Skip to content

Commit

Permalink
generated content from 2024-01-03
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 3, 2024
1 parent 922febd commit 83e5bc2
Show file tree
Hide file tree
Showing 107 changed files with 2,438 additions and 0 deletions.
106 changes: 106 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -221572,3 +221572,109 @@ vulnerability,CVE-2024-0185,vulnerability--347b9cc9-e27d-4345-b3a4-b2d6cad9e4f4
vulnerability,CVE-2024-0182,vulnerability--d6d6121b-8d48-4625-baf1-abe7e26959f0
vulnerability,CVE-2024-0183,vulnerability--d7ff3193-ec2a-4bd0-81a4-a22e7186c3d4
vulnerability,CVE-2024-0181,vulnerability--cc4bd09f-32b0-4464-9067-f6b03daa53ac
vulnerability,CVE-2023-7192,vulnerability--6a7fa7d3-ddff-445a-8169-f190f499ae6f
vulnerability,CVE-2023-32877,vulnerability--038e76ce-138c-4bf3-ac16-8d1983052a25
vulnerability,CVE-2023-32885,vulnerability--7ec67dd7-0595-4168-9c4e-ab6e5b470114
vulnerability,CVE-2023-32889,vulnerability--f5e4bacf-d92c-4dc0-9094-14e3ba6c3724
vulnerability,CVE-2023-32875,vulnerability--f38bf274-93e1-4ffb-95e9-845c912601b2
vulnerability,CVE-2023-32887,vulnerability--10200aa3-2dad-494a-b237-ef60f4155674
vulnerability,CVE-2023-32876,vulnerability--dfa26aac-5b7b-420b-bb24-524f0b8c90fb
vulnerability,CVE-2023-32880,vulnerability--b9990b78-afdf-450d-a6cb-da0e41469bfa
vulnerability,CVE-2023-32879,vulnerability--7de13c86-6ee4-4eda-8d96-a5d74f498032
vulnerability,CVE-2023-32831,vulnerability--7caad666-470a-4f30-b4c8-88b3cc9efa66
vulnerability,CVE-2023-32891,vulnerability--cf4fff58-d3d4-444f-b315-a5f4d95c2e95
vulnerability,CVE-2023-32890,vulnerability--95ff7ea4-7a22-460d-af15-847bdc531d60
vulnerability,CVE-2023-32888,vulnerability--6ba9f59f-a84f-4e1b-830d-4456f38147ac
vulnerability,CVE-2023-32886,vulnerability--3fcd9d33-41f5-473a-8269-eaafffb73096
vulnerability,CVE-2023-32878,vulnerability--552e3395-47c1-4df1-8661-bdcfe5cedb8b
vulnerability,CVE-2023-32872,vulnerability--8d18e985-736e-4bc8-a47f-362662b9199e
vulnerability,CVE-2023-32881,vulnerability--6ba05ace-5247-4623-b610-4fc0a0182064
vulnerability,CVE-2023-32884,vulnerability--2c082cb6-ab0d-4c71-babf-9cb19c2af175
vulnerability,CVE-2023-32874,vulnerability--dd8939aa-8a59-4620-b685-ade780bcbb09
vulnerability,CVE-2023-32883,vulnerability--465e684b-9534-466a-bb84-0868b677b43f
vulnerability,CVE-2023-32882,vulnerability--b8a448e4-45b1-4231-831a-375c6eaf0f5c
vulnerability,CVE-2023-47458,vulnerability--59899283-b002-4ec0-bf48-44e7ca3329a7
vulnerability,CVE-2023-47858,vulnerability--2e524fa2-00e1-4722-8a9a-247955fdd452
vulnerability,CVE-2023-47039,vulnerability--3a1a6ad6-b2a0-4f77-8dd9-7f3e12d383a8
vulnerability,CVE-2023-47216,vulnerability--6185bfb9-d57b-4cde-a192-0d3958e5ee43
vulnerability,CVE-2023-47857,vulnerability--c4cc7324-d02f-4bb1-a7ab-0265b67ecf7c
vulnerability,CVE-2023-4164,vulnerability--95ed5f1f-328a-42f6-a1f6-3260adfe4335
vulnerability,CVE-2023-4280,vulnerability--d64ea7a9-7d5a-4fe5-a17f-49881dc7a492
vulnerability,CVE-2023-28583,vulnerability--e4e854c6-060b-456e-8741-25095ac60b31
vulnerability,CVE-2023-26157,vulnerability--db75f8f8-dac2-444d-99f7-092cba4724e7
vulnerability,CVE-2023-26159,vulnerability--b0bbfad9-4234-4f9f-b122-b183e8619553
vulnerability,CVE-2023-33120,vulnerability--076b3cee-759b-4d16-a99c-e9d6fe0612ee
vulnerability,CVE-2023-33036,vulnerability--a4f3bd62-98d6-46f0-93d8-628f7d58e786
vulnerability,CVE-2023-33117,vulnerability--12592a5e-7863-47b9-ad87-54bc6b450658
vulnerability,CVE-2023-33118,vulnerability--d66325fc-c45b-4bed-b1ba-0eb54dbe1ca7
vulnerability,CVE-2023-33113,vulnerability--d1bc5c81-7dbd-4df1-b893-9751c1addf70
vulnerability,CVE-2023-33032,vulnerability--b6846511-ac5b-4532-8322-aa5169eff8d9
