Skip to content

Commit

Permalink
generated content from 2024-01-26
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 26, 2024
1 parent 50b23a4 commit 6ed0aa2
Show file tree
Hide file tree
Showing 74 changed files with 1,679 additions and 0 deletions.
73 changes: 73 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -223689,3 +223689,76 @@ vulnerability,CVE-2024-22372,vulnerability--d9f7b72c-b128-4551-8093-2a7c44942f53
vulnerability,CVE-2024-0665,vulnerability--558797cf-81d7-4168-b944-99c9127d9273
vulnerability,CVE-2024-0854,vulnerability--338daf43-f542-436f-a3c8-ddfbb9146986
vulnerability,CVE-2022-4964,vulnerability--617affeb-41b2-4a73-8a9d-afaefc45aedb
vulnerability,CVE-2024-22432,vulnerability--5dcb5fe1-0903-402a-9f80-0d14f71a1872
vulnerability,CVE-2024-22749,vulnerability--ef741574-8f06-4095-a570-fb6b8bf310ad
vulnerability,CVE-2024-22635,vulnerability--2386d0c7-3e70-4870-a4b3-0ee0a346871f
vulnerability,CVE-2024-22639,vulnerability--d7d97e0f-ec19-4005-beb9-73a1120c3c5d
vulnerability,CVE-2024-22637,vulnerability--74b58e2f-70aa-4b09-a46f-693e17d7d517
vulnerability,CVE-2024-22729,vulnerability--4d83990a-c11f-4bc7-9f06-4fbc8c135d1d
vulnerability,CVE-2024-22922,vulnerability--03b1b916-d339-423f-bb3c-a6165b61a5f5
vulnerability,CVE-2024-22099,vulnerability--196c3135-924e-4a0c-9b7a-28a5bdb77584
vulnerability,CVE-2024-22638,vulnerability--3dfc8721-ac20-470b-81ae-3217bb780a70
vulnerability,CVE-2024-22636,vulnerability--e68c90f8-a453-4bde-b4e3-aa02d91be681
vulnerability,CVE-2024-22529,vulnerability--4d9a0233-615d-45fa-bd4f-174cb3500ef8
vulnerability,CVE-2024-24399,vulnerability--60e767b8-2f30-44c0-b9ef-61f72a8fd0ba
vulnerability,CVE-2024-23615,vulnerability--0bf32e25-186d-4408-a4b9-af59abcab866
vulnerability,CVE-2024-23628,vulnerability--214bf9bc-780a-45c4-b185-6d9b9d0b03cb
vulnerability,CVE-2024-23616,vulnerability--0b70929c-19dc-4d4a-a2d0-4a2429fd6648
vulnerability,CVE-2024-23614,vulnerability--1a9ae383-ef5c-485b-b45c-9e8d603c1902
vulnerability,CVE-2024-23620,vulnerability--7570b1fd-e71b-42b2-b7aa-61a06af0cd6f
vulnerability,CVE-2024-23630,vulnerability--adf49e92-2ce0-4bf6-9c37-3944fce028ec
vulnerability,CVE-2024-23617,vulnerability--33dae4ee-5539-4fd9-995d-6e76c2365b3f
vulnerability,CVE-2024-23855,vulnerability--5b600359-5c2f-4e80-a8e3-c4b28424aede
vulnerability,CVE-2024-23625,vulnerability--1f118a01-a8a9-4e7b-88a5-cef665141315
vulnerability,CVE-2024-23624,vulnerability--9186d281-ac64-431f-849f-cdaa235695b0
vulnerability,CVE-2024-23622,vulnerability--397f3e84-5443-4647-9144-cf8be514fb9f
vulnerability,CVE-2024-23618,vulnerability--e74556e3-ab5d-4562-a0fd-9e6d1e9e65fa
vulnerability,CVE-2024-23619,vulnerability--f0e712e2-48f3-4c21-8cf3-8b12151354cf
vulnerability,CVE-2024-23613,vulnerability--886e2629-b80c-43a5-baaa-35742c79eafc
vulnerability,CVE-2024-23629,vulnerability--79ad6405-75cd-4753-902a-1cc7b6588a1b
vulnerability,CVE-2024-23307,vulnerability--f03d9695-11b5-4e10-b129-4cc4e5e65cfd
vulnerability,CVE-2024-23985,vulnerability--0e684b60-f559-4796-b9c9-7596108a6a12
vulnerability,CVE-2024-23621,vulnerability--f8efcd58-cd49-4020-a248-4f59dc274fc3
vulnerability,CVE-2024-23817,vulnerability--2c5fc24e-7337-4e0c-88b7-ad16f8ce1618
vulnerability,CVE-2024-23626,vulnerability--5b668291-2d07-40f5-9aee-61402d995f49
vulnerability,CVE-2024-23655,vulnerability--a139ce68-c0ad-4ed6-addb-92afed858f32
vulnerability,CVE-2024-23656,vulnerability--3c43e16b-473c-4909-aa57-91b09dab0a79
vulnerability,CVE-2024-23055,vulnerability--38f724ea-ce9a-4c20-8965-dbf4cbbe4b6d
vulnerability,CVE-2024-23627,vulnerability--86336f2a-b433-4b60-a699-bbf67120da91
vulnerability,CVE-2024-21620,vulnerability--ca2dc957-08ee-4ca6-a78a-56140a003133
vulnerability,CVE-2024-21619,vulnerability--897702c4-15b3-4634-82dd-9e3257875a77
vulnerability,CVE-2024-21630,vulnerability--fc4ccb66-d03d-4fbd-b45e-3b00a7083b29
vulnerability,CVE-2024-0891,vulnerability--b2eb2419-b94b-4daf-9f73-56f999e58965
vulnerability,CVE-2024-0624,vulnerability--1f2db014-6275-4bd8-8d44-88cc8639f3aa
vulnerability,CVE-2024-0882,vulnerability--25e3c741-304f-4a06-ad18-dc27e5952f25
vulnerability,CVE-2024-0625,vulnerability--3b57cd66-f834-4929-a929-1bbb460638a5
vulnerability,CVE-2024-0885,vulnerability--16216161-b7a4-4da7-a76f-dab463f89614
vulnerability,CVE-2024-0617,vulnerability--200a3aa1-7b58-4542-9868-e65aa838d700
vulnerability,CVE-2024-0886,vulnerability--071dbcf7-2eda-4bcd-ab3a-51053db04bc6
