Skip to content

Commit

Permalink
generated content from 2023-08-15
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Aug 15, 2023
1 parent bac1a49 commit aa3b423
Show file tree
Hide file tree
Showing 135 changed files with 3,082 additions and 0 deletions.
134 changes: 134 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -210211,3 +210211,137 @@ vulnerability,CVE-2023-39391,vulnerability--d88ad69a-2822-466f-a828-585416b84dec
vulnerability,CVE-2023-39385,vulnerability--dfb44e44-df9b-4c0b-a0b5-c23b365181a3
vulnerability,CVE-2023-39387,vulnerability--b1c2da86-8fd2-437f-9093-aa8d1b83e8c3
vulnerability,CVE-2021-46895,vulnerability--0fb7d8e8-17ab-44ae-b5ab-ed264004abd2
vulnerability,CVE-2022-42828,vulnerability--3dc2e45e-8253-407d-b976-95eec66d201a
vulnerability,CVE-2022-46706,vulnerability--de4309b4-3992-4780-903c-3cbb3f5729e4
vulnerability,CVE-2022-46725,vulnerability--35226aab-d87e-442a-9dfd-4e6174871d21
vulnerability,CVE-2022-46724,vulnerability--fc934e73-0d72-41c4-862f-5ae08cd6a2af
vulnerability,CVE-2022-46722,vulnerability--d6e33f2d-6cb8-4a88-a305-29a085089863
vulnerability,CVE-2022-4953,vulnerability--a2f8e0de-3265-4683-9a53-d79834216505
vulnerability,CVE-2022-22646,vulnerability--aa552c4a-6905-4e44-8a91-5ddf298d298a
vulnerability,CVE-2022-22655,vulnerability--8e1ecc15-6e9d-4ff6-93c2-8c70e5fa1d25
vulnerability,CVE-2022-26699,vulnerability--4783215c-39e4-438e-a0a7-fca1ae88ce01
vulnerability,CVE-2022-48503,vulnerability--d0586e74-c477-400c-aa39-f2d55aa4f07d
vulnerability,CVE-2022-32876,vulnerability--20ae229f-03ff-4dd8-9c3f-ce08d978f089
vulnerability,CVE-2020-36615,vulnerability--dd1bc863-43e8-4864-b684-371933f0af97
vulnerability,CVE-2023-0872,vulnerability--1c123e66-8a6b-49a4-8d81-a0fda95fd1c4
vulnerability,CVE-2023-30754,vulnerability--af0b51aa-6767-451a-adc7-dc0f5102d23b
vulnerability,CVE-2023-30489,vulnerability--92d289b5-3eda-4697-ad41-78d77ae86af9
vulnerability,CVE-2023-30188,vulnerability--189dd923-f9cb-47f1-9712-f95052f58a54
vulnerability,CVE-2023-30751,vulnerability--05822972-d42e-4ffa-b087-d9950ad08a71
vulnerability,CVE-2023-30187,vulnerability--945d1ac2-ba7e-453a-be23-402ec271110e
vulnerability,CVE-2023-30483,vulnerability--19138582-811b-4554-98fc-349c32ea6f83
vulnerability,CVE-2023-30477,vulnerability--aca17833-212b-4d0d-87b8-fa4c4a4824ad
vulnerability,CVE-2023-30475,vulnerability--ac59f899-79a2-4817-a630-50e5546d5de1
vulnerability,CVE-2023-30749,vulnerability--835189d8-5d09-4869-8ffb-ca20920ddf2d
vulnerability,CVE-2023-30186,vulnerability--efcc6aa2-e46e-48e5-b6b3-fbcf6e6685c7
vulnerability,CVE-2023-30752,vulnerability--e83f12dc-8c9d-47d3-855a-39b1826e80d2
vulnerability,CVE-2023-31041,vulnerability--3bc651c1-0676-42f5-9d5f-df53b6c78dea
vulnerability,CVE-2023-20965,vulnerability--bb5a8ca6-3bdc-4abd-9554-3e2328af0e96
vulnerability,CVE-2023-29097,vulnerability--e51d44bf-4bc1-4174-9e66-56cd424fa6a2
vulnerability,CVE-2023-29468,vulnerability--7a9f4436-dbda-4e81-a031-f19910ed5ac0
vulnerability,CVE-2023-2803,vulnerability--6c010050-2610-49c8-bcc8-95c15f72c362
vulnerability,CVE-2023-2606,vulnerability--cd12a330-8cff-444d-a800-b7ca6f3b2d4c
vulnerability,CVE-2023-2802,vulnerability--e92e3ad0-c507-4601-a9ee-acc81a3b0200
vulnerability,CVE-2023-37070,vulnerability--33fbcd5b-e7af-48a8-b6b9-56b550e6ba08
