Skip to content

Commit

Permalink
generated content from 2024-02-16
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Feb 16, 2024
1 parent 15abb4e commit f290da7
Show file tree
Hide file tree
Showing 104 changed files with 2,369 additions and 0 deletions.
103 changes: 103 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -225493,3 +225493,106 @@ vulnerability,CVE-2024-25215,vulnerability--d884eddb-47b7-433c-95c2-c377b750dc61
vulnerability,CVE-2024-25620,vulnerability--a7c2e5c7-6e7e-4932-8d31-2fdf320947ea
vulnerability,CVE-2022-48219,vulnerability--31720d00-e66f-4335-a70c-b352eca5fd15
vulnerability,CVE-2022-48220,vulnerability--2b8abfb1-185c-420a-8676-dafaf85c1505
vulnerability,CVE-2023-40115,vulnerability--83128535-db90-4259-b6fe-cc0a09a189ab
vulnerability,CVE-2023-40106,vulnerability--f367d968-bb2b-4a72-b319-b91b26385cbe
vulnerability,CVE-2023-40107,vulnerability--920dcc0d-1383-4b53-b4e1-41a15a9de797
vulnerability,CVE-2023-40114,vulnerability--1d13f5df-3acc-4cc1-af4d-0b040415a65e
vulnerability,CVE-2023-40109,vulnerability--3d214f8c-886d-4f8b-9102-69c5d00366d4
vulnerability,CVE-2023-40112,vulnerability--f43bf0d7-1246-412a-995a-4a65d60d402e
vulnerability,CVE-2023-40104,vulnerability--0b98aa9a-d11d-4a09-acee-9120d4991453
vulnerability,CVE-2023-40113,vulnerability--941fb9b3-6ef2-4494-9adf-a4e58cdfc5c4
vulnerability,CVE-2023-40100,vulnerability--bbdb933b-d243-4005-95f0-12404ac25fae
vulnerability,CVE-2023-40057,vulnerability--dfeb0aa4-fcd2-4a81-8c43-a08f9b6b4c05
vulnerability,CVE-2023-40124,vulnerability--70c8f2cc-c01a-4b9b-b1de-78481128dc56
vulnerability,CVE-2023-40105,vulnerability--aa7e916f-cc81-4614-9847-83925a2382e0
vulnerability,CVE-2023-40110,vulnerability--c4e6944b-a433-45be-aa4e-e3f53f35aa46
vulnerability,CVE-2023-40111,vulnerability--1d3c6e96-8d6b-411f-bb3f-a1dee8b77064
vulnerability,CVE-2023-5155,vulnerability--ad09e5bc-ee25-422e-b520-9b6d62089cf0
vulnerability,CVE-2023-32484,vulnerability--b27d3c15-36a7-45f5-96ff-824798c847a5
vulnerability,CVE-2023-32462,vulnerability--d48cd5be-8aa0-4af9-9023-338e32a1cd65
vulnerability,CVE-2023-45581,vulnerability--2da7fd03-ad2b-4bc0-9e2a-2af4305b96ac
vulnerability,CVE-2023-7081,vulnerability--20a04662-65d0-46f2-8170-054e8a37c153
vulnerability,CVE-2023-6937,vulnerability--f1d9c23c-fae6-4f1c-abc8-25a3a4f8c231
vulnerability,CVE-2023-6123,vulnerability--ee6b5967-d887-4bf7-93cb-09af94ce187c
vulnerability,CVE-2023-6255,vulnerability--a33232f6-0841-49fb-a59f-bc0d7616cad3
vulnerability,CVE-2023-4537,vulnerability--36ba1494-2140-4884-b2c5-3902d67a4e93
vulnerability,CVE-2023-4538,vulnerability--9c442ca2-b780-48b3-b184-bcc0ba73d064
vulnerability,CVE-2023-4993,vulnerability--4b04b5ba-a9a7-4a06-a14f-cb3466a90d70
vulnerability,CVE-2023-4539,vulnerability--2cffb876-fdc3-45f9-aac2-bd187552c638
vulnerability,CVE-2023-26206,vulnerability--8132d59c-976b-4b0d-892b-4e12271fac2d
vulnerability,CVE-2023-46596,vulnerability--33dfa09f-ba2b-41a3-8f84-9d69c269bffc
vulnerability,CVE-2023-47537,vulnerability--cdc96856-0d62-4dff-a53b-6c6db2450f72
vulnerability,CVE-2023-51787,vulnerability--149aaa27-f53c-4dfb-aa7c-4bfe915b1cb6
vulnerability,CVE-2023-28078,vulnerability--4789805a-5147-467b-ae6a-60cdc5579001
vulnerability,CVE-2023-39244,vulnerability--00688025-7109-4a91-87dd-4bd1fe3e5631
vulnerability,CVE-2023-39245,vulnerability--fa24e95f-0e0e-41bd-a964-ac5ded0a9975
vulnerability,CVE-2023-44253,vulnerability--7715cea5-c668-42fa-a643-7d0574ca323e
vulnerability,CVE-2024-20739,vulnerability--4efd3f16-b2d7-4e09-a621-93b99234b5c2
vulnerability,CVE-2024-20740,vulnerability--aaa7980b-a05d-480e-a56c-e993c908a2fb
vulnerability,CVE-2024-20747,vulnerability--2922507d-4c32-4f06-979f-bd1e5b0a7cef
vulnerability,CVE-2024-20728,vulnerability--5162f334-e726-4b4f-b3cf-7b36e5e1784b
vulnerability,CVE-2024-20723,vulnerability--036436a9-0aa4-4a73-84bb-51d4c0ac546e
vulnerability,CVE-2024-20743,vulnerability--972f892d-8360-45a7-9457-f9396fe93283