vulnerability,CVE-2024-0883,vulnerability--ab16e045-0f41-42b8-9cc9-6e6cab52a849
vulnerability,CVE-2024-0884,vulnerability--17b62087-f2c1-44c2-9491-8f3845e44616
vulnerability,CVE-2024-0880,vulnerability--16e26f32-f185-4279-b994-5006b112d6c7
vulnerability,CVE-2024-0879,vulnerability--3d2abd2e-1d7c-4992-8195-5e68e2dc3320
vulnerability,CVE-2024-0887,vulnerability--a48d6370-e67a-425f-9eb9-027eef4769a0
vulnerability,CVE-2024-0890,vulnerability--7fefeed8-aa62-40e9-8966-f49440905a8e
vulnerability,CVE-2024-0822,vulnerability--748d1df0-bda4-4812-a35a-6c7cb1c3df12
vulnerability,CVE-2024-0888,vulnerability--25136df3-a21d-4692-be9f-aa11e2ac0891
vulnerability,CVE-2024-0688,vulnerability--fadf23a2-f993-449e-a653-8e11a5402a77
vulnerability,CVE-2024-0889,vulnerability--afa08a30-e758-4a8c-a663-fd4bb7ea09ca
vulnerability,CVE-2023-3181,vulnerability--8d4689df-a431-4941-949f-938f27a180ec
vulnerability,CVE-2023-7227,vulnerability--e0b03ddf-d759-4531-9648-c195affca5fc
vulnerability,CVE-2023-52046,vulnerability--188df062-a9f5-4fb8-9182-298f1ac53089
vulnerability,CVE-2023-52251,vulnerability--9bb76ff3-94cf-422c-a281-3cde18bd84c9
vulnerability,CVE-2023-52356,vulnerability--5abbc564-42cc-4989-9398-8f0c6176c5fe
vulnerability,CVE-2023-52076,vulnerability--d2ae4f5f-51dc-4923-ac76-24afee3364c1
vulnerability,CVE-2023-52355,vulnerability--02a39f12-9fe0-4554-bc2e-0b9ee3b05818
vulnerability,CVE-2023-40547,vulnerability--5291ce6d-054b-4a5f-8d17-7846dac031c0
vulnerability,CVE-2023-33757,vulnerability--d5bc3894-ee02-4a43-a5c4-c698a7916b6b
vulnerability,CVE-2023-33759,vulnerability--db7b296f-3176-4f4e-92d5-e520449802ba
vulnerability,CVE-2023-33760,vulnerability--d82c1cbe-c9b6-4c99-bc28-b2d267bca7de
vulnerability,CVE-2023-33758,vulnerability--a1c357f9-6437-4689-b0fb-8f383ecd4c54
vulnerability,CVE-2023-41474,vulnerability--b9838bc7-389e-4656-aa1b-e9fcf0053595
vulnerability,CVE-2023-50785,vulnerability--4e3e3700-76d8-4514-8d02-505cf2a0ea79
vulnerability,CVE-2023-6267,vulnerability--47ee9ec3-b088-48ba-b164-e04f73d54ff0
vulnerability,CVE-2023-6282,vulnerability--516a4575-d337-4d17-a824-93ba1a5812f4
vulnerability,CVE-2023-51833,vulnerability--3447376d-7cbe-403b-8a02-c7f1afd05829
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5674871a-74ab-4d67-85ab-b6e195ebdf4d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02a39f12-9fe0-4554-bc2e-0b9ee3b05818",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:30.544031Z",
"modified": "2024-01-26T00:27:30.544031Z",
"name": "CVE-2023-52355",
"description": "An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-52355"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--63d1e364-1f41-4be2-bf61-5f4e88c628f8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03b1b916-d339-423f-bb3c-a6165b61a5f5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.159847Z",
"modified": "2024-01-26T00:27:23.159847Z",
"name": "CVE-2024-22922",
"description": "An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22922"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e134ed43-bf6d-4283-9144-07a8b1c40980",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--071dbcf7-2eda-4bcd-ab3a-51053db04bc6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.344982Z",
"modified": "2024-01-26T00:27:23.344982Z",
"name": "CVE-2024-0886",
"description": "A vulnerability classified as problematic was found in Poikosoft EZ CD Audio Converter 8.0.7. Affected by this vulnerability is an unknown functionality of the component Activation Handler. The manipulation of the argument Key leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-252037 was assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0886"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--15d1c039-7eb3-4aac-b827-fd135f15ea38",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b70929c-19dc-4d4a-a2d0-4a2429fd6648",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.218971Z",
"modified": "2024-01-26T00:27:23.218971Z",
"name": "CVE-2024-23616",
"description": "A buffer overflow vulnerability exists in Symantec Server Management Suite version 7.9 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23616"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--bd9eece9-7888-4624-a748-ea7b1d5e5e25",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0bf32e25-186d-4408-a4b9-af59abcab866",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.214573Z",