vulnerability,CVE-2023-33108,vulnerability--a7b46714-1399-4e69-95b1-bd230e4fd238
vulnerability,CVE-2023-33037,vulnerability--2acfa167-a319-4f21-ba0b-2d681ae8ce18
vulnerability,CVE-2023-33030,vulnerability--11865900-b171-4332-a415-369ddb0c24c4
vulnerability,CVE-2023-33094,vulnerability--3caa8fa9-08ca-468f-b038-ef315f7a4401
vulnerability,CVE-2023-33033,vulnerability--2833279a-666c-41b7-a19a-15740a41ae39
vulnerability,CVE-2023-33040,vulnerability--aa1b1c49-c466-40ed-aef1-ceb0b260bf10
vulnerability,CVE-2023-33116,vulnerability--73c09242-d587-4288-9fe4-d76b294bb45e
vulnerability,CVE-2023-33025,vulnerability--dac2fd5e-fde0-4d11-8c90-b72f24e1a81b
vulnerability,CVE-2023-33110,vulnerability--c75a2210-4cc7-4808-93f3-aa55582acfd9
vulnerability,CVE-2023-33014,vulnerability--6e9b176c-e6d9-4161-8d51-aa621b02dc6c
vulnerability,CVE-2023-33109,vulnerability--9e5b44c5-c46a-4099-a95e-31e960d6256b
vulnerability,CVE-2023-33112,vulnerability--b314a113-e365-4aec-8d62-e12814b9be41
vulnerability,CVE-2023-33085,vulnerability--a16536c3-0744-4cb3-8b2e-2ec23d7d83e0
vulnerability,CVE-2023-33114,vulnerability--de7b95ef-b188-48ce-adfe-015794d8512b
vulnerability,CVE-2023-33062,vulnerability--0e5d9016-d23e-4483-9b32-3ba265813b19
vulnerability,CVE-2023-33038,vulnerability--15611ace-9804-4735-9df1-f38ac56bace8
vulnerability,CVE-2023-49556,vulnerability--a1ff6144-7fe5-4c40-8585-dbd74f4f06e9
vulnerability,CVE-2023-49552,vulnerability--426f19bd-e966-4bb0-9f44-d84cded4ecda
vulnerability,CVE-2023-49142,vulnerability--f0c7a74a-5dd6-41ff-a7e5-d0a0e025dfaf
vulnerability,CVE-2023-49558,vulnerability--3572286b-7ff4-466b-9f28-c8942dbff9b1
vulnerability,CVE-2023-49555,vulnerability--3dc132f6-5cc4-4444-aa89-f453f1e75644
vulnerability,CVE-2023-49551,vulnerability--f0d6b8ac-01c1-4394-93b8-fd0307efcec8
vulnerability,CVE-2023-49549,vulnerability--ea22650b-b4e3-41e0-aa17-ab958ba341c5
vulnerability,CVE-2023-49554,vulnerability--70773ace-bde7-4052-8fa3-1a0f8ad863ad
vulnerability,CVE-2023-49557,vulnerability--9277c7d6-3437-4993-8349-75e7772b35dd
vulnerability,CVE-2023-49553,vulnerability--9b56ee06-4e0f-405f-9024-ab061e0ab225
vulnerability,CVE-2023-49550,vulnerability--27cb57cf-dcf7-4b28-8ee8-079b562632cc
vulnerability,CVE-2023-49135,vulnerability--b3b2942e-c1ad-4781-b397-4d78265636b0
vulnerability,CVE-2023-49794,vulnerability--79f009ef-6c90-427c-85b2-fff2c6d993ea
vulnerability,CVE-2023-51652,vulnerability--3d5dc2dc-12b0-4849-8a54-7c748d4e2501
vulnerability,CVE-2023-43512,vulnerability--76b7a96e-ccdc-4dba-8daf-21b40f4a0abc
vulnerability,CVE-2023-43511,vulnerability--272557e2-396e-4097-bb4f-d072fc5c4547
vulnerability,CVE-2023-43514,vulnerability--b487b487-bfcb-4915-9bd7-f1b364f75d91
vulnerability,CVE-2023-48419,vulnerability--683e4ec0-3d26-4448-80ae-ae2c14dfdade
vulnerability,CVE-2023-48732,vulnerability--24ffda52-f6be-45ce-a3f9-59dec8ad47d6
vulnerability,CVE-2023-48418,vulnerability--6dd3c826-6b84-4c6d-b40d-598febe636f8
vulnerability,CVE-2023-48360,vulnerability--29d9054f-5d18-4b6a-8a0d-9aeee88f7f98
vulnerability,CVE-2023-45561,vulnerability--b3c0ed1b-3f92-42e1-8d3d-3f97ae4132f3
vulnerability,CVE-2023-45893,vulnerability--8c7e3cf1-5199-40bd-90de-9c62b056fad9
vulnerability,CVE-2023-45892,vulnerability--8088ded7-a7f2-441e-b3f4-367cf97ed853
vulnerability,CVE-2023-50020,vulnerability--23a9b042-2587-495b-a5f9-5754a4ae1c8f
vulnerability,CVE-2023-50333,vulnerability--a01a88c4-2418-4134-9244-a4987152f1c2
vulnerability,CVE-2023-50711,vulnerability--b7e77aac-4304-4772-8548-080faa4498bb
vulnerability,CVE-2023-50019,vulnerability--bf438872-cab5-42d0-be26-462f00ab026d
vulnerability,CVE-2023-6436,vulnerability--99500c88-4d82-49e5-a397-6e8f5f3ab9a2
vulnerability,CVE-2023-6693,vulnerability--21aa2c4c-3d0e-46d3-982d-64ca13c89bf2
