Skip to content

Commit

Permalink
generated content from 2024-01-16
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 16, 2024
1 parent 266de12 commit f4e4fa6
Show file tree
Hide file tree
Showing 66 changed files with 1,495 additions and 0 deletions.
65 changes: 65 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -222808,3 +222808,68 @@ vulnerability,CVE-2024-0523,vulnerability--42c1c329-8291-41af-aaf2-373cee546011
vulnerability,CVE-2024-0526,vulnerability--81efc213-d961-479f-b034-89afb8c8ce6b
vulnerability,CVE-2024-0522,vulnerability--9f008ad6-13cd-482e-a1eb-c8ab3086ceab
vulnerability,CVE-2024-0524,vulnerability--22ee11c8-eb17-4d29-965d-4ff4b492e512
vulnerability,CVE-2023-5253,vulnerability--12249be0-4be2-4600-8bcc-9285d854af5b
vulnerability,CVE-2023-5905,vulnerability--70c980e4-49a7-40b3-8d1a-e1caa52af2e2
vulnerability,CVE-2023-7206,vulnerability--bbfddf25-e5fa-4aa7-91c2-310b3fe0b759
vulnerability,CVE-2023-4001,vulnerability--5404d272-7399-4529-9d72-b40c991aee06
vulnerability,CVE-2023-4925,vulnerability--dcf742df-06b2-4225-93d0-2c906d355f6f
vulnerability,CVE-2023-4818,vulnerability--52b77856-9e04-40ca-89dc-117e51902c3b
vulnerability,CVE-2023-42135,vulnerability--48a9a40b-3940-4a84-b741-a4080ee2e2b6
vulnerability,CVE-2023-42137,vulnerability--70c4b6e7-44f6-4806-816a-cf11ae43cae6
vulnerability,CVE-2023-42136,vulnerability--28d1452a-e505-4d74-bf5b-97ca161affed
vulnerability,CVE-2023-42134,vulnerability--036d50f7-d699-4771-acb8-b0d203fa4b74
vulnerability,CVE-2023-46226,vulnerability--2d5cf9c1-85a6-4e9d-a74a-c235e779a720
vulnerability,CVE-2023-46749,vulnerability--79c42cb1-854f-41d5-8fef-aa72ee050b93
vulnerability,CVE-2023-48383,vulnerability--235b647d-d4a4-4a5f-9a3d-746682db7f7c
vulnerability,CVE-2023-50290,vulnerability--b968474c-a24c-4ce0-af9d-fd5d13b72dba
vulnerability,CVE-2023-50729,vulnerability--ba80b815-f102-4437-a696-0ba1f12a1f56
vulnerability,CVE-2023-6029,vulnerability--99e8d6be-21b9-4e9c-8ddf-a694a22beb90
vulnerability,CVE-2023-6991,vulnerability--157ca958-6797-4bc0-a7c4-b46effa70216
vulnerability,CVE-2023-6066,vulnerability--858c249b-36e7-4dce-a439-2426b566486d
vulnerability,CVE-2023-6623,vulnerability--6e939dcc-14b3-4fc5-9150-7dec59b38424
vulnerability,CVE-2023-6049,vulnerability--c5ca2ecb-a19a-4538-add3-16c5232fc57c
vulnerability,CVE-2023-6941,vulnerability--8e44d6e7-0617-4f45-a736-350f5845b06d
vulnerability,CVE-2023-6620,vulnerability--3670debf-318c-4c8b-a19f-127e03153220
vulnerability,CVE-2023-6048,vulnerability--3e7bbe64-363a-47ed-b5a6-6889bb83ee4c
vulnerability,CVE-2023-6163,vulnerability--139ab38c-f487-4b18-bf4a-d1916bba0531
vulnerability,CVE-2023-6915,vulnerability--a432d95c-071d-487e-9191-38ca3ebb3fb0
vulnerability,CVE-2023-6843,vulnerability--93d06726-69d1-4642-b378-e1b9422a12b0
vulnerability,CVE-2023-6050,vulnerability--e2d114f9-cd1f-442a-9805-e343a4ed1735
vulnerability,CVE-2020-36770,vulnerability--58e138f9-0fc7-470d-90c5-78daa871075f
vulnerability,CVE-2024-22028,vulnerability--06ead948-f814-4897-a664-cb9db592526e
vulnerability,CVE-2024-22207,vulnerability--a3650336-182d-4226-9de0-12c74221d391
vulnerability,CVE-2024-20709,vulnerability--841fe0f8-86ad-44bd-a80e-277891d0b4b1
vulnerability,CVE-2024-20721,vulnerability--095898f5-9d6f-4dcf-9b95-ceae2e6edda0
vulnerability,CVE-2024-0552,vulnerability--75a011e5-dddb-4463-9039-f8f085a329f4
vulnerability,CVE-2024-0562,vulnerability--3bc46ea9-de31-49fa-993c-4b646217bedc
vulnerability,CVE-2024-0527,vulnerability--76030495-93d8-4f9d-a854-976bd3932b70
vulnerability,CVE-2024-0565,vulnerability--922a3776-890d-45e2-acd5-760e8d834f03
vulnerability,CVE-2024-0547,vulnerability--8ab0e811-166f-4393-a59d-1f7fa8b533bf
vulnerability,CVE-2024-0315,vulnerability--1ac99106-53c1-40fc-8dfb-4b18fc27ae22
vulnerability,CVE-2024-0540,vulnerability--d374bb7b-2abf-49e9-81fc-237674d05f86
vulnerability,CVE-2024-0536,vulnerability--d7dfe6c8-b708-4219-929a-be43e3e32b5e
vulnerability,CVE-2024-0543,vulnerability--6b53cdfe-959c-459b-97a0-99715b649e77
vulnerability,CVE-2024-0319,vulnerability--0b0db9e9-206a-4e0a-891b-82d93c7ed6c3
vulnerability,CVE-2024-0538,vulnerability--8c0716fd-2bcb-4405-bbf1-56759b44b890
vulnerability,CVE-2024-0318,vulnerability--2547f5f8-29b5-4e7b-8f65-932dd2ba48f6
vulnerability,CVE-2024-0548,vulnerability--e095790b-d188-4c18-8432-e96c85f5cd0a
vulnerability,CVE-2024-0530,vulnerability--21d08e28-92f1-49b9-a10c-72618a4d39af
vulnerability,CVE-2024-0534,vulnerability--b0437581-1506-4b99-a8f9-49eabbfbca17
