Skip to content

Commit

Permalink
generated content from 2024-01-29
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 29, 2024
1 parent b78d4ea commit cde171e
Show file tree
Hide file tree
Showing 11 changed files with 230 additions and 0 deletions.
10 changes: 10 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -223888,3 +223888,13 @@ vulnerability,CVE-2023-6482,vulnerability--a8f57925-2a2e-41a4-943e-084d9c307ea2
vulnerability,CVE-2023-6497,vulnerability--036b8d60-d9d4-462a-a705-0cd051ac666d
vulnerability,CVE-2023-48202,vulnerability--e876e708-36a5-42ea-9289-eeb7df9043ab
vulnerability,CVE-2023-48201,vulnerability--93916a80-a490-4109-8e1b-b623f9162738
vulnerability,CVE-2024-23782,vulnerability--47aba97d-868e-4fc7-8fa2-0c380bfb685c
vulnerability,CVE-2024-23742,vulnerability--dc27bb91-252b-4abf-99ea-48e0ae679eb7
vulnerability,CVE-2024-23743,vulnerability--ad591e46-893b-493d-a018-6f1846c8f847
vulnerability,CVE-2024-23740,vulnerability--d6eb682d-202e-47a0-81b5-de1719e7422a
vulnerability,CVE-2024-23738,vulnerability--8b5051c3-b279-4aa3-9b49-41aceb53dcb1
vulnerability,CVE-2024-23739,vulnerability--1e908ec4-a129-4443-af66-0a1bf3711b2e
vulnerability,CVE-2024-23741,vulnerability--32343a0e-e1ac-49b3-88cc-2b0711844d53
vulnerability,CVE-2024-0986,vulnerability--739617f1-a812-408b-9047-f16622cef8db
vulnerability,CVE-2024-0841,vulnerability--d71c49bc-434f-4bba-a4e6-dd0a22645521
vulnerability,CVE-2023-6200,vulnerability--b0649f56-2097-47fb-9d68-f9fcf0691d06
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a4112433-eda9-48ff-8c7f-0ae2859f1a64",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1e908ec4-a129-4443-af66-0a1bf3711b2e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.750916Z",
"modified": "2024-01-29T00:27:26.750916Z",
"name": "CVE-2024-23739",
"description": "An issue in Discord for macOS version 0.0.291 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23739"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3a80fe0e-a3b3-4137-b7cb-e4557e366a7c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--32343a0e-e1ac-49b3-88cc-2b0711844d53",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.755042Z",
"modified": "2024-01-29T00:27:26.755042Z",
"name": "CVE-2024-23741",
"description": "An issue in Hyper on macOS version 3.4.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23741"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--39157858-d2e4-49bb-9b7d-9ca7cb40c8d7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--47aba97d-868e-4fc7-8fa2-0c380bfb685c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.711353Z",
"modified": "2024-01-29T00:27:26.711353Z",
"name": "CVE-2024-23782",
"description": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23782"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f02eaebc-80be-4695-ae2b-e63b9fac4ff1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--739617f1-a812-408b-9047-f16622cef8db",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.804469Z",
"modified": "2024-01-29T00:27:26.804469Z",
"name": "CVE-2024-0986",
"description": "A vulnerability was found in Issabel PBX 4.0.0. It has been rated as critical. This issue affects some unknown processing of the file /index.php?menu=asterisk_cli of the component Asterisk-Cli. The manipulation of the argument Command leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252251. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0986"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5764eee3-42cf-4cc9-8934-1db0497eb4c1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--8b5051c3-b279-4aa3-9b49-41aceb53dcb1",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.745906Z",
"modified": "2024-01-29T00:27:26.745906Z",
"name": "CVE-2024-23738",
"description": "An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23738"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--de3655e2-f79e-4d79-83b2-1cf3e0325701",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--ad591e46-893b-493d-a018-6f1846c8f847",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.737628Z",
"modified": "2024-01-29T00:27:26.737628Z",
"name": "CVE-2024-23743",
"description": "An issue in Notion for macOS version 3.1.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23743"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--46dd70fb-cb6f-4fce-ade1-3d82ef18dc3f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b0649f56-2097-47fb-9d68-f9fcf0691d06",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:34.731152Z",
"modified": "2024-01-29T00:27:34.731152Z",
"name": "CVE-2023-6200",
"description": "A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6200"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7a2636c7-eab6-4c58-b669-61bfea2d504e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--d6eb682d-202e-47a0-81b5-de1719e7422a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.741818Z",
"modified": "2024-01-29T00:27:26.741818Z",
"name": "CVE-2024-23740",
"description": "An issue in Kap for macOS version 3.6.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23740"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f78aa0ef-511c-4478-bd4e-93a5087968fb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--d71c49bc-434f-4bba-a4e6-dd0a22645521",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.814147Z",
"modified": "2024-01-29T00:27:26.814147Z",
"name": "CVE-2024-0841",
"description": "A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0841"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--222d95d2-8ea6-4ccd-b8d8-22b11d83d274",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--dc27bb91-252b-4abf-99ea-48e0ae679eb7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-29T00:27:26.730501Z",
"modified": "2024-01-29T00:27:26.730501Z",
"name": "CVE-2024-23742",
"description": "An issue in Loom on macOS version 0.196.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23742"
}
]
}
]
}

0 comments on commit cde171e

Please sign in to comment.