Skip to content

Commit

Permalink
generated content from 2023-09-02
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Sep 2, 2023
1 parent 9d1c948 commit b84871f
Show file tree
Hide file tree
Showing 80 changed files with 1,817 additions and 0 deletions.
79 changes: 79 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -211525,3 +211525,82 @@ vulnerability,CVE-2023-2173,vulnerability--1f8d764a-55ff-4dd4-b2f4-35816f26075f
vulnerability,CVE-2022-45451,vulnerability--56ffacc8-62e0-4819-94d2-47560eb52f82
vulnerability,CVE-2022-46868,vulnerability--3dae4ab2-cf9b-44d2-a1ff-eb72a9a2e70c
vulnerability,CVE-2022-46869,vulnerability--98fd7fbe-77b3-4d42-be9b-ee12b68416e1
vulnerability,CVE-2023-40980,vulnerability--98dfb570-c0a3-4098-9525-c3168eab5f68
vulnerability,CVE-2023-40771,vulnerability--2cede485-4d30-49f2-9c1c-033854dfbd1e
vulnerability,CVE-2023-40969,vulnerability--789682c7-38eb-4880-8196-406ce15af1f1
vulnerability,CVE-2023-40239,vulnerability--ea667a12-cee7-4977-b0b4-fc0523f5c6b0
vulnerability,CVE-2023-40970,vulnerability--ddc63b35-537b-44c0-9234-643c30e19b90
vulnerability,CVE-2023-40968,vulnerability--c0449620-2440-4715-9a2f-c49026404524
vulnerability,CVE-2023-37829,vulnerability--9f9be1c7-4736-4cc1-8175-210cdaa5b99f
vulnerability,CVE-2023-37893,vulnerability--4bc9e828-fece-4473-9bec-43f7fae15d0a
vulnerability,CVE-2023-37827,vulnerability--78b0d7e0-5cd0-4394-861a-f3054cfb0e2c
vulnerability,CVE-2023-37826,vulnerability--cb5fd30b-e04b-41ee-9685-799054015651
vulnerability,CVE-2023-37830,vulnerability--d61b79f2-9b49-42a3-8c35-0d1834c9d644
vulnerability,CVE-2023-37997,vulnerability--6c57c392-8382-40a5-8bd0-f3e5f99ef827
vulnerability,CVE-2023-37986,vulnerability--7d3e8d9e-677d-4537-b805-dc6f7babaa37
vulnerability,CVE-2023-37828,vulnerability--7d42a22b-5a89-4846-942f-84c3c0983f45
vulnerability,CVE-2023-37994,vulnerability--19621275-8efc-4d69-9614-87b415aa135d
vulnerability,CVE-2023-28366,vulnerability--d9f6e3a4-0251-4271-9fec-7cd28c9a71c8
vulnerability,CVE-2023-3297,vulnerability--994879ae-e4cb-4fa6-9f79-9e6bbf792b7f
vulnerability,CVE-2023-3950,vulnerability--a5a2e563-5f26-4b24-9ab9-ec943402a447
vulnerability,CVE-2023-3915,vulnerability--7d54f386-6398-4d74-9f59-bc74af19ad89
vulnerability,CVE-2023-3205,vulnerability--74cad8e8-881a-444c-8020-8c77c54a85f4
vulnerability,CVE-2023-3210,vulnerability--7a12a991-9a3c-4c5d-9f1c-cf5f94f1ada1
vulnerability,CVE-2023-39582,vulnerability--467bf023-1654-49dc-bfed-06173181b05d
vulnerability,CVE-2023-39714,vulnerability--ab288444-a0c5-441f-918e-c8ebd9e4eb27
vulnerability,CVE-2023-39703,vulnerability--a5a4e792-b9eb-4d59-9c9d-86eeb95c5ddb
vulnerability,CVE-2023-39685,vulnerability--c89f06ff-36a9-4d93-8e80-e6b668c3285a
vulnerability,CVE-2023-39710,vulnerability--94c08bee-452a-416e-83ca-d7426b82249d
vulnerability,CVE-2023-39631,vulnerability--16f0e723-8925-4d2e-97df-da60304699c7
vulnerability,CVE-2023-1279,vulnerability--c0724848-d67f-4c1f-9c5d-46f1c6a98428
vulnerability,CVE-2023-1523,vulnerability--2eaf0ad9-6195-44ee-920b-f2b7ea843028
vulnerability,CVE-2023-1555,vulnerability--4de2393b-6c99-4e84-ad17-a6cb77479360
vulnerability,CVE-2023-23763,vulnerability--ec92aec5-f098-436b-bdf3-9d38941a2614
vulnerability,CVE-2023-36326,vulnerability--e8ab44f3-df93-4f8d-bf31-18f576455bd2
vulnerability,CVE-2023-36327,vulnerability--167b4326-4ad8-428c-9144-ae8eba0eb5db
vulnerability,CVE-2023-36100,vulnerability--fc6b2bc7-2e1c-4985-bd8c-f9d29687358b
vulnerability,CVE-2023-36187,vulnerability--e4eef4f5-46db-4cc3-8db4-725a9574eb2f
