Skip to content

Commit

Permalink
generated content from 2023-11-01
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 1, 2023
1 parent 2c71c18 commit 4725b8a
Show file tree
Hide file tree
Showing 124 changed files with 2,829 additions and 0 deletions.
123 changes: 123 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -216264,3 +216264,126 @@ vulnerability,CVE-2022-4575,vulnerability--9e079d86-70b0-4cc8-9e74-bc72a4454736
vulnerability,CVE-2022-4574,vulnerability--d5234880-323d-4804-82fa-d7c59dce3985
vulnerability,CVE-2022-48189,vulnerability--87bdab11-64f1-4981-8863-3cb597ee8500
vulnerability,CVE-2022-20264,vulnerability--4c1b89e1-cd95-42fe-a334-170d6b75b776
vulnerability,CVE-2015-2968,vulnerability--f8ada99c-9dd5-40b9-95ec-24be998e89ec
vulnerability,CVE-2015-0897,vulnerability--955f8e1c-caf1-405b-9ef2-ba2949a845e0
vulnerability,CVE-2015-20110,vulnerability--5956db19-87d8-4aa4-a9e2-2f55a61050f9
vulnerability,CVE-2023-47097,vulnerability--a447731d-29ee-4065-924b-295349f83100
vulnerability,CVE-2023-47174,vulnerability--4d470cbb-14c3-4150-9744-cc75b36b7d8a
vulnerability,CVE-2023-47095,vulnerability--83baac5e-bf34-40fa-9d37-f153c22fdbfa
vulnerability,CVE-2023-47096,vulnerability--ac507362-b7a3-44d1-a958-038d5cfb345d
vulnerability,CVE-2023-47098,vulnerability--9d593607-3c0d-4e95-b097-6c049682468e
vulnerability,CVE-2023-47094,vulnerability--6416d0ec-6286-49ab-b330-d5b19db45aee
vulnerability,CVE-2023-47099,vulnerability--e5ef6da5-dbca-42f7-9031-1af563d88a5d
vulnerability,CVE-2023-5519,vulnerability--25287649-012f-4141-add8-16364fc8662a
vulnerability,CVE-2023-5114,vulnerability--d88db7fc-3f44-422b-9a3a-2af9e5611e34
vulnerability,CVE-2023-5867,vulnerability--5208e485-b8ac-4523-aabb-19f7fba0b8e8
vulnerability,CVE-2023-5435,vulnerability--36ed8161-2cda-40b0-9647-ce580c96b8fc
vulnerability,CVE-2023-5238,vulnerability--423afa41-d54f-49a9-bd2a-b4b75219b318
vulnerability,CVE-2023-5073,vulnerability--419f497c-74a0-422e-a3e8-13cc2386fcba
vulnerability,CVE-2023-5098,vulnerability--04307026-e030-4ed1-a064-e7446c9634aa
vulnerability,CVE-2023-5430,vulnerability--7b80e8f6-d9e9-493a-b3dd-b7565dcd28b7
vulnerability,CVE-2023-5434,vulnerability--85f3c1c5-c1ca-413a-a589-de06e879acbe
vulnerability,CVE-2023-5116,vulnerability--536a5a39-a0c4-4297-ba32-fb5419384dce
vulnerability,CVE-2023-5739,vulnerability--6cc93ded-1896-4da7-a1df-a794fb7f75d8
vulnerability,CVE-2023-5229,vulnerability--a3cb87d3-aa29-4595-b0ee-abd06483a4f7
vulnerability,CVE-2023-5861,vulnerability--5b8f5f87-550b-4f24-bcfe-e2308d9cf906
vulnerability,CVE-2023-5862,vulnerability--5c8bcfd7-b5d2-47d4-86c1-ff0e532fa189
vulnerability,CVE-2023-5873,vulnerability--31d0b751-1fbb-4bf5-9466-0219b881067d
vulnerability,CVE-2023-5438,vulnerability--3d09cc58-2e18-43e5-9fe7-bfc72cf320c8
vulnerability,CVE-2023-5099,vulnerability--5fecc751-6981-4085-9efc-760e802ac557
vulnerability,CVE-2023-5437,vulnerability--00802fde-8529-4762-9a74-d7cedee81b81
vulnerability,CVE-2023-5306,vulnerability--53125340-408f-4bda-b25d-afd593ab9014
vulnerability,CVE-2023-5237,vulnerability--41c686ab-1d13-4009-84c6-fc73c59b56a1
vulnerability,CVE-2023-5464,vulnerability--70fd61d2-92f9-4f5f-8a6c-75cb293478f4
vulnerability,CVE-2023-5863,vulnerability--6ae20ead-a80f-484b-997e-e717da839f20