"modified": "2024-01-26T00:27:23.214573Z",
"name": "CVE-2024-23615",
"description": "A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23615"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--10ffdaf4-fd1d-47f9-a9f8-a81d9d3b6090",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e684b60-f559-4796-b9c9-7596108a6a12",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.25424Z",
"modified": "2024-01-26T00:27:23.25424Z",
"name": "CVE-2024-23985",
"description": "EzServer 6.4.017 allows a denial of service (daemon crash) via a long string, such as one for the RNTO command.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23985"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9927636e-3d20-4e71-9b8c-b89b6adf21e7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16216161-b7a4-4da7-a76f-dab463f89614",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.337164Z",
"modified": "2024-01-26T00:27:23.337164Z",
"name": "CVE-2024-0885",
"description": "A vulnerability classified as problematic has been found in SpyCamLizard 1.230. Affected is an unknown function of the component HTTP GET Request Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252036.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0885"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0fe1681e-6844-46a0-8827-b27b53c5147a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16e26f32-f185-4279-b994-5006b112d6c7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.353391Z",
"modified": "2024-01-26T00:27:23.353391Z",
"name": "CVE-2024-0880",
"description": "A vulnerability was found in Qidianbang qdbcrm 1.1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/edit?id=2 of the component Password Reset. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252032. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0880"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9bfacd2f-4d45-427e-9137-bf797f8c504c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--17b62087-f2c1-44c2-9491-8f3845e44616",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.351564Z",
"modified": "2024-01-26T00:27:23.351564Z",
"name": "CVE-2024-0884",
"description": "A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects the function exec of the file payment.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252035.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0884"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3cff9867-497b-46cd-91f1-b7fa499dafae",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--188df062-a9f5-4fb8-9182-298f1ac53089",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:30.525224Z",
"modified": "2024-01-26T00:27:30.525224Z",
"name": "CVE-2023-52046",
"description": "Cross Site Scripting vulnerability (XSS) in webmin v.2.105 and earlier allows a remote attacker to execute arbitrary code via a crafted payload to the \"Execute cron job as\" tab Input field.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-52046"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9f1e2a44-816a-4dbc-8c9e-31af21bc5756",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--196c3135-924e-4a0c-9b7a-28a5bdb77584",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.161161Z",
"modified": "2024-01-26T00:27:23.161161Z",
"name": "CVE-2024-22099",
"description": "NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.\n\nThis issue affects Linux kernel: v2.6.12-rc2.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22099"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--af20335e-a1a8-4d5e-bc9e-47ffae265c45",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1a9ae383-ef5c-485b-b45c-9e8d603c1902",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.220645Z",
"modified": "2024-01-26T00:27:23.220645Z",
"name": "CVE-2024-23614",
"description": "A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23614"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5342ba72-fbc5-4dda-ae3f-e452e2b57864",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f118a01-a8a9-4e7b-88a5-cef665141315",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-26T00:27:23.235871Z",
"modified": "2024-01-26T00:27:23.235871Z",
"name": "CVE-2024-23625",
"description": "A command injection vulnerability exists in D-Link DAP-1650 devices when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23625"
}
]
}
]
}
Loading

0 comments on commit 6ed0aa2

Please sign in to comment.