vulnerability,CVE-2023-37847,vulnerability--a44e0105-c1ca-4c20-8ea9-44e762acb234
vulnerability,CVE-2023-4322,vulnerability--13b6ee8e-011b-43f1-89dc-8fd673be473d
vulnerability,CVE-2023-4321,vulnerability--94ef13ca-a3d0-4102-88ba-4a88e6549119
vulnerability,CVE-2023-27948,vulnerability--9940fc5e-d41f-46a2-a176-3155249dd75f
vulnerability,CVE-2023-27947,vulnerability--b7429ebc-2d66-4861-895b-0143c2b7b0e6
vulnerability,CVE-2023-27939,vulnerability--3ed67620-b24e-405d-9650-2a3ff677b6ac
vulnerability,CVE-2023-38741,vulnerability--ef4b7beb-f8ca-43d9-9a16-2946f41c7e27
vulnerability,CVE-2023-38721,vulnerability--54f2ebcc-8072-49db-aa31-743736921763
vulnerability,CVE-2023-38687,vulnerability--057cfcb2-411c-41af-b6be-ac11b581b5ad
vulnerability,CVE-2023-21287,vulnerability--a385a7ee-4ee4-4f76-8dca-8a201c63eff0
vulnerability,CVE-2023-21268,vulnerability--48f34008-bcf1-460f-bb39-a52a4480bc1e
vulnerability,CVE-2023-21278,vulnerability--d1119e05-970e-4038-b527-9031f6c359f4
vulnerability,CVE-2023-21265,vulnerability--2fba7fd1-eece-4f8f-a448-519fb8b42324
vulnerability,CVE-2023-21289,vulnerability--d4280ec3-b3c3-4ae0-b7b8-760a831ca868
vulnerability,CVE-2023-21235,vulnerability--91e5ccfb-a621-42a9-b15a-f6a57aeb3b43
vulnerability,CVE-2023-21280,vulnerability--af28a209-5928-4288-ae98-93cf60974bf0
vulnerability,CVE-2023-21229,vulnerability--d877b014-3aab-4f62-a260-99be72fcb0c6
vulnerability,CVE-2023-21269,vulnerability--038335cf-e70a-45d7-9c82-07cd3f72528a
vulnerability,CVE-2023-21279,vulnerability--f0b0531a-15ae-483e-b8e4-872fe94d9cb9
vulnerability,CVE-2023-21133,vulnerability--fe68cbc7-37c3-48b3-b475-1c6fa2cf1bf5
vulnerability,CVE-2023-21286,vulnerability--71cde514-2ab6-4f63-9062-03793e1c40da
vulnerability,CVE-2023-21288,vulnerability--25ec78d1-b254-47fd-98f2-62974e5a86ee
vulnerability,CVE-2023-21290,vulnerability--2e2a10a1-aab8-4c7a-8f66-7e728e98105e
vulnerability,CVE-2023-21242,vulnerability--9a3f4aad-d043-4b45-a71b-77b46fb48f59
vulnerability,CVE-2023-21282,vulnerability--686c0110-c3e5-4889-81a1-c1e177e14ce5
vulnerability,CVE-2023-21267,vulnerability--e1b47e5a-f3a7-45be-8070-a769aa519613
vulnerability,CVE-2023-21232,vulnerability--6aa462f5-b2bd-4a07-aafb-b5316dadddca
vulnerability,CVE-2023-21134,vulnerability--250c2a31-3bee-432a-a3e1-e90b8084ad54
vulnerability,CVE-2023-21276,vulnerability--d8d4c801-16a7-42a6-a153-d03facb6eaaa
vulnerability,CVE-2023-21140,vulnerability--4ef697a4-2e87-4c6e-8137-2ad69564a9dd
vulnerability,CVE-2023-21234,vulnerability--1bf6e4c3-903d-4712-bd78-c4a5033d7a04
vulnerability,CVE-2023-21285,vulnerability--48fe7d9c-0591-498d-b1ef-3a6cbb41e948
vulnerability,CVE-2023-21274,vulnerability--4214c33f-011f-456d-b3ef-d97b90038eca
vulnerability,CVE-2023-21271,vulnerability--976a76b6-f90c-4e02-a284-8526c0ad7dc6
vulnerability,CVE-2023-21283,vulnerability--6128ac35-ea06-4eb0-9545-8982112b8085
vulnerability,CVE-2023-21284,vulnerability--fc690918-6b26-43b6-b4a3-383613f574d2
vulnerability,CVE-2023-21231,vulnerability--5ad4d013-404c-4f28-845a-f002ed5fc507
vulnerability,CVE-2023-21230,vulnerability--f19d5bd2-05ac-4c18-b0d3-470b04f6748b
vulnerability,CVE-2023-21132,vulnerability--9c9022ee-f9e5-4906-baa6-68261d335751
vulnerability,CVE-2023-21272,vulnerability--c825e739-5a5f-4057-8db8-3d8bb1d112ef
vulnerability,CVE-2023-21264,vulnerability--c3a9baf0-603d-4167-91b7-1ec3d03bc518