vulnerability,CVE-2023-6339,vulnerability--5e848ab1-5bdf-432e-83fb-bea7b398eae9
vulnerability,CVE-2018-25097,vulnerability--1d3bdc08-025e-4222-84c3-a7a2648bf713
vulnerability,CVE-2015-10128,vulnerability--77cdbda8-995e-4e48-a7f8-5d7608e4d773
vulnerability,CVE-2020-26624,vulnerability--3802496e-6f1a-4891-9322-ea289fb5ac4b
vulnerability,CVE-2020-26623,vulnerability--d9d21f96-e821-42d6-bce8-5daa2158fc82
vulnerability,CVE-2020-26625,vulnerability--c9d39d9f-4ce2-4dae-970d-6158ce1e1bad
vulnerability,CVE-2017-20188,vulnerability--12585fc0-b311-4432-837c-d5aaca1a6e9d
vulnerability,CVE-2024-21627,vulnerability--de0bb146-f25e-402e-8ea7-b49696ca054e
vulnerability,CVE-2024-21632,vulnerability--b2bd4373-6197-4760-8018-43c77b6d54de
vulnerability,CVE-2024-21623,vulnerability--171ecfff-33db-425e-87ba-fbeecfc01621
vulnerability,CVE-2024-21629,vulnerability--78a2c89c-8c1d-4741-bf89-cf03dadeec84
vulnerability,CVE-2024-21628,vulnerability--31b0c831-cc0c-47ae-9de2-0013025365df
vulnerability,CVE-2024-0194,vulnerability--03e39c55-f7a4-4fcf-8e0f-69d261c97cf5
vulnerability,CVE-2024-0186,vulnerability--17dfd4f3-c293-44f1-a077-3e83fe3f063f
vulnerability,CVE-2024-0191,vulnerability--58036f11-19b2-429c-85d7-81c198c011ae
vulnerability,CVE-2024-0192,vulnerability--e87ac4f9-ed9b-45fa-9ccc-737453414eed
vulnerability,CVE-2024-0189,vulnerability--2604d413-0e60-458e-919d-38f562a4c6fc
vulnerability,CVE-2024-0196,vulnerability--a638a9fd-a5f9-4ba3-b466-c0855f35c32e
vulnerability,CVE-2024-0190,vulnerability--81c6550d-3e47-471f-88e3-e51cc6b1962d
vulnerability,CVE-2024-0193,vulnerability--59d2a186-2b51-4db4-8164-8144b280e336
vulnerability,CVE-2024-0188,vulnerability--d28429c8-e510-4354-b974-22b3743716bb
vulnerability,CVE-2024-0195,vulnerability--95f16fe3-797a-4c29-8d6f-e3f3cf55f4da
vulnerability,CVE-2022-3010,vulnerability--b720017c-da74-492a-89ee-9da23edb3abb
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--acaedfc4-49ab-4ae2-976c-36ba25629366",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--038e76ce-138c-4bf3-ac16-8d1983052a25",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:05.54298Z",
"modified": "2024-01-03T00:28:05.54298Z",
"name": "CVE-2023-32877",
"description": "In battery, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308070.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-32877"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--03525d31-7323-4279-8255-a4f338a7ffc3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--03e39c55-f7a4-4fcf-8e0f-69d261c97cf5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:15.481644Z",
"modified": "2024-01-03T00:28:15.481644Z",
"name": "CVE-2024-0194",
"description": "A vulnerability, which was classified as critical, has been found in CodeAstro Internet Banking System up to 1.0. This issue affects some unknown processing of the file pages_account.php of the component Profile Picture Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249509 was assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-0194"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--51b9b546-39da-43c0-b6be-769ad012dd96",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--076b3cee-759b-4d16-a99c-e9d6fe0612ee",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:06.224626Z",
"modified": "2024-01-03T00:28:06.224626Z",
"name": "CVE-2023-33120",
"description": "Memory corruption in Audio when memory map command is executed consecutively in ADSP.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-33120"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--68c4c852-e3ca-4f9c-95b2-c09e9c31e878",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0e5d9016-d23e-4483-9b32-3ba265813b19",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:06.291935Z",