vulnerability,CVE-2023-36076,vulnerability--075a18ac-7f8a-47b5-bfff-0be1a9f1ab8e
vulnerability,CVE-2023-36088,vulnerability--b85c2712-4330-4912-be4e-dc0ced48b956
vulnerability,CVE-2023-36328,vulnerability--eb391cc6-a471-491b-9922-5a041744c6cd
vulnerability,CVE-2023-25042,vulnerability--da68b485-37ff-4da9-bc13-86251b3623e6
vulnerability,CVE-2023-25488,vulnerability--9cca07fd-b5fe-4c3c-941d-3cb8feac1a4b
vulnerability,CVE-2023-25477,vulnerability--b4535fc0-0393-4ee5-a75a-f50afcc5c41c
vulnerability,CVE-2023-25044,vulnerability--53d7382e-aed3-413a-bcc9-d27b4e2f00ab
vulnerability,CVE-2023-34011,vulnerability--700a9597-6689-425e-986d-613289c06b3a
vulnerability,CVE-2023-41364,vulnerability--033166c3-c2b8-4e84-ab4f-0ef85d9fc497
vulnerability,CVE-2023-41051,vulnerability--704acf38-9d37-466c-af42-d4b6976a61ee
vulnerability,CVE-2023-41628,vulnerability--a4a608c9-e746-4f87-8d4c-c06f9ebdfce0
vulnerability,CVE-2023-41633,vulnerability--9d46c3b4-00a4-417d-88cc-989a257e1643
vulnerability,CVE-2023-41049,vulnerability--14be966a-8edf-4803-806f-ecff86293665
vulnerability,CVE-2023-41627,vulnerability--8dfca7d3-a09b-4157-8fbc-73eac99a3f66
vulnerability,CVE-2023-41046,vulnerability--44e4b3b0-b663-4a92-9e4c-1f4cb798af90
vulnerability,CVE-2023-0120,vulnerability--ce0f4059-f629-4743-9eb4-457eb00be4b3
vulnerability,CVE-2023-24674,vulnerability--bf334d5b-4f2e-437d-a0e2-cdbd48dc5614
vulnerability,CVE-2023-24675,vulnerability--714cfaaa-fe99-4652-b672-f04938c6d9ae
vulnerability,CVE-2023-24412,vulnerability--71d402ab-ec48-4f66-b1d8-5337ceb78823
vulnerability,CVE-2023-4708,vulnerability--2edda179-34d6-4e35-a99a-5254fb277c1b
vulnerability,CVE-2023-4697,vulnerability--4df4e10d-a0dc-40c3-8f6a-397a4d7e18fc
vulnerability,CVE-2023-4711,vulnerability--20c8787d-3c14-4cc5-9b6a-bd2c6014a50a
vulnerability,CVE-2023-4714,vulnerability--2f1cd38f-1e84-4c4b-be32-9a7d5f0778b1
vulnerability,CVE-2023-4713,vulnerability--332e1603-8de2-46f2-bf9e-966955e8e040
vulnerability,CVE-2023-4710,vulnerability--fa9a9144-c7c8-4586-a17f-160729555083
vulnerability,CVE-2023-4378,vulnerability--fbbd2b36-7775-4cb1-904a-ce7c96d3b349
vulnerability,CVE-2023-4647,vulnerability--40ccfd08-a9f9-4572-9977-c2210ccb73d3
vulnerability,CVE-2023-4707,vulnerability--0141a9cf-be44-45e2-bfe9-ffc66134b902
vulnerability,CVE-2023-4018,vulnerability--3db337b9-1a24-488b-9b0f-6d8e366fce7b
vulnerability,CVE-2023-4695,vulnerability--737807d4-ec13-42cb-9708-7a34e16084b2
vulnerability,CVE-2023-4709,vulnerability--694d9716-dc52-4f6c-8ecc-27664428a02e
vulnerability,CVE-2023-4720,vulnerability--540ebb35-89eb-496e-a267-6b2ed9c0a91f
vulnerability,CVE-2023-4704,vulnerability--45c2c47e-180d-4932-91a1-e5d2dea3ce24
vulnerability,CVE-2023-4712,vulnerability--d90656f3-b94f-4fd6-8ef1-2c6d8f25f52a
vulnerability,CVE-2023-4698,vulnerability--40bcb3c4-10e0-49ff-8d6a-534c4e16dda0
vulnerability,CVE-2023-4721,vulnerability--93be119a-c567-4a67-81c2-1cc3d0c7d09e
vulnerability,CVE-2023-4696,vulnerability--5554d532-7d51-4f4d-8d3a-10651e5ccb8b
vulnerability,CVE-2023-4722,vulnerability--12f60047-1f4d-4a20-b1e9-38d5b2772d5c
vulnerability,CVE-2020-22612,vulnerability--4c5f69e6-b928-4158-a52b-99a8f97f74a0
vulnerability,CVE-2022-3407,vulnerability--3db50817-5ed3-4fec-bd61-50e24cb4657a
vulnerability,CVE-2022-46527,vulnerability--5104591f-da91-4468-ad01-932c230d05d6
vulnerability,CVE-2022-22305,vulnerability--830b5706-2265-439b-b9e2-91ca0cf8c30f
vulnerability,CVE-2022-44349,vulnerability--0af5d330-3222-4c31-aaeb-2ff5e78a0d23