vulnerability,CVE-2024-0535,vulnerability--145a89bc-06bc-4a43-ae23-a4b8ba7fed6c
vulnerability,CVE-2024-0545,vulnerability--79d85f42-547d-4bcc-9b6d-655af540c9c8
vulnerability,CVE-2024-0546,vulnerability--5e87fd28-a03c-4171-86e2-acba451249ef
vulnerability,CVE-2024-0537,vulnerability--0116fb08-29d6-45b6-bef1-4454d4d72954
vulnerability,CVE-2024-0557,vulnerability--f55d6eb8-12f4-4227-b29d-9b869c484ed2
vulnerability,CVE-2024-0314,vulnerability--e711c0b9-c544-4734-92cb-d8df24ea318e
vulnerability,CVE-2024-0541,vulnerability--7d610f93-4424-4e4b-9c87-28e4f12c8b88
vulnerability,CVE-2024-0532,vulnerability--89cc770e-e536-4f06-805a-4c694318f060
vulnerability,CVE-2024-0531,vulnerability--3508de5b-0ff5-454a-afc2-748a2d97589a
vulnerability,CVE-2024-0539,vulnerability--30d84151-6f2b-42da-aa34-4a8ee8135d33
vulnerability,CVE-2024-0317,vulnerability--51f1e34d-50f0-4c71-beee-eb556691cd15
vulnerability,CVE-2024-0316,vulnerability--42c8e37b-b1d0-4fa4-be08-7d9cee6cf4f8
vulnerability,CVE-2024-0533,vulnerability--8bbc4488-5ba0-4f60-8969-f6da1fa2cc8a
vulnerability,CVE-2024-0529,vulnerability--c3c08a68-2b5f-4b48-9fac-e23c847bcafd
vulnerability,CVE-2024-0320,vulnerability--efd0cab6-d711-44cb-be22-06975a8722a7
vulnerability,CVE-2024-0528,vulnerability--74e86ec8-41de-41fc-95ad-86ae81c49e40
vulnerability,CVE-2024-0558,vulnerability--38236bac-2876-49a3-b77b-5877264d9fc3
vulnerability,CVE-2024-0542,vulnerability--20407a3d-f729-463f-ae75-3febf6dea3c0
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--604efd2b-a2bd-42c8-91b0-685a55776b3e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0116fb08-29d6-45b6-bef1-4454d4d72954",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:56.004935Z",
"modified": "2024-01-16T00:28:56.004935Z",
"name": "CVE-2024-0537",
"description": "A vulnerability, which was classified as critical, was found in Tenda W9 1.0.0.7(4456). This affects the function setWrlBasicInfo of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250707. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0537"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--db9cc900-6c3f-47a4-b7f7-a154abd3898d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--036d50f7-d699-4771-acb8-b0d203fa4b74",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:46.387079Z",
"modified": "2024-01-16T00:28:46.387079Z",
"name": "CVE-2023-42134",
"description": "PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.45_20230314 or earlier can allow the signed partition overwrite and subsequently local code execution via hidden command.\n\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-42134"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ecb36a8a-8a8c-41df-ba9f-25875940727a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--06ead948-f814-4897-a664-cb9db592526e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:55.880558Z",
"modified": "2024-01-16T00:28:55.880558Z",
"name": "CVE-2024-22028",
"description": "Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-22028"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2c336b58-7eba-49bb-bb93-7fd149a1fc3a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--095898f5-9d6f-4dcf-9b95-ceae2e6edda0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:55.940735Z",
"modified": "2024-01-16T00:28:55.940735Z",
"name": "CVE-2024-20721",
"description": "Acrobat Reader T5 (MSFT Edge) versions 120.0.2210.91 and earlier are affected by an Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-20721"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--62df52a0-cfaf-4faa-8569-e22c026fa8f5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b0db9e9-206a-4e0a-891b-82d93c7ed6c3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:55.988287Z",
"modified": "2024-01-16T00:28:55.988287Z",
"name": "CVE-2024-0319",
"description": "Open Redirect vulnerability in FireEye HXTool affecting version 4.6, the exploitation of which could allow an attacker to redirect a legitimate user to a malicious page by changing the 'redirect_uri' parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0319"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c719dd8f-5b4f-4dd6-8e35-79f8c889aee8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12249be0-4be2-4600-8bcc-9285d854af5b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:45.84743Z",
"modified": "2024-01-16T00:28:45.84743Z",
"name": "CVE-2023-5253",