"modified": "2024-01-03T00:28:06.291935Z",
"name": "CVE-2023-33062",
"description": "Transient DOS in WLAN Firmware while parsing a BTM request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-33062"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7a9613f0-9a82-4c5a-843a-75fa2330c459",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10200aa3-2dad-494a-b237-ef60f4155674",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:05.552476Z",
"modified": "2024-01-03T00:28:05.552476Z",
"name": "CVE-2023-32887",
"description": "In Modem IMS Stack, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161837; Issue ID: MOLY01161837 (MSV-892).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-32887"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a8059e50-abdb-45b4-9c47-1ccc5b287255",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--11865900-b171-4332-a415-369ddb0c24c4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:06.253342Z",
"modified": "2024-01-03T00:28:06.253342Z",
"name": "CVE-2023-33030",
"description": "Memory corruption in HLOS while running playready use-case.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-33030"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--380ba519-fc3a-4465-b9af-f6e83d38836d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12585fc0-b311-4432-837c-d5aaca1a6e9d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:14.189348Z",
"modified": "2024-01-03T00:28:14.189348Z",
"name": "CVE-2017-20188",
"description": "A vulnerability has been found in Zimbra zm-ajax up to 8.8.1 and classified as problematic. Affected by this vulnerability is the function XFormItem.prototype.setError of the file WebRoot/js/ajax/dwt/xforms/XFormItem.js. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 8.8.2 is able to address this issue. The identifier of the patch is 8d039d6efe80780adc40c6f670c06d21de272105. It is recommended to upgrade the affected component. The identifier VDB-249421 was assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2017-20188"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c7247b1c-794e-4114-a33f-8117d021068d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--12592a5e-7863-47b9-ad87-54bc6b450658",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:06.232017Z",
"modified": "2024-01-03T00:28:06.232017Z",
"name": "CVE-2023-33117",
"description": "Memory corruption when HLOS allocates the response payload buffer to copy the data received from ADSP in response to AVCS_LOAD_MODULE command.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-33117"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a1d7e6c2-02e6-4bd6-a29b-d3c82d6df5e5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--15611ace-9804-4735-9df1-f38ac56bace8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:06.299546Z",
"modified": "2024-01-03T00:28:06.299546Z",
"name": "CVE-2023-33038",
"description": "Memory corruption while receiving a message in Bus Socket Transport Server.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-33038"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--902cd636-0aef-4cde-8a11-836721bbd552",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--171ecfff-33db-425e-87ba-fbeecfc01621",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-01-03T00:28:15.424208Z",
"modified": "2024-01-03T00:28:15.424208Z",
"name": "CVE-2024-21623",
"description": "OTCLient is an alternative tibia client for otserv. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient \"`Analysis - SonarCloud`\" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21623"
}
]
}
]
}
Loading

0 comments on commit 83e5bc2

Please sign in to comment.