From 331bc895b2caaa48da2dd39801bff4bb00d3a350 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Mon, 13 Jan 2025 22:18:05 +0000 Subject: [PATCH] generated content from 2025-01-13 --- mapping.csv | 23 +++++++++++++++++++ ...-06ce959a-7a4a-4d6e-b95b-867815f89b5c.json | 22 ++++++++++++++++++ ...-1037ef38-4767-4627-925f-af3395159df9.json | 22 ++++++++++++++++++ ...-1e0f1faf-e1f4-455e-9658-ef246a66f104.json | 22 ++++++++++++++++++ ...-26627969-a5f2-4f4e-a644-ccef761afc17.json | 22 ++++++++++++++++++ ...-295f2fbb-cd8c-4073-8c15-ee9eccdc000b.json | 22 ++++++++++++++++++ ...-2cf8f27a-3824-4482-9be8-ae30f494bbea.json | 22 ++++++++++++++++++ ...-2cfb84d2-44a1-48dd-8df0-5836f89b2caf.json | 22 ++++++++++++++++++ ...-310d8a33-d2fd-473a-be58-152ebdf8e744.json | 22 ++++++++++++++++++ ...-632d0b42-33ae-4822-a8fd-c3e5fd1f6dba.json | 22 ++++++++++++++++++ ...-66bb21b4-e6d9-4100-8b23-4122aefeb181.json | 22 ++++++++++++++++++ ...-6cc2f440-b98a-49bc-90f0-1e1a33106539.json | 22 ++++++++++++++++++ ...-708a1967-c181-4e30-98c4-201de1270c1a.json | 22 ++++++++++++++++++ ...-77c46ef6-34de-4bdf-b8d6-bfa53a2986d8.json | 22 ++++++++++++++++++ ...-829fc0f3-f429-4bad-a3ec-0658254365a3.json | 22 ++++++++++++++++++ ...-9476b093-0302-4134-b305-be7454c4bc1e.json | 22 ++++++++++++++++++ ...-a3370eea-5a53-42eb-80a0-5a7fb528bcae.json | 22 ++++++++++++++++++ ...-ad176bda-2060-459d-b9a5-004fa53ae6f0.json | 22 ++++++++++++++++++ ...-bc72cab1-81d0-428c-918a-24d89f6c7f46.json | 22 ++++++++++++++++++ ...-e16ed311-0615-449f-a366-7bed6ed37230.json | 22 ++++++++++++++++++ ...-e368db9c-4e80-4c47-a881-637ba77ddf6a.json | 22 ++++++++++++++++++ ...-e401305d-d7d0-4324-abf5-2da67c786ffd.json | 22 ++++++++++++++++++ ...-e9c62422-5140-4663-b42e-0699390400ff.json | 22 ++++++++++++++++++ ...-f09966f9-a26a-40b4-b573-25789c1f1fbe.json | 22 ++++++++++++++++++ 24 files changed, 529 insertions(+) create mode 100644 objects/vulnerability/vulnerability--06ce959a-7a4a-4d6e-b95b-867815f89b5c.json create mode 100644 objects/vulnerability/vulnerability--1037ef38-4767-4627-925f-af3395159df9.json create mode 100644 objects/vulnerability/vulnerability--1e0f1faf-e1f4-455e-9658-ef246a66f104.json create mode 100644 objects/vulnerability/vulnerability--26627969-a5f2-4f4e-a644-ccef761afc17.json create mode 100644 objects/vulnerability/vulnerability--295f2fbb-cd8c-4073-8c15-ee9eccdc000b.json create mode 100644 objects/vulnerability/vulnerability--2cf8f27a-3824-4482-9be8-ae30f494bbea.json create mode 100644 objects/vulnerability/vulnerability--2cfb84d2-44a1-48dd-8df0-5836f89b2caf.json create mode 100644 objects/vulnerability/vulnerability--310d8a33-d2fd-473a-be58-152ebdf8e744.json create mode 100644 objects/vulnerability/vulnerability--632d0b42-33ae-4822-a8fd-c3e5fd1f6dba.json create mode 100644 objects/vulnerability/vulnerability--66bb21b4-e6d9-4100-8b23-4122aefeb181.json create mode 100644 objects/vulnerability/vulnerability--6cc2f440-b98a-49bc-90f0-1e1a33106539.json create mode 100644 objects/vulnerability/vulnerability--708a1967-c181-4e30-98c4-201de1270c1a.json create mode 100644 objects/vulnerability/vulnerability--77c46ef6-34de-4bdf-b8d6-bfa53a2986d8.json create mode 100644 objects/vulnerability/vulnerability--829fc0f3-f429-4bad-a3ec-0658254365a3.json create mode 100644 objects/vulnerability/vulnerability--9476b093-0302-4134-b305-be7454c4bc1e.json create mode 100644 objects/vulnerability/vulnerability--a3370eea-5a53-42eb-80a0-5a7fb528bcae.json create mode 100644 objects/vulnerability/vulnerability--ad176bda-2060-459d-b9a5-004fa53ae6f0.json create mode 100644 objects/vulnerability/vulnerability--bc72cab1-81d0-428c-918a-24d89f6c7f46.json create mode 100644 objects/vulnerability/vulnerability--e16ed311-0615-449f-a366-7bed6ed37230.json create mode 100644 objects/vulnerability/vulnerability--e368db9c-4e80-4c47-a881-637ba77ddf6a.json create mode 100644 