"description": "A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication.\n\n\n\nMalicious unauthenticated users with knowledge on the underlying system may be able to extract asset information.\n\n\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5253"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--61f02d69-ae92-4f6e-b1af-76ae1a3a0180",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--139ab38c-f487-4b18-bf4a-d1916bba0531",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:48.069988Z",
"modified": "2024-01-16T00:28:48.069988Z",
"name": "CVE-2023-6163",
"description": "The WP Crowdfunding WordPress plugin before 2.1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6163"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4d05cce6-43c2-48fd-93f5-7306af5724a1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--145a89bc-06bc-4a43-ae23-a4b8ba7fed6c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:56.000551Z",
"modified": "2024-01-16T00:28:56.000551Z",
"name": "CVE-2024-0535",
"description": "A vulnerability classified as critical was found in Tenda PA6 1.0.1.21. Affected by this vulnerability is the function cgiPortMapAdd of the file /portmap of the component httpd. The manipulation of the argument groupName leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250705 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0535"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cf3d39c6-8c12-47e2-b936-42e05eeddf95",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--157ca958-6797-4bc0-a7c4-b46effa70216",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:48.018383Z",
"modified": "2024-01-16T00:28:48.018383Z",
"name": "CVE-2023-6991",
"description": "The JSM file_get_contents() Shortcode WordPress plugin before 2.7.1 does not validate one of its shortcode's parameters before making a request to it, which could allow users with contributor role and above to perform SSRF attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6991"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b8437c9a-c0b9-4982-8b88-bf33c58962f7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1ac99106-53c1-40fc-8dfb-4b18fc27ae22",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:55.981706Z",
"modified": "2024-01-16T00:28:55.981706Z",
"name": "CVE-2024-0315",
"description": "Remote file inclusion vulnerability in FireEye Central Management affecting version 9.1.1.956704. This vulnerability allows an attacker to upload a malicious PDF file to the system during the report creation process.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0315"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a33777a0-21de-48ff-9a6e-12d6237e77aa",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--20407a3d-f729-463f-ae75-3febf6dea3c0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:56.028907Z",
"modified": "2024-01-16T00:28:56.028907Z",
"name": "CVE-2024-0542",
"description": "A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. Affected by this issue is the function formWifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250712. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0542"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--800d6367-1258-4ff2-99cc-16c8fa78ebe2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--21d08e28-92f1-49b9-a10c-72618a4d39af",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:55.99699Z",
"modified": "2024-01-16T00:28:55.99699Z",
"name": "CVE-2024-0530",
"description": "A vulnerability was found in CXBSoft Post-Office up to 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /apps/reg_go.php of the component HTTP POST Request Handler. The manipulation of the argument username_reg leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250700. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0530"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--483cdbf5-f66d-4579-8415-746392e8785f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--235b647d-d4a4-4a5f-9a3d-746682db7f7c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-16T00:28:47.543974Z",
"modified": "2024-01-16T00:28:47.543974Z",
"name": "CVE-2023-48383",
"description": "NetVision\n\nInformation \n\n airPASS has a path traversal vulnerability within its parameter in a specific URL. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48383"
}
]
}
]
}
Loading

0 comments on commit f4e4fa6

Please sign in to comment.