414,vulnerability--93c6aa1a-65eb-412e-a497-d6704f05eef3
vulnerability,CVE-2024-25413,vulnerability--edc13731-1047-4c00-bb6a-bc036665ee07
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5ed896e0-ef16-49ec-87e3-62f72177ff1b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08d48d16-570e-43e6-921f-ad10be874ee8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.548491Z",
"modified": "2024-02-17T00:26:50.548491Z",
"name": "CVE-2024-21984",
"description": "StorageGRID (formerly StorageGRID Webscale) versions prior to 11.8 \nare susceptible to a difficult to exploit Reflected Cross-Site Scripting\n (XSS) vulnerability. Successful exploit requires the attacker to know \nspecific information about the target instance and trick a privileged \nuser into clicking a specially crafted link. This could allow the \nattacker to view or modify configuration settings or add or modify user \naccounts. \n\n\n\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21984"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3bad4180-c26b-4a49-8ffc-83b436f59868",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0904e0fa-533a-423b-aded-3f74d9979668",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.480174Z",
"modified": "2024-02-17T00:26:50.480174Z",
"name": "CVE-2024-24758",
"description": "Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24758"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4aa22232-fa4f-41a6-9c70-acad790aac34",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09351291-b941-4202-87cf-9a1fae6035a4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.448214Z",
"modified": "2024-02-17T00:26:50.448214Z",
"name": "CVE-2024-0015",
"description": "In convertToComponentName of DreamService.java, there is a possible way to launch arbitrary protected activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0015"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b13cbc0b-e8ac-44e1-9030-575c48565364",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1feb4342-ec6f-4510-aca6-6bed80138eed",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.457814Z",
"modified": "2024-02-17T00:26:50.457814Z",
"name": "CVE-2024-0014",
"description": "In startInstall of UpdateFetcher.java, there is a possible way to trigger a malicious config update due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0014"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8befaf55-a2f0-40ac-a246-6926c984c353",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21ac3178-965d-438e-964b-9f2373131ba7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.437382Z",
"modified": "2024-02-17T00:26:50.437382Z",
"name": "CVE-2024-0032",
"description": "In queryChildDocuments of FileSystemProvider.java, there is a possible way to request access to directories that should be hidden due to improper input validation. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0032"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--653c0644-fe2e-494a-b485-1e0df3cf39ee",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--23f934ee-38f6-4f6c-8703-1a81e32846c9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.54586Z",
"modified": "2024-02-17T00:26:50.54586Z",
"name": "CVE-2024-21983",
"description": "StorageGRID (formerly StorageGRID Webscale) versions prior to 11.8 \nare susceptible to a Denial of Service (DoS) vulnerability. Successful \nexploit by an authenticated attacker could lead to an out of memory \ncondition or node reboot.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21983"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3113049d-f905-4844-80b7-457af8bc432b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--26225779-5145-4bac-a25a-caa331269d1e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.461357Z",
"modified": "2024-02-17T00:26:50.461357Z",
"name": "CVE-2024-0035",
"description": "In onNullBinding of TileLifecycleManager.java, there is a possible way to launch an activity from the background due to a missing null check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0035"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0eaee21c-ed01-4d38-a744-0890653b0f1e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--29551eeb-f5b2-4ec8-8c1e-969f72edae23",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:48.355406Z",
"modified": "2024-02-17T00:26:48.355406Z",
"name": "CVE-2023-51931",
"description": "An issue in alanclarke URLite v.3.1.0 allows an attacker to cause a denial of service (DoS) via a crafted payload to the parsing function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-51931"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2dd37441-e90c-496d-9965-a3dd0da2cd77",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--39084c2d-996b-4d60-aac9-325474c9b32b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.578003Z",
"modified": "2024-02-17T00:26:50.578003Z",
"name": "CVE-2024-25083",
"description": "An issue was discovered in BeyondTrust Privilege Management for Windows before 24.1. When an low-privileged user initiates a repair, there is an attack vector through which the user is able to execute any program with elevated privileges.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-25083"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--52c17443-c77d-4e0f-a6cc-d938b3b0e190",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3ff8ce40-6036-400d-ad1f-7da4cf97b7c7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.301943Z",
"modified": "2024-02-17T00:26:50.301943Z",
"name": "CVE-2024-1591",
"description": "Prior to version 24.1, a local authenticated attacker can view Sysvol when Privilege Management for Windows is configured to use a GPO policy. This allows them to view the policy and potentially find configuration issues.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1591"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a86a3a3f-6411-425a-b191-f53b9088508f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--45b78b01-3140-4ca7-8933-72752304d248",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.555476Z",
"modified": "2024-02-17T00:26:50.555476Z",
"name": "CVE-2024-21987",
"description": "SnapCenter versions 4.8 prior to 5.0 are susceptible to a \nvulnerability which could allow an authenticated SnapCenter Server user \nto modify system logging configuration settings\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21987"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b0b2726e-458b-49fa-95e1-6af98df74644",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4902054b-28f1-4b69-ad50-6766495c13d5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.446927Z",
"modified": "2024-02-17T00:26:50.446927Z",
"name": "CVE-2024-0030",
"description": "In btif_to_bta_response of btif_gatt_util.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0030"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--66baaa63-2d7c-49bc-8a3e-0d21a26830e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5735dfb4-a25b-413c-9b33-802ce220855c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:50.406555Z",
"modified": "2024-02-17T00:26:50.406555Z",
"name": "CVE-2024-0021",
"description": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible way for an app in the work profile to enable notification listener services due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0021"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a0f4b613-d504-4645-b0fd-a6f41e9fcdb5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--6577ae1f-83a1-4824-a351-266b1833ce22",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-17T00:26:47.09194Z",
"modified": "2024-02-17T00:26:47.09194Z",
"name": "CVE-2023-40122",
"description": "In applyCustomDescription of SaveUi.java, there is a possible way to view other user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40122"
}
]
}
]
}
Loading

0 comments on commit 6d73913

Please sign in to comment.