objects/vulnerability/vulnerability--e401305d-d7d0-4324-abf5-2da67c786ffd.json create mode 100644 objects/vulnerability/vulnerability--e9c62422-5140-4663-b42e-0699390400ff.json create mode 100644 objects/vulnerability/vulnerability--f09966f9-a26a-40b4-b573-25789c1f1fbe.json diff --git a/mapping.csv b/mapping.csv index 1ad3d26242..de52278225 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263120,3 +263120,26 @@ vulnerability,CVE-2025-22617,vulnerability--be65c524-58aa-453c-8e23-6cc258630cc5 vulnerability,CVE-2025-22616,vulnerability--0c4bf6ed-8ef0-4659-893c-7e76ceaae251 vulnerability,CVE-2025-22618,vulnerability--1a9aa62c-a235-4613-b509-d101fe4eab35 vulnerability,CVE-2025-22619,vulnerability--c24281cb-c1e5-4bbb-98b2-8c289beaa22b +vulnerability,CVE-2023-42241,vulnerability--77c46ef6-34de-4bdf-b8d6-bfa53a2986d8 +vulnerability,CVE-2023-42245,vulnerability--e9c62422-5140-4663-b42e-0699390400ff +vulnerability,CVE-2023-42239,vulnerability--295f2fbb-cd8c-4073-8c15-ee9eccdc000b +vulnerability,CVE-2023-42243,vulnerability--2cf8f27a-3824-4482-9be8-ae30f494bbea +vulnerability,CVE-2023-42234,vulnerability--9476b093-0302-4134-b305-be7454c4bc1e +vulnerability,CVE-2023-42248,vulnerability--1037ef38-4767-4627-925f-af3395159df9 +vulnerability,CVE-2023-42242,vulnerability--06ce959a-7a4a-4d6e-b95b-867815f89b5c +vulnerability,CVE-2023-42235,vulnerability--1e0f1faf-e1f4-455e-9658-ef246a66f104 +vulnerability,CVE-2023-42249,vulnerability--6cc2f440-b98a-49bc-90f0-1e1a33106539 +vulnerability,CVE-2023-42240,vulnerability--708a1967-c181-4e30-98c4-201de1270c1a +vulnerability,CVE-2023-42246,vulnerability--e401305d-d7d0-4324-abf5-2da67c786ffd +vulnerability,CVE-2023-42250,vulnerability--66bb21b4-e6d9-4100-8b23-4122aefeb181 +vulnerability,CVE-2023-42233,vulnerability--f09966f9-a26a-40b4-b573-25789c1f1fbe +vulnerability,CVE-2023-42236,vulnerability--829fc0f3-f429-4bad-a3ec-0658254365a3 +vulnerability,CVE-2023-42238,vulnerability--e16ed311-0615-449f-a366-7bed6ed37230 +vulnerability,CVE-2023-42247,vulnerability--26627969-a5f2-4f4e-a644-ccef761afc17 +vulnerability,CVE-2023-42244,vulnerability--2cfb84d2-44a1-48dd-8df0-5836f89b2caf +vulnerability,CVE-2023-42237,vulnerability--632d0b42-33ae-4822-a8fd-c3e5fd1f6dba +vulnerability,CVE-2024-11128,vulnerability--a3370eea-5a53-42eb-80a0-5a7fb528bcae +vulnerability,CVE-2024-56138,vulnerability--310d8a33-d2fd-473a-be58-152ebdf8e744 +vulnerability,CVE-2024-56323,vulnerability--bc72cab1-81d0-428c-918a-24d89f6c7f46 +vulnerability,CVE-2024-57811,vulnerability--ad176bda-2060-459d-b9a5-004fa53ae6f0 +vulnerability,CVE-2024-51491,vulnerability--e368db9c-4e80-4c47-a881-637ba77ddf6a diff --git a/objects/vulnerability/vulnerability--06ce959a-7a4a-4d6e-b95b-867815f89b5c.json b/objects/vulnerability/vulnerability--06ce959a-7a4a-4d6e-b95b-867815f89b5c.json new file mode 100644 index 0000000000..8f29440827 --- /dev/null +++ b/objects/vulnerability/vulnerability--06ce959a-7a4a-4d6e-b95b-867815f89b5c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d991cc30-a566-433d-ab35-3b34cc7c9c1d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--06ce959a-7a4a-4d6e-b95b-867815f89b5c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.290977Z", + "modified": "2025-01-13T22:17:41.290977Z", + "name": "CVE-2023-42242", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /monitor/s_terminal.