vulnerability,CVE-2022-4343,vulnerability--1f10d38c-0dec-405c-a4db-605fc4470235
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1b7620b9-14fa-4731-8d80-10d86b3a37ee",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0141a9cf-be44-45e2-bfe9-ffc66134b902",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:25.636346Z",
"modified": "2023-09-02T00:05:25.636346Z",
"name": "CVE-2023-4707",
"description": "A vulnerability was found in Infosoftbd Clcknshop 1.0.0. It has been declared as problematic. This vulnerability affects unknown code of the file /collection/all. The manipulation of the argument q leads to cross site scripting. The attack can be initiated remotely. VDB-238570 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4707"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--db754683-b726-4990-8252-273ca87a1c27",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--033166c3-c2b8-4e84-ab4f-0ef85d9fc497",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:24.901428Z",
"modified": "2023-09-02T00:05:24.901428Z",
"name": "CVE-2023-41364",
"description": "In tine through 2023.01.14.325, the sort parameter of the /index.php endpoint allows SQL Injection.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-41364"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--85ce1577-2c2c-41b8-ac5e-fa128a5c0957",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--075a18ac-7f8a-47b5-bfff-0be1a9f1ab8e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:24.256715Z",
"modified": "2023-09-02T00:05:24.256715Z",
"name": "CVE-2023-36076",
"description": "SQL Injection vulnerability in smanga version 3.1.9 and earlier, allows remote attackers to execute arbitrary code and gain sensitive information via mediaId, mangaId, and userId parameters in php/history/add.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-36076"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ac42a42d-a8c6-4144-b3f5-84a023fadcfc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0af5d330-3222-4c31-aaeb-2ff5e78a0d23",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:39.429457Z",
"modified": "2023-09-02T00:05:39.429457Z",
"name": "CVE-2022-44349",
"description": "NAVBLUE S.A.S N-Ops & Crew 22.5-rc.50 is vulnerable to Cross Site Scripting (XSS).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-44349"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--65d123c5-a481-4cc6-9bd3-98072a88b41e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12f60047-1f4d-4a20-b1e9-38d5b2772d5c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:25.699165Z",
"modified": "2023-09-02T00:05:25.699165Z",
"name": "CVE-2023-4722",
"description": "Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.3-DEV.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4722"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--681e6ca9-b5d5-4aad-9f56-13a729e0441a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--14be966a-8edf-4803-806f-ecff86293665",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:24.941107Z",
"modified": "2023-09-02T00:05:24.941107Z",
"name": "CVE-2023-41049",
"description": "@dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-41049"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8a887725-a611-4571-b78f-d6445272fac2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--167b4326-4ad8-428c-9144-ae8eba0eb5db",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:24.23165Z",
"modified": "2023-09-02T00:05:24.23165Z",
