Skip to content

Commit

Permalink
generated content from 2023-11-15
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 15, 2023
1 parent 2464f91 commit f856bc6
Show file tree
Hide file tree
Showing 338 changed files with 7,751 additions and 0 deletions.
337 changes: 337 additions & 0 deletions mapping.csv

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--75fa548a-4992-4b8b-a32a-e77e2b7b9693",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0123f2e2-c1cc-472c-a18f-50ba611add30",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.366095Z",
"modified": "2023-11-15T00:16:24.366095Z",
"name": "CVE-2023-47609",
"description": "SQL injection vulnerability in OSS Calendar versions prior to v.2.0.3 allows a remote authenticated attacker to execute arbitrary code or obtain and/or alter the information stored in the database by sending a specially crafted request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-47609"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--20c75010-01d3-40b8-8a57-594749a6c16f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--067497c1-c6a9-4e3a-9065-3275188605a9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.341827Z",
"modified": "2023-11-15T00:16:24.341827Z",
"name": "CVE-2023-47130",
"description": "Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-47130"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f5e84196-891c-4ef9-b175-a44cfa5274ba",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--07013981-b379-43f8-b1e9-fccd738c111f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.167882Z",
"modified": "2023-11-15T00:16:24.167882Z",
"name": "CVE-2023-45582",
"description": "An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 and before 6.4.8 may allow an unauthenticated attacker to  perform a brute force attack on the affected endpoints via repeated login attempts.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-45582"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--866abb36-54cf-44fa-9a86-764d98bb9dd1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08d2e538-4f1c-408b-b77e-d2622c913230",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:25.732553Z",
"modified": "2023-11-15T00:16:25.732553Z",
"name": "CVE-2023-43588",
"description": "Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-43588"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7114244b-8154-4310-8bff-6a0900f5b99d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08ebade7-9ecd-4bc7-9314-8dd30c68528a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:25.202335Z",
"modified": "2023-11-15T00:16:25.202335Z",
"name": "CVE-2023-39537",
"description": "AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper input validation via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-39537"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fece85af-2b2f-4a5a-a250-ff4834aa374e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--08f62475-6eff-40a5-9bc7-8956cc3b0a95",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:23.528263Z",
"modified": "2023-11-15T00:16:23.528263Z",
"name": "CVE-2023-28376",
"description": "Out-of-bounds read in the firmware for some Intel(R) E810 Ethernet Controllers and Adapters before version 1.7.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-28376"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a38951bf-f76a-4ce3-bb5a-234a283fb791",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--095a2315-f114-4ec8-91ad-e0005c9d4d5c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:23.531051Z",
"modified": "2023-11-15T00:16:23.531051Z",
"name": "CVE-2023-28377",
"description": "Improper authentication in some Intel(R) NUC Kit NUC11PH USB firmware installation software before version 1.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-28377"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--20a6b754-a9af-4f6d-80f5-e115a0a1e0ed",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a01d2e2-dfeb-461b-8d3b-c9ba397a7f81",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.289236Z",
"modified": "2023-11-15T00:16:24.289236Z",
"name": "CVE-2023-25756",
"description": "Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-25756"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d5268bb3-821d-4bd2-a68e-07ac6d16e568",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b2311c7-a564-4f0c-a034-db208aa7680e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:23.538643Z",
"modified": "2023-11-15T00:16:23.538643Z",
"name": "CVE-2023-28401",
"description": "Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow authenticated user to potentially enable escalation of privilege via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-28401"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--85b3fbf0-7386-4685-8f54-4c35fbdc71df",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0b6c7d5c-a9a7-45ab-9be2-1da30e73bdb0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.621882Z",
"modified": "2023-11-15T00:16:24.621882Z",
"name": "CVE-2023-36395",
"description": "Windows Deployment Services Denial of Service Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-36395"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6de705ce-27d8-4cf3-a66f-7440c35f6b71",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0c999f67-1eb9-4294-83a3-cfc05bb23357",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.822229Z",
"modified": "2023-11-15T00:16:24.822229Z",
"name": "CVE-2023-36039",
"description": "Microsoft Exchange Server Spoofing Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-36039"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6e7a1677-48b0-4599-be06-3b2d41c5aaff",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d1595fd-262f-4a75-91a4-0facdb99411d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.600855Z",
"modified": "2023-11-15T00:16:24.600855Z",
"name": "CVE-2023-36042",
"description": "Visual Studio Denial of Service Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-36042"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e5c5033d-53f6-4326-9732-0677f9ddba15",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f574156-df19-432b-abd8-312c433b58ba",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:15.886388Z",
"modified": "2023-11-15T00:16:15.886388Z",
"name": "CVE-2022-46299",
"description": "Insufficient control flow management for some Intel Unison software may allow an authenticated user to potentially enable information disclosure via local access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2022-46299"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2533fdea-d437-4841-83ad-861e9e4bacc8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f9d0293-146b-4cb8-a634-3988b9042dfa",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.951061Z",
"modified": "2023-11-15T00:16:24.951061Z",
"name": "CVE-2023-46601",
"description": "A vulnerability has been identified in COMOS (All versions). The affected application lacks proper access controls in making the SQLServer connection. This could allow an attacker to query the database directly to access information that the user should not have access to.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46601"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0766e592-fddb-44ae-9496-ec0ea08bf9c0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10aa0c98-7bcc-4e5f-b92b-5fd433f91a9e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.590264Z",
"modified": "2023-11-15T00:16:24.590264Z",
"name": "CVE-2023-36033",
"description": "Windows DWM Core Library Elevation of Privilege Vulnerability",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-36033"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--46fe17e5-fac6-4ee4-9dc7-6556b7e309ca",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1156dfe8-8a9a-4a0b-a0fd-46d2d9bdb29a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-15T00:16:24.569667Z",
"modified": "2023-11-15T00:16:24.569667Z",
"name": "CVE-2023-48020",
"description": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/task/changeStatus.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48020"
}
]
}
]
}
Loading

0 comments on commit f856bc6

Please sign in to comment.