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42242" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1037ef38-4767-4627-925f-af3395159df9.json b/objects/vulnerability/vulnerability--1037ef38-4767-4627-925f-af3395159df9.json new file mode 100644 index 0000000000..de402dfe2a --- /dev/null +++ b/objects/vulnerability/vulnerability--1037ef38-4767-4627-925f-af3395159df9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--04f507f7-c800-4d50-aee2-a9b5e5be3f11", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1037ef38-4767-4627-925f-af3395159df9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.281926Z", + "modified": "2025-01-13T22:17:41.281926Z", + "name": "CVE-2023-42248", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can write arbitrary files by manipulating POST parameters of the page \"common/vam_Sql.php\".", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42248" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1e0f1faf-e1f4-455e-9658-ef246a66f104.json b/objects/vulnerability/vulnerability--1e0f1faf-e1f4-455e-9658-ef246a66f104.json new file mode 100644 index 0000000000..21495a78d5 --- /dev/null +++ b/objects/vulnerability/vulnerability--1e0f1faf-e1f4-455e-9658-ef246a66f104.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--96af7f21-f6a0-45fb-a657-7cd0fd4a7298", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1e0f1faf-e1f4-455e-9658-ef246a66f104", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.292875Z", + "modified": "2025-01-13T22:17:41.292875Z", + "name": "CVE-2023-42235", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple parameters of /monitor/s_normalizedtrans.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42235" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--26627969-a5f2-4f4e-a644-ccef761afc17.json b/objects/vulnerability/vulnerability--26627969-a5f2-4f4e-a644-ccef761afc17.json new file mode 100644 index 0000000000..3fe783e450 --- /dev/null +++ b/objects/vulnerability/vulnerability--26627969-a5f2-4f4e-a644-ccef761afc17.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--95bb21bc-adba-49cd-a1fa-bbba97086d1d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--26627969-a5f2-4f4e-a644-ccef761afc17", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.318473Z", + "modified": "2025-01-13T22:17:41.318473Z", + "name": "CVE-2023-42247", + "description": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via monitor/s_monitor_map.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42247" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--295f2fbb-cd8c-4073-8c15-ee9eccdc000b.json b/objects/vulnerability/vulnerability--295f2fbb-cd8c-4073-8c15-ee9eccdc000b.json new file mode 100644 index 0000000000..ecadde25f8 --- /dev/null +++ b/objects/vulnerability/vulnerability--295f2fbb-cd8c-4073-8c15-ee9eccdc000b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--16c60fd8-805c-4b06-a8e2-67527fc460ad", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--295f2fbb-cd8c-4073-8c15-ee9eccdc000b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.27502Z", + "modified": "2025-01-13T22:17:41.27502Z", + "name": "CVE-2023-42239", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_ep.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42239" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2cf8f27a-3824-4482-9be8-ae30f494bbea.json b/objects/vulnerability/vulnerability--2cf8f27a-3824-4482-9be8-ae30f494bbea.json new file mode 100644 index 0000000000..a83746560e --- /dev/null +++ b/objects/vulnerability/vulnerability--2cf8f27a-3824-4482-9be8-ae30f494bbea.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d2ec4e31-2ae5-46c4-9d1b-26dc3160ee7a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2cf8f27a-3824-4482-9be8-ae30f494bbea", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.276222Z", + "modified": "2025-01-13T22:17:41.276222Z", + "name": "CVE-2023-42243", + "description": "In Selesta Visual Access Manager < 4.42.2, an authenticated user can access the administrative page /common/vam_Sql.php, which allows for arbitrary SQL queries.