Skip to content

Commit

Permalink
generated content from 2023-09-01
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 1, 2023
1 parent ca5f274 commit 9d1c948
Show file tree
Hide file tree
Showing 105 changed files with 2,392 additions and 0 deletions.
104 changes: 104 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -211421,3 +211421,107 @@ vulnerability,CVE-2023-4571,vulnerability--c298dcac-5f4c-43d4-a17c-c3541f6b7e37
vulnerability,CVE-2023-27426,vulnerability--f8d17965-3f7c-4769-bda4-3044cb691662
vulnerability,CVE-2023-27621,vulnerability--dbe99232-9b37-4091-8ee6-2dd092155b6b
vulnerability,CVE-2022-1601,vulnerability--c7b4bea1-a722-4f1e-98bd-417df328910c
vulnerability,CVE-2023-40567,vulnerability--533ab502-9980-46ab-bffe-5b8823df15bf
vulnerability,CVE-2023-40181,vulnerability--36000a7d-545c-44b4-ad0f-c21d24ecf6d5
vulnerability,CVE-2023-40569,vulnerability--03327fc2-a208-4971-8460-79b3384e1a03
vulnerability,CVE-2023-40589,vulnerability--3337abc4-429b-43d8-9643-4ba1c6615932
vulnerability,CVE-2023-40188,vulnerability--acb9fefb-a96b-4737-ac6e-cc618108371d
vulnerability,CVE-2023-40576,vulnerability--217a2889-3671-4e53-ae49-dac6ff033ad9
vulnerability,CVE-2023-40574,vulnerability--e8e2d32d-92df-4113-a785-51730b725122
vulnerability,CVE-2023-40186,vulnerability--4ccf4d4b-2ca9-49c5-971d-d06f24e7631f
vulnerability,CVE-2023-40575,vulnerability--7f86b87b-4b74-4e81-9ddf-fc43202f544f
vulnerability,CVE-2023-40187,vulnerability--bf1523bf-48b0-4c14-bdf3-29c938158a2e
vulnerability,CVE-2023-20900,vulnerability--383aacbd-1b41-4743-9622-e7ab38583ff6
vulnerability,CVE-2023-28801,vulnerability--f61e395a-54ca-4ce0-ba2a-dde9f035df6e
vulnerability,CVE-2023-3162,vulnerability--c6670cfc-5c31-4e6f-872f-3155a2529304
vulnerability,CVE-2023-3404,vulnerability--8ace6245-48a8-48e4-99d5-925ec0cd7dd9
vulnerability,CVE-2023-3636,vulnerability--d55fea01-89bf-4197-b0ec-ebb192dce5e3
vulnerability,CVE-2023-3764,vulnerability--998ed80a-94fc-4438-bc41-b2aa5c192c6a
vulnerability,CVE-2023-3677,vulnerability--f4b04b0b-f913-4f3d-ba19-0e09575ffdc3
vulnerability,CVE-2023-3999,vulnerability--e7426e44-5fe1-4c08-bdbd-109f03fa6947
vulnerability,CVE-2023-39351,vulnerability--3677e3dd-b5da-40f9-8960-74761b79f70c
vulnerability,CVE-2023-39352,vulnerability--7a1df363-caa6-4111-95b0-b9956b539264
vulnerability,CVE-2023-39354,vulnerability--09f6f4a9-4253-41ad-9856-a474577f4893
vulnerability,CVE-2023-39355,vulnerability--7f9e36df-9ae8-4139-9823-ed0ab9068d6b
vulnerability,CVE-2023-39353,vulnerability--2cbbeca9-b62f-4687-b37d-f71695584f06
vulnerability,CVE-2023-39912,vulnerability--edea5971-3a89-4bf3-be95-b7e13457c254
vulnerability,CVE-2023-39356,vulnerability--2483af85-124c-4ba7-b828-348c7bfc8f69
vulnerability,CVE-2023-39350,vulnerability--6defd8bd-d2b3-4861-8a05-ed77694c064d
vulnerability,CVE-2023-31169,vulnerability--17aca638-78a6-48b8-855e-cc01096f96fa
vulnerability,CVE-2023-31171,vulnerability--8d39bdb5-01fd-4025-a5c5-baed80a8e9f8
vulnerability,CVE-2023-31168,vulnerability--6a276aaa-b134-478e-994e-540293f1b392
vulnerability,CVE-2023-31170,vulnerability--5bb3d8ff-8186-4535-8053-99ad6c641ae2
vulnerability,CVE-2023-31423,vulnerability--d3df720b-f616-44a9-a7eb-272f9f70c562
vulnerability,CVE-2023-31175,vulnerability--acb55096-d37f-44c6-a13f-33461f9e3d34
vulnerability,CVE-2023-31172,vulnerability--0d537834-4212-439a-846d-0dfbedc9c621
vulnerability,CVE-2023-31925,vulnerability--ea2318b0-1fba-4584-b9f6-46a4577da8e4
vulnerability,CVE-2023-31424,vulnerability--80688361-c3f0-4524-bb1e-1b9033d44697
vulnerability,CVE-2023-31167,vulnerability--ac168bbc-3ebf-41c1-9649-e675ac32ef86
vulnerability,CVE-2023-31174,vulnerability--7fdf6a8c-86e4-4b7f-b35c-040e23882244