vulnerability,CVE-2023-5439,vulnerability--b08277ba-d357-408b-b811-37c12848e0e8
vulnerability,CVE-2023-5307,vulnerability--bf990e5d-1030-445f-b1e4-f364ba70a4b4
vulnerability,CVE-2023-5458,vulnerability--cd5198c1-714e-4224-9fd4-cb1e42e0fa7c
vulnerability,CVE-2023-5866,vulnerability--59cbf507-ca2c-4186-94f9-36208d792d1c
vulnerability,CVE-2023-5428,vulnerability--b99fe14e-5a1c-4bd0-a786-037fe45a14be
vulnerability,CVE-2023-5211,vulnerability--702867c7-62ea-469e-abb3-9051ac54d6d0
vulnerability,CVE-2023-5433,vulnerability--9c922f88-0cac-4971-8cb0-85b557ca0581
vulnerability,CVE-2023-5431,vulnerability--9cb56056-0eed-4559-b1b9-7bf46ca85933
vulnerability,CVE-2023-5865,vulnerability--00b80c5e-bca3-425d-9759-4524643ded8f
vulnerability,CVE-2023-5429,vulnerability--96bdc969-5ad8-4154-acfa-5bd593ab53f6
vulnerability,CVE-2023-5243,vulnerability--f887dbe0-6522-44cf-a828-104e5233be78
vulnerability,CVE-2023-5360,vulnerability--1cf2f48a-e4c5-450d-8ae3-14f4ede47f01
vulnerability,CVE-2023-5864,vulnerability--79edd33f-f619-4101-b002-12f6aba06a04
vulnerability,CVE-2023-5436,vulnerability--ea08a136-7685-45df-a638-9c88557e8834
vulnerability,CVE-2023-5412,vulnerability--86fbaa23-ecc8-4d33-9852-05d263f314f9
vulnerability,CVE-2023-33927,vulnerability--25374d87-4916-424c-ac47-b4a09dca7b8c
vulnerability,CVE-2023-22518,vulnerability--e96bddc6-0ef5-4d62-aea7-5f018324af7a
vulnerability,CVE-2023-25045,vulnerability--2d3a5888-1c39-45d4-815b-67e039e2920d
vulnerability,CVE-2023-25047,vulnerability--3e793ae2-7c46-4426-827d-fa3076308187
vulnerability,CVE-2023-43295,vulnerability--4707a948-ca5b-400e-9e7b-7b183b71a937
vulnerability,CVE-2023-43796,vulnerability--bd9bb936-d555-428e-aed2-483e466771db
vulnerability,CVE-2023-43139,vulnerability--1fffe89e-479e-49ca-bfbc-cbcb9e2d5eb1
vulnerability,CVE-2023-37831,vulnerability--610ca985-dded-41db-9a9f-632afaf4a59f
vulnerability,CVE-2023-37966,vulnerability--034f7e65-d9ec-44f0-8832-f8b36a720d8d
vulnerability,CVE-2023-37243,vulnerability--2e17ec76-1e57-4d17-8b63-a5f49f82900f
vulnerability,CVE-2023-37832,vulnerability--109a021c-907e-42d8-9522-0ab9d05c63ec
vulnerability,CVE-2023-37833,vulnerability--29d4723f-3b94-4851-a62a-3dbce1e120ae
vulnerability,CVE-2023-38994,vulnerability--b359d9a6-e6f2-49e3-afaa-e23656d49609
vulnerability,CVE-2023-36263,vulnerability--7aec52f7-9273-4710-9521-cd77b41c9bae
vulnerability,CVE-2023-36508,vulnerability--a38415eb-b9a7-4c52-ada0-5c8bbf647532
vulnerability,CVE-2023-35879,vulnerability--577e23b4-717c-4413-b14b-5ff47eef6610
vulnerability,CVE-2023-24000,vulnerability--5d6db720-da7b-43db-bd8a-e3a3270dd687
vulnerability,CVE-2023-24410,vulnerability--80df2f78-439f-49ae-b8a5-d78156ffdf1f
vulnerability,CVE-2023-40050,vulnerability--c6996823-344f-4a47-bf0f-40fdf2b508ce
vulnerability,CVE-2023-40681,vulnerability--3c83e775-48b7-47fe-bfe1-f43377d97f40
vulnerability,CVE-2023-3955,vulnerability--163e3a1a-40e3-459f-bfe6-6a6401af2d19
vulnerability,CVE-2023-3676,vulnerability--fe10d803-491b-4d94-b8e2-55e0aab35691
vulnerability,CVE-2023-39695,vulnerability--d974027f-bb4d-4383-82fa-a8064582594a
vulnerability,CVE-2023-39610,vulnerability--2b9c6f61-9270-434b-b6e6-68a3854d6b95
vulnerability,CVE-2023-27846,vulnerability--fbc95103-52ad-40a5-b938-50d148757eb3