vulnerability,CVE-2023-21292,vulnerability--8af5b8af-22af-49e8-be0d-f03243e2fb51
vulnerability,CVE-2023-21275,vulnerability--eb052e89-9d7b-450e-bc05-5730a4bfc67e
vulnerability,CVE-2023-21281,vulnerability--9433b8e5-068d-4220-ac2a-c6671cb9eca8
vulnerability,CVE-2023-21273,vulnerability--b24ef511-4ad6-4d1f-a763-f67f3f570f45
vulnerability,CVE-2023-21277,vulnerability--fbf82768-5f31-4efd-b4b6-918a23245a08
vulnerability,CVE-2023-21233,vulnerability--126d1d2f-7c97-4895-8475-6d1851f181cd
vulnerability,CVE-2023-35689,vulnerability--7ac6a146-1a00-4090-b9b9-ae80c6ccd796
vulnerability,CVE-2023-33013,vulnerability--57e95677-ca8b-409f-b9cd-ac218c227cf8
vulnerability,CVE-2023-40013,vulnerability--a9fe2de1-4754-43c3-82d7-e2677930e464
vulnerability,CVE-2023-40518,vulnerability--37dc21d5-6fdc-4ca6-9135-945c5f3f0669
vulnerability,CVE-2023-40024,vulnerability--7c44057d-3dd4-4ce6-8df5-9e6cf6dfb3ec
vulnerability,CVE-2023-40274,vulnerability--78b4f64e-9953-4e0e-b5f2-b7c7cffc53f9
vulnerability,CVE-2023-40291,vulnerability--f5ff52d5-62bf-44af-a4af-629a28a1a6fd
vulnerability,CVE-2023-40354,vulnerability--c5c35ae1-284b-44f4-8f9a-31742b34f7d4
vulnerability,CVE-2023-40305,vulnerability--92991427-d3a4-46a8-89d2-679e473db194
vulnerability,CVE-2023-40296,vulnerability--1e8ad483-4521-430a-9f9a-4d7886ce7d96
vulnerability,CVE-2023-40312,vulnerability--66f42c51-a651-4fc5-81f1-35bd2c2bee36
vulnerability,CVE-2023-40020,vulnerability--2503066d-f5df-4130-98b2-6c863e2fd2cd
vulnerability,CVE-2023-40023,vulnerability--de2e2719-50a2-48d4-a223-86e05b42c887
vulnerability,CVE-2023-40292,vulnerability--d3b8e61a-bba6-4364-beb7-cfff819a0195
vulnerability,CVE-2023-40293,vulnerability--4dc7ff2a-f0ac-43b2-b8bd-4ea5ac7bce15
vulnerability,CVE-2023-40294,vulnerability--7d2e8964-8b9d-4a6a-b882-5f001ab381be
vulnerability,CVE-2023-40360,vulnerability--1cc0ad78-b1ec-44e4-8d59-8e9f2cfc80e0
vulnerability,CVE-2023-40303,vulnerability--99080ed8-6429-477b-baff-d9499073f620
vulnerability,CVE-2023-40283,vulnerability--4d16419d-be78-46a5-acef-e9359e23a617
vulnerability,CVE-2023-40311,vulnerability--695555bf-22e1-4feb-89d4-851c37bd529d
vulnerability,CVE-2023-40359,vulnerability--4dbf64f2-5bbb-485b-9540-a44779095a61
vulnerability,CVE-2023-40295,vulnerability--aa396798-9118-4c9f-93fb-7780ff43055e
vulnerability,CVE-2023-39293,vulnerability--0483ddf7-f884-4c10-9213-1b31748eb915
vulnerability,CVE-2023-39908,vulnerability--f1821cef-3759-458c-b708-abf8c3cf1869
vulnerability,CVE-2023-39292,vulnerability--e5407333-2ab3-46ad-bc78-5fdeb98187dc
vulnerability,CVE-2023-39829,vulnerability--19a024b3-8711-43f5-9a1e-99ace072befd
vulnerability,CVE-2023-39827,vulnerability--2c22a21d-8df1-40c8-ae73-af0be2bf0cbc
vulnerability,CVE-2023-39828,vulnerability--e580649b-73a6-44cc-adf1-4b32fe4893b2
vulnerability,CVE-2023-39950,vulnerability--cedfc7da-744c-4e8b-9be7-e3e23becf8b3
vulnerability,CVE-2023-32748,vulnerability--74e45e37-a876-47be-b6b2-ad1e16ddce01
vulnerability,CVE-2023-32358,vulnerability--3a3ec698-ff40-471d-8bbd-e16046d9d8d5
vulnerability,CVE-2023-28482,vulnerability--0fed4c17-ebff-4be7-8753-af712c81803c
vulnerability,CVE-2023-28198,vulnerability--f825d8d3-d6ed-482a-a198-c0726ebb3d03
vulnerability,CVE-2023-28199,vulnerability--9d3389ed-cd41-4b85-b531-2f48c988289c
vulnerability,CVE-2023-28768,vulnerability--fd191077-f309-4528-9396-d54021dfd07d