vulnerability,CVE-2023-31173,vulnerability--7222081a-145d-4f33-b320-59e6c0d24633
vulnerability,CVE-2023-34391,vulnerability--3f317325-ffc3-4c0e-b4f8-c41430c49e8b
vulnerability,CVE-2023-34392,vulnerability--0b42eee0-a26b-4834-bb6d-165106491534
vulnerability,CVE-2023-33835,vulnerability--7e802732-3aa8-4440-9f91-ea7194ab7c72
vulnerability,CVE-2023-33834,vulnerability--412e097a-c2bf-4ffc-be9e-f22b78bbb145
vulnerability,CVE-2023-33833,vulnerability--38e04746-7157-4d72-a2de-a95ff3e483f6
vulnerability,CVE-2023-41744,vulnerability--b823baf5-f2ad-4217-9260-0c99832892bf
vulnerability,CVE-2023-41717,vulnerability--4e848cae-b6c0-4a7e-8b6e-2022ec899372
vulnerability,CVE-2023-41034,vulnerability--5814349d-9ac6-4a50-bf16-7e25ea0ce60c
vulnerability,CVE-2023-41742,vulnerability--efd70bfb-d98b-4dbb-8b36-b820e2decc22
vulnerability,CVE-2023-41642,vulnerability--9f7415ee-a7be-4d12-929b-4c9f97138332
vulnerability,CVE-2023-41743,vulnerability--63aa3986-83a3-4b04-881f-10b8326adeb1
vulnerability,CVE-2023-41739,vulnerability--625af38a-d1e7-4697-b93d-19b5cc1f792d
vulnerability,CVE-2023-41640,vulnerability--b40be35f-a299-498b-b7a2-beaa3f5666f8
vulnerability,CVE-2023-41635,vulnerability--0989840a-94a8-45ff-908e-0bcd8fd89727
vulnerability,CVE-2023-41746,vulnerability--b00391ca-7fa1-4b24-a297-6a67cf9e18e0
vulnerability,CVE-2023-41749,vulnerability--41513308-0dbb-4af1-9b11-57025baf812a
vulnerability,CVE-2023-41740,vulnerability--c9e5a306-32d3-475d-b446-d15124f6f0c6
vulnerability,CVE-2023-41751,vulnerability--444c85d3-3226-42a9-8431-452b513def83
vulnerability,CVE-2023-41045,vulnerability--12ef1c9a-6c90-4b1c-8a92-0e45130d93db
vulnerability,CVE-2023-41747,vulnerability--8bc672d3-1340-4cee-9d8b-2bc2d136b505
vulnerability,CVE-2023-41044,vulnerability--d040ef45-d9c4-4d54-8f79-2c798c6b5eeb
vulnerability,CVE-2023-41750,vulnerability--4c933414-92fd-4e27-becf-ac809de4420f
vulnerability,CVE-2023-41636,vulnerability--3ed8afda-516a-4107-9499-d3c934229130
vulnerability,CVE-2023-41748,vulnerability--b8f65582-ddf6-4727-aed6-7ebde464e328
vulnerability,CVE-2023-41738,vulnerability--a1875085-1333-4fc8-8594-79af20b49d78
vulnerability,CVE-2023-41637,vulnerability--79708717-d748-427c-8b91-6d74fd634e1a
vulnerability,CVE-2023-41638,vulnerability--b73cbbfa-8c44-4e04-9a62-2fdeefd1005d
vulnerability,CVE-2023-41745,vulnerability--d26b13d0-9dd8-469e-a625-a0b726e98bcf
vulnerability,CVE-2023-41741,vulnerability--86bf190d-d380-47ef-a267-308667bac971
vulnerability,CVE-2023-0689,vulnerability--5ae3ab3e-433e-4929-87bd-e7f182f000fe
vulnerability,CVE-2023-4163,vulnerability--c566513e-2066-4c62-98d1-cc1a20c90ba3
vulnerability,CVE-2023-4500,vulnerability--22d4be6b-afda-437e-8cc0-eb0f4f44f153
vulnerability,CVE-2023-4654,vulnerability--d602c0ad-195d-4a61-96bd-64f4247ce210
vulnerability,CVE-2023-4683,vulnerability--81c18390-e9de-459e-8a70-896ea631f8ae
vulnerability,CVE-2023-4652,vulnerability--48e15a57-6921-4a24-a082-eee3728048ee
vulnerability,CVE-2023-4245,vulnerability--5587cf09-e8e3-4e3e-b7dc-66fadaf79ff0
vulnerability,CVE-2023-4471,vulnerability--dd2bda62-fde6-4d83-8bee-e7ca4570fb57
vulnerability,CVE-2023-4000,vulnerability--55919d18-aed0-4fa4-9d89-81107a22f220
vulnerability,CVE-2023-4681,vulnerability--f2119d7a-cc1f-43f5-9e6a-27c1c5ac5f0a
vulnerability,CVE-2023-4655,vulnerability--6d336adc-58f2-47d4-986c-2bc52ddaa267
vulnerability,CVE-2023-4653,vulnerability--0c82ba98-730e-48d0-9245-7671937d210f
vulnerability,CVE-2023-4682,vulnerability--15765ba0-597e-4f81-b456-f4822d8788d3
vulnerability,CVE-2023-4162,vulnerability--169cdc6f-e282-4dc1-a457-592880948e55
vulnerability,CVE-2023-4678,vulnerability--9ece557e-b251-43b2-a5f7-999f27b0d591