vulnerability,CVE-2023-42425,vulnerability--73013861-3fa7-4ef3-b0d1-84a19fb51222
vulnerability,CVE-2023-42658,vulnerability--78f016ae-26ea-4bac-8de5-04ddc31e78e7
vulnerability,CVE-2023-4250,vulnerability--d2fc7a6f-89a2-4577-be95-aae0c83e5fd3
vulnerability,CVE-2023-4390,vulnerability--880acf50-fc94-420b-a625-871506fef8bb
vulnerability,CVE-2023-4823,vulnerability--e19ffcba-943c-466f-991e-b633b8870d2e
vulnerability,CVE-2023-4251,vulnerability--b42e94d5-8e89-491f-a0c4-f4c743f3b047
vulnerability,CVE-2023-4836,vulnerability--84c39ab3-1348-4076-9026-1e51cdaf8090
vulnerability,CVE-2023-44485,vulnerability--0b288794-a67c-4d2e-a1ac-9379f5f47f7f
vulnerability,CVE-2023-44486,vulnerability--0ee2e4ea-81af-4176-9f0a-590bf3185003
vulnerability,CVE-2023-44484,vulnerability--7186b856-d894-4b7b-b28c-60191a90464f
vulnerability,CVE-2023-31212,vulnerability--73bf6b0c-7e98-4014-bcc2-433f029b48fb
vulnerability,CVE-2023-31794,vulnerability--eb24970d-4628-4c15-8417-680c88f2911f
vulnerability,CVE-2023-45955,vulnerability--bbb71a37-e41b-4258-a1c5-b0253c1c2ca7
vulnerability,CVE-2023-45899,vulnerability--694990da-4fa4-4206-8cfb-259728cf31ba
vulnerability,CVE-2023-45996,vulnerability--f7867bf9-7e1b-4a3f-ae76-6a626569d0ea
vulnerability,CVE-2023-45378,vulnerability--77893c45-5c92-45d1-9689-251e9261769d
vulnerability,CVE-2023-20886,vulnerability--7450e4c4-ccfa-4e35-8b0b-d2049939edf4
vulnerability,CVE-2023-28777,vulnerability--a43db0b9-4a90-4b6f-8a31-9a7f2f0f69a9
vulnerability,CVE-2023-46256,vulnerability--2101e162-0b7c-4d88-a54f-bf481fb761af
vulnerability,CVE-2023-46978,vulnerability--7d6f24de-0bad-46dc-8310-34eb99442cc3
vulnerability,CVE-2023-46249,vulnerability--da9adc75-9105-413b-8012-e0a4670b1c25
vulnerability,CVE-2023-46255,vulnerability--41d7c4d9-b00e-4960-9abb-c2effcb264f6
vulnerability,CVE-2023-46356,vulnerability--ac7b1d34-24bb-4bfd-8db6-93b13591c6d6
vulnerability,CVE-2023-46245,vulnerability--963b5037-9296-4b97-b2b3-6f27ffa11886
vulnerability,CVE-2023-46992,vulnerability--8b2ea167-3c25-452f-9879-21b920d7f01f
vulnerability,CVE-2023-46622,vulnerability--c78bca41-436e-46e1-9582-72840ca8bbca
vulnerability,CVE-2023-46235,vulnerability--82668e45-a855-4990-80e7-1923cd6260ad
vulnerability,CVE-2023-46236,vulnerability--5251ec78-680d-46b2-b1a2-ca8e556835aa
vulnerability,CVE-2023-46313,vulnerability--4a9ad5eb-47e4-4bf4-9a50-6c33a17f1449
vulnerability,CVE-2023-46485,vulnerability--4ea88dcd-516a-4e56-8bfa-093b4715efb8
vulnerability,CVE-2023-46250,vulnerability--c416a797-e95b-4f50-a4e0-3f39b3319e44
vulnerability,CVE-2023-46237,vulnerability--d61f3b9b-d568-4382-8988-c3227f28046e
vulnerability,CVE-2023-46977,vulnerability--17882932-5527-4848-b4a5-fa8eaeb0779b
vulnerability,CVE-2023-46248,vulnerability--0fb66817-6b81-4270-b137-a81087120a61
vulnerability,CVE-2023-46040,vulnerability--100faf86-555a-4702-803f-bdefc10eb389
vulnerability,CVE-2023-46484,vulnerability--7444d1c7-7fc5-404c-9f75-197cfea437d7
vulnerability,CVE-2023-46378,vulnerability--df671464-4a86-4ee0-beeb-a68845e87d8e
vulnerability,CVE-2023-46239,vulnerability--6ee952ac-cc8f-45f7-ae60-60b77aeee055
vulnerability,CVE-2023-46722,vulnerability--f713c866-8afb-4a67-990e-2cef06ea5e3b
vulnerability,CVE-2023-46278,vulnerability--22d7a15d-c79f-4a6a-b25d-e046c6612b24
vulnerability,CVE-2023-46240,vulnerability--cd917260-9d12-449d-a922-027d5346b0dd