"name": "CVE-2023-36327",
"description": "Integer Overflow vulnerability in RELIC before commit 421f2e91cf2ba42473d4d54daf24e295679e290e, allows attackers to execute arbitrary code and cause a denial of service in pos argument in bn_get_prime function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-36327"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4a41c696-c212-4afe-9787-745844e429c8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16f0e723-8925-4d2e-97df-da60304699c7",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:23.886649Z",
"modified": "2023-09-02T00:05:23.886649Z",
"name": "CVE-2023-39631",
"description": "An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary code via the evaluate function in the numexpr library.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39631"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f7a37d3b-4d44-4d34-851a-4d1f193117b1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19621275-8efc-4d69-9614-87b415aa135d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:23.600789Z",
"modified": "2023-09-02T00:05:23.600789Z",
"name": "CVE-2023-37994",
"description": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Artem Abramovich Art Decoration Shortcode plugin <= 1.5.6 versions.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37994"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--56b73f7a-c832-4619-a70c-2ebe751aff2e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1f10d38c-0dec-405c-a4db-605fc4470235",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:39.781943Z",
"modified": "2023-09-02T00:05:39.781943Z",
"name": "CVE-2022-4343",
"description": "An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which a project member can leak credentials stored in site profile.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-4343"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8752e168-e7cc-490d-9ab1-19774073f2c5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--20c8787d-3c14-4cc5-9b6a-bd2c6014a50a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:25.614151Z",
"modified": "2023-09-02T00:05:25.614151Z",
"name": "CVE-2023-4711",
"description": "A vulnerability, which was classified as critical, has been found in D-Link DAR-8000-10 up to 20230819. Affected by this issue is some unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-238574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4711"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8e61ff5c-1bee-4439-94ba-32b5b4a9f048",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2cede485-4d30-49f2-9c1c-033854dfbd1e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:23.30001Z",
"modified": "2023-09-02T00:05:23.30001Z",
"name": "CVE-2023-40771",
"description": "SQL injection vulnerability in DataEase v.1.18.9 allows a remote attacker to obtain sensitive information via a crafted string outside of the blacklist function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40771"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c192cff6-9158-4e0b-905f-9e63eea297fd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2eaf0ad9-6195-44ee-920b-f2b7ea843028",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-09-02T00:05:24.061278Z",
"modified": "2023-09-02T00:05:24.061278Z",
"name": "CVE-2023-1523",
"description": "Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-1523"
}
]
}
]
}
Loading

0 comments on commit b84871f

Please sign in to comment.