vulnerability,CVE-2023-28480,vulnerability--f8acf4e5-3cd5-4fcf-b713-dd4adb2158b1
vulnerability,CVE-2023-28483,vulnerability--b0f58497-5d3d-4131-9ca4-0f4d3843e0ab
vulnerability,CVE-2023-28535,vulnerability--c331a1fe-97f5-4d87-b495-491ff58bd8aa
vulnerability,CVE-2023-28179,vulnerability--f9fca394-a0bd-4bcb-82c7-b498f80ca804
vulnerability,CVE-2023-28481,vulnerability--bf844d7d-0421-4626-b04f-48eddea59d39
vulnerability,CVE-2023-3721,vulnerability--704d4870-6517-4af9-81f2-b41788c6d7cd
vulnerability,CVE-2023-3267,vulnerability--47eb8f65-4c20-4b5c-9057-8f1bcba522e2
vulnerability,CVE-2023-3160,vulnerability--7b545688-0aeb-45b0-bf97-afe1203ba256
vulnerability,CVE-2023-3645,vulnerability--43221e7f-255d-41e0-adef-457c2138e2dc
vulnerability,CVE-2023-3265,vulnerability--86d5d6cb-ff1c-4f34-adce-26d396208b9e
vulnerability,CVE-2023-3328,vulnerability--93e4880c-80b3-419b-8281-9d0acec2f340
vulnerability,CVE-2023-3262,vulnerability--fd4ee958-661f-4b63-b46d-59278fe16bc1
vulnerability,CVE-2023-3260,vulnerability--dfe820b7-acf5-4f39-85ec-7fac17e35a39
vulnerability,CVE-2023-3264,vulnerability--a8581b7f-18a4-4602-b6d6-8e108b829956
vulnerability,CVE-2023-3263,vulnerability--70652f0d-d5a2-4aca-87b6-562f7e07197f
vulnerability,CVE-2023-3266,vulnerability--0fba84a7-f25d-4e17-93a2-1aedc24b0e8c
vulnerability,CVE-2023-3435,vulnerability--49a6f618-b70b-4ee6-a1a2-16dbb63c0226
vulnerability,CVE-2023-3259,vulnerability--f9658878-5a0b-4d0f-9d31-d5bd1304a6b4
vulnerability,CVE-2023-3601,vulnerability--45564578-09b5-4488-998e-2a521b5533e4
vulnerability,CVE-2023-3261,vulnerability--b0290055-c65c-4cb0-bf95-b223eb088379
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--24c98126-34d6-41e7-bea2-c921ba7587eb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--038335cf-e70a-45d7-9c82-07cd3f72528a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-08-15T00:04:59.601865Z",
"modified": "2023-08-15T00:04:59.601865Z",
"name": "CVE-2023-21269",
"description": "In startActivityInner of ActivityStarter.java, there is a possible way to launch an activity into PiP mode from the background due to BAL bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-21269"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0865805f-79cf-4fd4-ae81-56feec2e9f09",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0483ddf7-f884-4c10-9213-1b31748eb915",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-08-15T00:05:00.093141Z",
"modified": "2023-08-15T00:05:00.093141Z",
"name": "CVE-2023-39293",
"description": "A Command Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to execute arbitrary commands within the context of the system.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39293"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--11a372dc-8513-4fdd-a6b1-60f45411c4f0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--057cfcb2-411c-41af-b6be-ac11b581b5ad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-08-15T00:04:59.545458Z",
"modified": "2023-08-15T00:04:59.545458Z",
"name": "CVE-2023-38687",