vulnerability,CVE-2023-46979,vulnerability--a7603ffa-048c-4473-9d7f-a1d2690974be
vulnerability,CVE-2023-46723,vulnerability--96e60ca5-22a0-45d2-800c-2fece48d8f21
vulnerability,CVE-2023-46312,vulnerability--5053d20c-babf-4a79-aa5c-46a6dc6648da
vulnerability,CVE-2023-46993,vulnerability--6fcf4136-8708-4cb9-bc00-f19e9ca4d37f
vulnerability,CVE-2023-46451,vulnerability--7f9e6469-7313-4425-bcca-a1bcb11171cd
vulnerability,CVE-2023-46976,vulnerability--556c02f6-bdf3-4efe-b678-00062faa8d7e
vulnerability,CVE-2023-46361,vulnerability--362abe94-6310-4175-a2e0-a4b4ec851566
vulnerability,CVE-2023-46210,vulnerability--4734b7a8-3872-4fb1-94e7-2370833bc099
vulnerability,CVE-2016-1203,vulnerability--af1c3615-66f1-48b6-970c-68d5b85aedc8
vulnerability,CVE-2022-3007,vulnerability--625e5791-6cee-4b47-b374-317fff71935d
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3d2014fe-76ac-4d2e-8acb-0685fe6cfe7b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00802fde-8529-4762-9a74-d7cedee81b81",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:03.841545Z",
"modified": "2023-11-01T00:17:03.841545Z",
"name": "CVE-2023-5437",
"description": "The WP fade in text news plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5437"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5b787bc1-6fc0-4ab4-8ccf-05ae242434f0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--00b80c5e-bca3-425d-9759-4524643ded8f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:03.877295Z",
"modified": "2023-11-01T00:17:03.877295Z",
"name": "CVE-2023-5865",
"description": "Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5865"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--963cf874-80a7-4052-993e-447ab308fce5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--034f7e65-d9ec-44f0-8832-f8b36a720d8d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:04.371819Z",
"modified": "2023-11-01T00:17:04.371819Z",
"name": "CVE-2023-37966",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Solwin Infotech User Activity Log user-activity-log allows SQL Injection.This issue affects User Activity Log: from n/a through 1.6.2.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-37966"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1dfee1c7-ce42-44b7-bb5b-84567c2d5acf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04307026-e030-4ed1-a064-e7446c9634aa",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:03.797302Z",
"modified": "2023-11-01T00:17:03.797302Z",
"name": "CVE-2023-5098",
"description": "The Campaign Monitor Forms by Optin Cat WordPress plugin before 2.5.6 does not prevent users with low privileges (like subscribers) from overwriting any options on a site with the string \"true\", which could lead to a variety of outcomes, including DoS.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5098"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--70a4b200-1c71-43df-bf1b-ade9782505e6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b288794-a67c-4d2e-a1ac-9379f5f47f7f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:05.760486Z",
"modified": "2023-11-01T00:17:05.760486Z",
"name": "CVE-2023-44485",