vulnerability,CVE-2024-20749,vulnerability--b7ebeefd-2532-436d-837a-352271582dda
vulnerability,CVE-2024-20724,vulnerability--d80948bd-d5ea-4b76-b811-653789b4c993
vulnerability,CVE-2024-20730,vulnerability--1bf81965-69df-4c58-ba44-4f6a4bff9dfd
vulnerability,CVE-2024-20748,vulnerability--3267e503-1ec5-49e4-b5b3-bad5046655a2
vulnerability,CVE-2024-20726,vulnerability--8efbd2d4-a743-47bd-9928-127b299b91fe
vulnerability,CVE-2024-20731,vulnerability--3ac9a940-6740-40c0-a377-a883070ab520
vulnerability,CVE-2024-20736,vulnerability--1b82f920-e69d-4ce5-a651-c58ff4777ccb
vulnerability,CVE-2024-20719,vulnerability--bc6cb84b-d4d3-4b20-a3f3-7097574a417d
vulnerability,CVE-2024-20716,vulnerability--09d4d233-b075-4f53-8520-9418b27e3258
vulnerability,CVE-2024-20722,vulnerability--df68807d-0834-49f9-bc78-d6f4b65af53f
vulnerability,CVE-2024-20725,vulnerability--cf836164-acb3-420a-8e92-13fbea68ceda
vulnerability,CVE-2024-20733,vulnerability--44980b34-4bf9-4cc4-9285-dfa16acc2128
vulnerability,CVE-2024-20720,vulnerability--f4b7c9e3-0c7f-4b23-8c8e-b1d10b4a2e49
vulnerability,CVE-2024-20727,vulnerability--2049af54-8504-4512-aa66-e587ca392fc8
vulnerability,CVE-2024-20741,vulnerability--7e364924-c2b8-4ad2-aa36-03526e58675c
vulnerability,CVE-2024-20744,vulnerability--1f5cbb9c-5e57-4247-950e-be310b6382c4
vulnerability,CVE-2024-20742,vulnerability--a81d153b-9660-4862-91cf-443ddcd227de
vulnerability,CVE-2024-20734,vulnerability--d79af11f-9ac6-43e6-9ca6-8cbab9d834e2
vulnerability,CVE-2024-20750,vulnerability--03928a90-eba8-4f78-8a24-a010eb6c039d
vulnerability,CVE-2024-20718,vulnerability--d78f3154-3430-46ee-a77d-95a4c38afa62
vulnerability,CVE-2024-20717,vulnerability--28f40b5f-aaca-4ed3-b053-b2eaaf00af1d
vulnerability,CVE-2024-20735,vulnerability--907cac8f-9246-4021-88f5-77db6c26dc31
vulnerability,CVE-2024-20738,vulnerability--a78d6ff4-8a61-45eb-8375-bdf06d85efe5
vulnerability,CVE-2024-20729,vulnerability--eb3cab6f-d818-4fa6-ab24-98d6a8f38043
vulnerability,CVE-2024-1530,vulnerability--0f21d135-771d-4504-8111-ff9c86ce8235
vulnerability,CVE-2024-1523,vulnerability--db622cea-5a31-4759-b99c-3d77d8c2bdee
vulnerability,CVE-2024-1488,vulnerability--1b9271a3-94d7-4765-b79f-67f55b9206c3
vulnerability,CVE-2024-23478,vulnerability--43692284-2eb4-42f9-ad23-383dbbf4d3dc
vulnerability,CVE-2024-23479,vulnerability--980e7736-a26a-48c1-9e56-ff6e4361dee4
vulnerability,CVE-2024-23674,vulnerability--ae9e3b1e-0d29-43e7-8a5b-ca7e664c8ad3
vulnerability,CVE-2024-23113,vulnerability--1e86895a-7d84-448a-ae1e-66d8e60e3718
vulnerability,CVE-2024-23476,vulnerability--49fa3036-ad4d-41d7-8af4-2c3924ce8c0b
vulnerability,CVE-2024-23477,vulnerability--06021cef-6611-478e-858e-deeafa05e441
vulnerability,CVE-2024-26262,vulnerability--744dacf5-9009-499e-b1bd-f1aa8ad3abad
vulnerability,CVE-2024-26264,vulnerability--d17f231b-d22f-4945-ab2d-a972f378f5de
vulnerability,CVE-2024-26263,vulnerability--c40d9c4d-037f-4e8d-8b3f-010cf6b9c5f3
vulnerability,CVE-2024-26260,vulnerability--b3b30b4f-5fac-48ea-b639-ea5fff77b4c9
vulnerability,CVE-2024-26261,vulnerability--a8859188-4222-444f-a296-5d20ed6290f9
vulnerability,CVE-2024-0353,vulnerability--545681c1-d379-4282-89a6-f03ff1003ab2
vulnerability,CVE-2024-0240,vulnerability--e9b1a1c5-cc71-4f0a-ab4e-4eec30f4fe26
vulnerability,CVE-2024-0708,vulnerability--1571af9b-8892-4180-ab3f-63c9ea1b7ad3
vulnerability,CVE-2024-0622,vulnerability--e15623af-82f2-4637-85d3-d7f86fa33596
vulnerability,CVE-2024-0390,vulnerability--2ae3ed4f-4786-4a57-a19f-e8018000cccf
vulnerability,CVE-2024-24386,vulnerability--e6b139d1-ac12-4c38-b060-81d3662551d8
vulnerability,CVE-2024-24256,vulnerability--0da026b9-c8e9-4f11-b22b-ee2791bdeb79
vulnerability,CVE-2024-21728,vulnerability--2cf1146b-2e41-4f88-87b1-8d5a0fc9fe57
vulnerability,CVE-2024-21727,vulnerability--75021a9d-0cd5-447c-9d3e-1aa700f756cf
vulnerability,CVE-2024-25941,vulnerability--a4a9d938-d8b7-47e5-a005-e1c4ca831246