vulnerability,CVE-2023-4160,vulnerability--087cd241-919b-4f0e-9e1f-0d3163931430
vulnerability,CVE-2023-4299,vulnerability--a2c24546-20c2-4a0f-a064-2becd356228a
vulnerability,CVE-2023-4650,vulnerability--35b7ad05-85c2-4b36-9ba1-8f06b3f6d14d
vulnerability,CVE-2023-4688,vulnerability--8ec1027d-3a84-4524-87cc-70b5c0c62530
vulnerability,CVE-2023-4651,vulnerability--32c52657-6156-44d7-b1da-00e3daaccbaf
vulnerability,CVE-2023-4161,vulnerability--aa39e2e3-9484-4240-93cc-d79c72facb3a
vulnerability,CVE-2023-4649,vulnerability--f19f4c51-c509-4aa7-a5c8-ece0d34e0ae1
vulnerability,CVE-2023-4481,vulnerability--66d2b40f-4084-4bdc-b162-63325860d65f
vulnerability,CVE-2023-4315,vulnerability--880b0b8d-5827-444e-8c2e-5d853c027c01
vulnerability,CVE-2023-2352,vulnerability--74675ced-7a83-476f-b6a0-0cf1175ab3a1
vulnerability,CVE-2023-2279,vulnerability--a14998a5-44e0-4f26-acf7-7cd18454f75b
vulnerability,CVE-2023-2354,vulnerability--f0cfc2e5-285d-4234-9c8f-2df9041ca221
vulnerability,CVE-2023-2353,vulnerability--24b55966-24bf-4cc0-8e49-583ba91f851f
vulnerability,CVE-2023-2188,vulnerability--842b5584-d3ba-460d-a265-634e6117ff6b
vulnerability,CVE-2023-2174,vulnerability--748201ce-d3fb-4507-b76a-ee03ba17cd81
vulnerability,CVE-2023-2172,vulnerability--752f4fa7-1967-4b0a-ad2d-37e7ef8e47f4
vulnerability,CVE-2023-2229,vulnerability--563ab5d9-b814-47db-86c8-e8d1ceb2c889
vulnerability,CVE-2023-2171,vulnerability--f20be235-9447-4110-97a5-0176e99484d0
vulnerability,CVE-2023-2173,vulnerability--1f8d764a-55ff-4dd4-b2f4-35816f26075f
vulnerability,CVE-2022-45451,vulnerability--56ffacc8-62e0-4819-94d2-47560eb52f82
vulnerability,CVE-2022-46868,vulnerability--3dae4ab2-cf9b-44d2-a1ff-eb72a9a2e70c
vulnerability,CVE-2022-46869,vulnerability--98fd7fbe-77b3-4d42-be9b-ee12b68416e1
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--561925b3-758d-4bbb-9c45-742a165954c4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03327fc2-a208-4971-8460-79b3384e1a03",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:13.393834Z",
"modified": "2023-09-01T00:05:13.393834Z",
"name": "CVE-2023-40569",
"description": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40569"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--258fe917-4121-4bec-916f-352e0fe5cb0c",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--087cd241-919b-4f0e-9e1f-0d3163931430",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:14.699947Z",
"modified": "2023-09-01T00:05:14.699947Z",
"name": "CVE-2023-4160",
"description": "The WooCommerce PDF Invoice Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.2.90 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4160"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f1400f35-b127-42f2-a0b8-0df6e5b5c7d2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0989840a-94a8-45ff-908e-0bcd8fd89727",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:14.278281Z",
"modified": "2023-09-01T00:05:14.278281Z",
"name": "CVE-2023-41635",
"description": "A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-41635"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b5d73947-2413-498f-a055-81f7695084b9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09f6f4a9-4253-41ad-9856-a474577f4893",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:13.677908Z",
"modified": "2023-09-01T00:05:13.677908Z",
"name": "CVE-2023-39354",
"description": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `nsc_rle_decompress_data` function. The Out-Of-Bounds Read occurs because it processes `context->Planes` without checking if it contains data of sufficient length. Should an attacker be able to leverage this vulnerability they may be able to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39354"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--631e6f3e-b660-4743-a090-934c403c38fa",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b42eee0-a26b-4834-bb6d-165106491534",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:14.204998Z",