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42243" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2cfb84d2-44a1-48dd-8df0-5836f89b2caf.json b/objects/vulnerability/vulnerability--2cfb84d2-44a1-48dd-8df0-5836f89b2caf.json new file mode 100644 index 0000000000..ff216591c1 --- /dev/null +++ b/objects/vulnerability/vulnerability--2cfb84d2-44a1-48dd-8df0-5836f89b2caf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bb5f914b-d831-4ff3-b90f-529f080108fd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2cfb84d2-44a1-48dd-8df0-5836f89b2caf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.320548Z", + "modified": "2025-01-13T22:17:41.320548Z", + "name": "CVE-2023-42244", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_visits.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42244" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--310d8a33-d2fd-473a-be58-152ebdf8e744.json b/objects/vulnerability/vulnerability--310d8a33-d2fd-473a-be58-152ebdf8e744.json new file mode 100644 index 0000000000..66212ae05b --- /dev/null +++ b/objects/vulnerability/vulnerability--310d8a33-d2fd-473a-be58-152ebdf8e744.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bd75574c-771d-400e-b8a1-6421da8dac86", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--310d8a33-d2fd-473a-be58-152ebdf8e744", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:43.767078Z", + "modified": "2025-01-13T22:17:43.767078Z", + "name": "CVE-2024-56138", + "description": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab's audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-56138" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--632d0b42-33ae-4822-a8fd-c3e5fd1f6dba.json b/objects/vulnerability/vulnerability--632d0b42-33ae-4822-a8fd-c3e5fd1f6dba.json new file mode 100644 index 0000000000..3b8f16a341 --- /dev/null +++ b/objects/vulnerability/vulnerability--632d0b42-33ae-4822-a8fd-c3e5fd1f6dba.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--37114a32-746a-4c85-b58c-82257fa2d5ea", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--632d0b42-33ae-4822-a8fd-c3e5fd1f6dba", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.327275Z", + "modified": "2025-01-13T22:17:41.327275Z", + "name": "CVE-2023-42237", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple GET parameters of /vam/vam_i_command.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42237" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--66bb21b4-e6d9-4100-8b23-4122aefeb181.json b/objects/vulnerability/vulnerability--66bb21b4-e6d9-4100-8b23-4122aefeb181.json new file mode 100644 index 0000000000..d3fe9d4379 --- /dev/null +++ b/objects/vulnerability/vulnerability--66bb21b4-e6d9-4100-8b23-4122aefeb181.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4d43ce07-4cb3-44aa-8aa8-b3733835d179", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--66bb21b4-e6d9-4100-8b23-4122aefeb181", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.303183Z", + "modified": "2025-01-13T22:17:41.303183Z", + "name": "CVE-2023-42250", + "description": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via /common/autocomplete.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42250" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6cc2f440-b98a-49bc-90f0-1e1a33106539.json b/objects/vulnerability/vulnerability--6cc2f440-b98a-49bc-90f0-1e1a33106539.json new file mode 100644 index 0000000000..f156d102de --- /dev/null +++ b/objects/vulnerability/vulnerability--6cc2f440-b98a-49bc-90f0-1e1a33106539.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--14a07209-5723-4215-b8dd-dbaba8beca2f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6cc2f440-b98a-49bc-90f0-1e1a33106539", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.296384Z", + "modified": "2025-01-13T22:17:41.296384Z", + "name": "CVE-2023-42249", + "description": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via vam/vam_visits.