vulnerability,CVE-2024-25373,vulnerability--97bdfdad-ef9a-4af4-8a13-40c807c4e340
vulnerability,CVE-2024-25123,vulnerability--caa6a9de-9e2d-4f3b-b1c1-c349674c12c7
vulnerability,CVE-2024-25559,vulnerability--3d42c544-bded-4d53-8cc3-83db5ed53ffa
vulnerability,CVE-2024-25940,vulnerability--9211f5df-ba42-413c-8d63-93c67d5b5e0c
vulnerability,CVE-2024-25502,vulnerability--d3c200c9-72ca-4531-a70f-a4c4c9d99257
vulnerability,CVE-2022-23084,vulnerability--d68c65b5-5ff4-47b1-b1ac-d1f7c9fe4e8d
vulnerability,CVE-2022-23089,vulnerability--d6bdd5a2-cf16-48e7-b3fa-31cbd8bf89af
vulnerability,CVE-2022-23087,vulnerability--01adea71-aaf2-4a73-a40a-a5badae0d3ea
vulnerability,CVE-2022-23093,vulnerability--7200c33d-8a1a-4ed8-a1dd-9a77bedb0948
vulnerability,CVE-2022-23091,vulnerability--0f71e529-c345-4b27-844a-e202c29f135c
vulnerability,CVE-2022-23085,vulnerability--5835e1c2-e635-43b4-a404-32dbcce36d51
vulnerability,CVE-2022-23088,vulnerability--f0f79f1f-1d05-4ad6-98ac-9b62d1487ca0
vulnerability,CVE-2022-23090,vulnerability--b510e7b6-07ad-475b-a627-457f8fb9afc3
vulnerability,CVE-2022-23086,vulnerability--0b1bd7c9-c45a-4edf-9081-4604e7200ce0
vulnerability,CVE-2022-23092,vulnerability--502b3f15-de2a-45e9-888f-f4c2338b9c57
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b61422c1-d6f9-4d55-87b6-5b768bbf7276",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00688025-7109-4a91-87dd-4bd1fe3e5631",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:37.527536Z",
"modified": "2024-02-16T00:26:37.527536Z",
"name": "CVE-2023-39244",
"description": "\nDELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 10.0, contains an improper access control vulnerability in EHAC component. A remote unauthenticated attacker could potentially exploit this vulnerability to gain unrestricted access to the SOAP APIs.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39244"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8f389409-4969-45c6-8a0d-df3f3e90b1b5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--01adea71-aaf2-4a73-a40a-a5badae0d3ea",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:43.823595Z",
"modified": "2024-02-16T00:26:43.823595Z",
"name": "CVE-2022-23087",
"description": "The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload (\"TSO\"). The e1000 device model uses an on-stack buffer to generate the modified packet header when simulating these modifications on transmitted packets.\n\nWhen checksum offload is requested for a transmitted packet, the e1000 device model used a guest-provided value to specify the checksum offset in the on-stack buffer. The offset was not validated for certain packet types.\n\nA misbehaving bhyve guest could overwrite memory in the bhyve process on the host, possibly leading to code execution in the host context.\n\nThe bhyve process runs in a Capsicum sandbox, which (depending on the FreeBSD version and bhyve configuration) limits the impact of exploiting this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-23087"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8926b9e8-d0cc-4011-9292-33d802f43c9c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--036436a9-0aa4-4a73-84bb-51d4c0ac546e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:39.172708Z",
"modified": "2024-02-16T00:26:39.172708Z",
"name": "CVE-2024-20723",
"description": "Substance3D - Painter versions 9.1.1 and earlier are affected by a Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-20723"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d1030c3c-c22b-4e0a-af59-23081aeebb0e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03928a90-eba8-4f78-8a24-a010eb6c039d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:39.271884Z",
"modified": "2024-02-16T00:26:39.271884Z",
"name": "CVE-2024-20750",