"modified": "2023-09-01T00:05:14.204998Z",
"name": "CVE-2023-34392",
"description": "\nA Missing Authentication for Critical Function vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run arbitrary commands on managed devices by an authorized device operator.\n\n\n\n\n\nSee Instruction Manual Appendix A and Appendix E dated 20230615 for more details.\n\n\nThis issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-34392"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e798c213-dedc-4240-95c8-9a7c35d2496a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c82ba98-730e-48d0-9245-7671937d210f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:14.692573Z",
"modified": "2023-09-01T00:05:14.692573Z",
"name": "CVE-2023-4653",
"description": "Cross-site Scripting (XSS) - Stored in GitHub repository instantsoft/icms2 prior to 2.16.1-git.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4653"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--52677633-ef3d-4b9d-a1e2-24625982342a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d537834-4212-439a-846d-0dfbedc9c621",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:13.755127Z",
"modified": "2023-09-01T00:05:13.755127Z",
"name": "CVE-2023-31172",
"description": "\nAn Incomplete Filtering of Special Elements vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.\n\n\n\n\n\nSee Instruction Manual Appendix A and Appendix E dated 20230615 for more details.\n\n\nThis issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-31172"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b5fba2c1-fa7e-4154-ae4e-3a2d6d7eb2b5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12ef1c9a-6c90-4b1c-8a92-0e45130d93db",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:14.290081Z",
"modified": "2023-09-01T00:05:14.290081Z",
"name": "CVE-2023-41045",
"description": "Graylog is a free and open log management platform. Graylog makes use of only one single source port for DNS queries. Graylog binds a single socket for outgoing DNS queries and while that socket is bound to a random port number it is never changed again. This goes against recommended practice since 2008, when Dan Kaminsky discovered how easy is to carry out DNS cache poisoning attacks. In order to prevent cache poisoning with spoofed DNS responses, it is necessary to maximise the uncertainty in the choice of a source port for a DNS query. Although unlikely in many setups, an external attacker could inject forged DNS responses into a Graylog's lookup table cache. In order to prevent this, it is at least recommendable to distribute the DNS queries through a pool of distinct sockets, each of them with a random source port and renew them periodically. This issue has been addressed in versions 5.0.9 and 5.1.3. Users are advised to upgrade. There are no known workarounds for this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-41045"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--653efd15-5375-4510-8dec-3ce9cf7e4996",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15765ba0-597e-4f81-b456-f4822d8788d3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-01T00:05:14.694957Z",
"modified": "2023-09-01T00:05:14.694957Z",
"name": "CVE-2023-4682",
"description": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4682"
}
]
}
]
}
Loading

0 comments on commit 9d1c948

Please sign in to comment.