"description": "Svelecte is a flexible autocomplete/select component written in Svelte. Svelecte item names are rendered as raw HTML with no escaping. This allows the injection of arbitrary HTML into the Svelecte dropdown. This can be exploited to execute arbitrary JavaScript whenever a Svelecte dropdown is opened. Item names given to Svelecte appear to be directly rendered as HTML by the default item renderer. This means that any HTML tags in the name are rendered as HTML elements not as text. Note that the custom item renderer shown in https://mskocik.github.io/svelecte/#item-rendering is also vulnerable to the same exploit. Any site that uses Svelecte with dynamically created items either from an external source or from user-created content could be vulnerable to an XSS attack (execution of untrusted JavaScript), clickjacking or any other attack that can be performed with arbitrary HTML injection. The actual impact of this vulnerability for a specific application depends on how trustworthy the sources that provide Svelecte items are and the steps that the application has taken to mitigate XSS attacks. XSS attacks using this vulnerability are mostly mitigated by a Content Security Policy that blocks inline JavaScript. This issue has been addressed in version 3.16.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-38687"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--364dba12-5150-4948-a1b1-e216b6e0c772",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05822972-d42e-4ffa-b087-d9950ad08a71",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-08-15T00:04:58.912803Z",
"modified": "2023-08-15T00:04:58.912803Z",
"name": "CVE-2023-30751",
"description": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in iControlWP Article Directory Redux plugin <= 1.0.2 versions.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-30751"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4f0815c6-965b-48a1-853d-b0817e698274",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0fba84a7-f25d-4e17-93a2-1aedc24b0e8c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-08-15T00:05:00.340319Z",
"modified": "2023-08-15T00:05:00.340319Z",
"name": "CVE-2023-3266",
"description": "A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-3266"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b3ed2220-9565-4572-a886-345ee93cde2e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0fed4c17-ebff-4be7-8753-af712c81803c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-08-15T00:05:00.227023Z",
"modified": "2023-08-15T00:05:00.227023Z",
"name": "CVE-2023-28482",
"description": "An issue was discovered in Tigergraph Enterprise 3.7.0. A single TigerGraph instance can host multiple graphs that are accessed by multiple different users. The TigerGraph platform does not protect the confidentiality of any data uploaded to the remote server. In this scenario, any user that has permissions to upload data can browse data uploaded by any other user (irrespective of their permissions).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-28482"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6bf11693-9194-4eae-9448-68dc2474ced2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--126d1d2f-7c97-4895-8475-6d1851f181cd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-08-15T00:04:59.683358Z",
"modified": "2023-08-15T00:04:59.683358Z",
"name": "CVE-2023-21233",
"description": "In multiple locations of avrc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-21233"
}
]
}
]
}
Loading

0 comments on commit aa3b423

Please sign in to comment.