"description": "Substance3D - Designer versions 13.1.0 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-20750"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2b94b644-e5a2-4a1f-8794-3d4b64c5bb75",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06021cef-6611-478e-858e-deeafa05e441",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:39.405276Z",
"modified": "2024-02-16T00:26:39.405276Z",
"name": "CVE-2024-23477",
"description": "The SolarWinds Access Rights Manager (ARM) was found to be susceptible to a Directory Traversal Remote Code Execution Vulnerability. If exploited, this vulnerability allows an unauthenticated user to achieve a Remote Code Execution.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-23477"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--db002a6a-0294-4343-9f71-717e30a52035",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09d4d233-b075-4f53-8520-9418b27e3258",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:39.236759Z",
"modified": "2024-02-16T00:26:39.236759Z",
"name": "CVE-2024-20716",
"description": "Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to an application denial-of-service. A high-privileged attacker could leverage this vulnerability to exhaust system resources, causing the application to slow down or crash. Exploitation of this issue does not require user interaction.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-20716"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--733ea43e-2c9f-43b6-bda8-cba4bc3af717",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b1bd7c9-c45a-4edf-9081-4604e7200ce0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:43.852312Z",
"modified": "2024-02-16T00:26:43.852312Z",
"name": "CVE-2022-23086",
"description": "Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritten if the specified size was too small.\n\nUsers with access to the mpr, mps or mpt device node may overwrite heap data, potentially resulting in privilege escalation. Note that the device node is only accessible to root and members of the operator group.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-23086"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c055ff89-a815-437b-bded-eef68582f092",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b98aa9a-d11d-4a09-acee-9120d4991453",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:36.09827Z",
"modified": "2024-02-16T00:26:36.09827Z",
"name": "CVE-2023-40104",
"description": "In ca-certificates, there is a possible way to read encrypted TLS data due to untrusted cryptographic certificates. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40104"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a9c2146b-02fb-40f0-b2a8-78fcea37e71c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0da026b9-c8e9-4f11-b22b-ee2791bdeb79",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:39.517651Z",
"modified": "2024-02-16T00:26:39.517651Z",
"name": "CVE-2024-24256",
"description": "SQL Injection vulnerability in Yonyou space-time enterprise information integration platform v.9.0 and before allows an attacker to obtain sensitive information via the gwbhAIM parameter in the saveMove.jsp in the hr_position directory.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-24256"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--211c04eb-1ecc-4775-b9dc-02312421660d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f21d135-771d-4504-8111-ff9c86ce8235",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-02-16T00:26:39.332977Z",
"modified": "2024-02-16T00:26:39.332977Z",
"name": "CVE-2024-1530",
"description": "A vulnerability, which was classified as critical, has been found in ECshop 4.1.8. Affected by this issue is some unknown functionality of the file /admin/view_sendlist.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250562 is the identifier assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-1530"
}
]
}
]
}
Loading

0 comments on commit f290da7

Please sign in to comment.