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42249" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--708a1967-c181-4e30-98c4-201de1270c1a.json b/objects/vulnerability/vulnerability--708a1967-c181-4e30-98c4-201de1270c1a.json new file mode 100644 index 0000000000..c689adbc20 --- /dev/null +++ b/objects/vulnerability/vulnerability--708a1967-c181-4e30-98c4-201de1270c1a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d63c2d94-de32-46b5-9dde-94489f65d9ae", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--708a1967-c181-4e30-98c4-201de1270c1a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.298801Z", + "modified": "2025-01-13T22:17:41.298801Z", + "name": "CVE-2023-42240", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /monitor/s_scheduledfile.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42240" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--77c46ef6-34de-4bdf-b8d6-bfa53a2986d8.json b/objects/vulnerability/vulnerability--77c46ef6-34de-4bdf-b8d6-bfa53a2986d8.json new file mode 100644 index 0000000000..6696760b14 --- /dev/null +++ b/objects/vulnerability/vulnerability--77c46ef6-34de-4bdf-b8d6-bfa53a2986d8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b900f74a-224d-4825-9fa5-9f5e489aee5e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--77c46ef6-34de-4bdf-b8d6-bfa53a2986d8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.264177Z", + "modified": "2025-01-13T22:17:41.264177Z", + "name": "CVE-2023-42241", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_anagraphic.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42241" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--829fc0f3-f429-4bad-a3ec-0658254365a3.json b/objects/vulnerability/vulnerability--829fc0f3-f429-4bad-a3ec-0658254365a3.json new file mode 100644 index 0000000000..bed9a07346 --- /dev/null +++ b/objects/vulnerability/vulnerability--829fc0f3-f429-4bad-a3ec-0658254365a3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0d57fff7-679b-43a2-9327-2b5a90dcccf2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--829fc0f3-f429-4bad-a3ec-0658254365a3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.315997Z", + "modified": "2025-01-13T22:17:41.315997Z", + "name": "CVE-2023-42236", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in a GET parameter of /common/ajaxfunction.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42236" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9476b093-0302-4134-b305-be7454c4bc1e.json b/objects/vulnerability/vulnerability--9476b093-0302-4134-b305-be7454c4bc1e.json new file mode 100644 index 0000000000..d33d45a7ee --- /dev/null +++ b/objects/vulnerability/vulnerability--9476b093-0302-4134-b305-be7454c4bc1e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7f1ccb4e-64bb-4e3e-b9f6-138a12deb25d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9476b093-0302-4134-b305-be7454c4bc1e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.277813Z", + "modified": "2025-01-13T22:17:41.277813Z", + "name": "CVE-2023-42234", + "description": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Cross Site Request Forgery (CSRF) via the WSCView function.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42234" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a3370eea-5a53-42eb-80a0-5a7fb528bcae.json b/objects/vulnerability/vulnerability--a3370eea-5a53-42eb-80a0-5a7fb528bcae.json new file mode 100644 index 0000000000..87cbc9ec1a --- /dev/null +++ b/objects/vulnerability/vulnerability--a3370eea-5a53-42eb-80a0-5a7fb528bcae.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--19990de2-8127-4db3-b7c8-23c2759bd510", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a3370eea-5a53-42eb-80a0-5a7fb528bcae", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:43.666489Z", + "modified": "2025-01-13T22:17:43.666489Z", + "name": "CVE-2024-11128", + "description": "A vulnerability in the BitdefenderVirusScanner binary as used in Bitdefender Virus Scanner for MacOS may allow .dynamic library injection (DYLD injection) without being blocked by AppleMobileFileIntegrity (AMFI). This issue is caused by the absence of Hardened Runtime or Library Validation signing. This issue affects Bitdefender Virus Scanner versions before 3.18.