"description": "Online Blood Donation Management System v1.0 is vulnerable to multiple Store Cross-Site Scripting vulnerabilities. The 'lastName' parameter of the users/register.php resource is copied into the users/member.php document as plain text between tags. Any input is echoed unmodified in the users/member.php response.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-44485"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a96b39bd-fe18-498d-b25c-c96b7ea8ee37",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0ee2e4ea-81af-4176-9f0a-590bf3185003",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:05.952143Z",
"modified": "2023-11-01T00:17:05.952143Z",
"name": "CVE-2023-44486",
"description": "Online Blood Donation Management System v1.0 is vulnerable to multiple Store Cross-Site Scripting vulnerabilities. The 'address' parameter of the users/register.php resource is copied into the users/member.php document as plain text between tags. Any input is echoed unmodified in the users/member.php response.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-44486"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1ffdf30f-7b1c-41a1-980c-50f242ae619f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0fb66817-6b81-4270-b137-a81087120a61",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:06.729085Z",
"modified": "2023-11-01T00:17:06.729085Z",
"name": "CVE-2023-46248",
"description": "Cody is an artificial intelligence (AI) coding assistant. The Cody AI VSCode extension versions 0.10.0 through 0.14.0 are vulnerable to Remote Code Execution under certain conditions. An attacker in control of a malicious repository could modify the Cody configuration file `.vscode/cody.json` and overwrite Cody commands. If a user with the extension installed opens this malicious repository and runs a Cody command such as /explain or /doc, this could allow arbitrary code execution on the user's machine. The vulnerability is rated as critical severity, but with low exploitability. It requires the user to have a malicious repository loaded and execute the overwritten command in VS Code. The issue is exploitable regardless of the user blocking code execution on a repository through VS Code Workspace Trust. The issue was found during a regular 3rd party penetration test. The maintainers of Cody do not have evidence of open source repositories having malicious `.vscode/cody.json` files to exploit this vulnerability. The issue is fixed in version 0.14.1 of the Cody VSCode extension. In case users can't promptly upgrade, they should not open any untrusted repositories with the Cody extension loaded.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46248"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7a93b3d9-5807-4de6-b8c2-5b70b3d59632",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--100faf86-555a-4702-803f-bdefc10eb389",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-01T00:17:06.733277Z",
"modified": "2023-11-01T00:17:06.733277Z",
"name": "CVE-2023-46040",
"description": "Cross Site Scripting vulnerability in GetSimpleCMS v.3.4.0a allows a remote attacker to execute arbitrary code via the a crafted payload to the components.php function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46040"
}
]
}
]
}
Loading

0 comments on commit 4725b8a

Please sign in to comment.