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11128" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ad176bda-2060-459d-b9a5-004fa53ae6f0.json b/objects/vulnerability/vulnerability--ad176bda-2060-459d-b9a5-004fa53ae6f0.json new file mode 100644 index 0000000000..c4e8b2df6c --- /dev/null +++ b/objects/vulnerability/vulnerability--ad176bda-2060-459d-b9a5-004fa53ae6f0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4d399f78-7085-4841-9395-5958649c027a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ad176bda-2060-459d-b9a5-004fa53ae6f0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:44.710481Z", + "modified": "2025-01-13T22:17:44.710481Z", + "name": "CVE-2024-57811", + "description": "** UNSUPPORTED WHEN ASSIGNED ** In Eaton X303 3.5.16 - X303 3.5.17 Build 712, an attacker with network access to a XC-303 PLC can login as root over SSH. The root password is hardcoded in the firmware. NOTE: This vulnerability appears in versions that are no longer supported by Eaton.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-57811" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bc72cab1-81d0-428c-918a-24d89f6c7f46.json b/objects/vulnerability/vulnerability--bc72cab1-81d0-428c-918a-24d89f6c7f46.json new file mode 100644 index 0000000000..4d06627823 --- /dev/null +++ b/objects/vulnerability/vulnerability--bc72cab1-81d0-428c-918a-24d89f6c7f46.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eff49cf2-db6a-44d8-90c3-56e22fb634a4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bc72cab1-81d0-428c-918a-24d89f6c7f46", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:43.846828Z", + "modified": "2025-01-13T22:17:43.846828Z", + "name": "CVE-2024-56323", + "description": "OpenFGA is an authorization/permission engine. IN OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass under the following conditions: 1. calling Check API or ListObjects with a model that uses [conditions](https://openfga.dev/docs/modeling/conditions), and 2. calling Check API or ListObjects API with [contextual tuples](https://openfga.dev/docs/concepts#what-are-contextual-tuples) that include conditions and 3. OpenFGA is configured with caching enabled (`OPENFGA_CHECK_QUERY_CACHE_ENABLED`). Users are advised to upgrade to v1.8.3. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-56323" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e16ed311-0615-449f-a366-7bed6ed37230.json b/objects/vulnerability/vulnerability--e16ed311-0615-449f-a366-7bed6ed37230.json new file mode 100644 index 0000000000..b82f0a4d0f --- /dev/null +++ b/objects/vulnerability/vulnerability--e16ed311-0615-449f-a366-7bed6ed37230.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0eb96456-b5ba-4241-8062-5704fe7fd753", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e16ed311-0615-449f-a366-7bed6ed37230", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.317521Z", + "modified": "2025-01-13T22:17:41.317521Z", + "name": "CVE-2023-42238", + "description": "An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_eps.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42238" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e368db9c-4e80-4c47-a881-637ba77ddf6a.json b/objects/vulnerability/vulnerability--e368db9c-4e80-4c47-a881-637ba77ddf6a.json new file mode 100644 index 0000000000..a844284406 --- /dev/null +++ b/objects/vulnerability/vulnerability--e368db9c-4e80-4c47-a881-637ba77ddf6a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ab651891-ef20-4c80-ba2f-6234678aac28", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e368db9c-4e80-4c47-a881-637ba77ddf6a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:45.715896Z", + "modified": "2025-01-13T22:17:45.715896Z", + "name": "CVE-2024-51491", + "description": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. The issue was identified during Quarkslab's security audit on the Certificate Revocation List (CRL) based revocation check feature.\nAfter retrieving the CRL, notation-go attempts to update the CRL cache using the os.Rename method. However, this operation may fail due to operating system-specific limitations, particularly when the source and destination paths are on different mount points. This failure could lead to an unexpected program termination. In method `crl.(*FileCache).Set`, a temporary file is created in the OS dedicated area (like /tmp for, usually, Linux/Unix). The file is written and then it is tried to move it to the dedicated `notation` cache directory thanks `os.Rename`. As specified in Go documentation, OS specific restriction may apply. When used with Linux OS, it is relying on rename syscall from the libc and as per the documentation, moving a file to a different mountpoint raises an EXDEV error, interpreted as Cross device link not permitted error. Some Linux distribution, like RedHat use a dedicated filesystem (tmpfs), mounted on a specific mountpoint (usually /tmp) for temporary files. When using such OS, revocation check based on CRL will repeatedly crash notation. As a result the signature verification process is aborted as process crashes. This issue has been addressed in version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-51491" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e401305d-d7d0-4324-abf5-2da67c786ffd.json b/objects/vulnerability/vulnerability--e401305d-d7d0-4324-abf5-2da67c786ffd.json new file mode 100644 index 0000000000..2eec512a60 --- /dev/null +++ b/objects/vulnerability/vulnerability--e401305d-d7d0-4324-abf5-2da67c786ffd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--42ab0c98-cb43-4e2f-9ce4-e7f8989fd753", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e401305d-d7d0-4324-abf5-2da67c786ffd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.301775Z", + "modified": "2025-01-13T22:17:41.301775Z", + "name": "CVE-2023-42246", + "description": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via /vam/vam_ep.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42246" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e9c62422-5140-4663-b42e-0699390400ff.json b/objects/vulnerability/vulnerability--e9c62422-5140-4663-b42e-0699390400ff.json new file mode 100644 index 0000000000..17a7adb8bc --- /dev/null +++ b/objects/vulnerability/vulnerability--e9c62422-5140-4663-b42e-0699390400ff.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2a88354c-8e7c-4921-98d4-189e26d7e0a2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e9c62422-5140-4663-b42e-0699390400ff", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.273443Z", + "modified": "2025-01-13T22:17:41.273443Z", + "name": "CVE-2023-42245", + "description": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via monitor/s_scheduledfile.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42245" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f09966f9-a26a-40b4-b573-25789c1f1fbe.json b/objects/vulnerability/vulnerability--f09966f9-a26a-40b4-b573-25789c1f1fbe.json new file mode 100644 index 0000000000..fbf7c56d8c --- /dev/null +++ b/objects/vulnerability/vulnerability--f09966f9-a26a-40b4-b573-25789c1f1fbe.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d309dc48-0981-403c-8928-93b3190b79db", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f09966f9-a26a-40b4-b573-25789c1f1fbe", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T22:17:41.306512Z", + "modified": "2025-01-13T22:17:41.306512Z", + "name": "CVE-2023-42233", + "description": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Cross Site Scripting (XSS) via the Filter/FilterEditor function.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-42233" + } + ] + } + ] +} \ No newline at end of file