Skip to content

Commit

Permalink
generated content from 2023-11-25
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 25, 2023
1 parent 6271261 commit 2166743
Show file tree
Hide file tree
Showing 17 changed files with 368 additions and 0 deletions.
16 changes: 16 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -218409,3 +218409,19 @@ vulnerability,CVE-2023-29073,vulnerability--6d2546bd-7372-4787-9f69-d9e7a58ff507
vulnerability,CVE-2023-29075,vulnerability--70158789-b27d-43c4-8488-f6da31a461ef
vulnerability,CVE-2023-29076,vulnerability--fafb25a2-b149-4580-a872-44bdd0492cae
vulnerability,CVE-2023-29074,vulnerability--e0cfc00f-73c5-46d7-a87f-fc4bda65251a
vulnerability,CVE-2023-49298,vulnerability--8e1a2a72-40c0-4f55-85e7-615d565aaa13
vulnerability,CVE-2023-48312,vulnerability--5002ad37-bf52-43fd-b7fa-68ed46d60c58
vulnerability,CVE-2023-48712,vulnerability--9e0edd2d-4e1c-4f05-94a5-098f50217108
vulnerability,CVE-2023-48708,vulnerability--04ab2309-27bc-46f3-ac49-42306ed0aab8
vulnerability,CVE-2023-48796,vulnerability--d455d4d0-836b-4d31-9143-c210da7a2fc3
vulnerability,CVE-2023-48711,vulnerability--9da619e6-0b08-44f4-bfd5-147066c91a5a
vulnerability,CVE-2023-48707,vulnerability--409fdbc2-28e6-4e43-b5b2-0cd2b36e439e
vulnerability,CVE-2023-6293,vulnerability--a69feb00-4432-408a-80e4-1a89917d90f5
vulnerability,CVE-2023-6277,vulnerability--2b3a5e19-673d-41e8-b611-7cc81786be59
vulnerability,CVE-2023-6276,vulnerability--685113e3-956a-4e37-9982-29c61664fecb
vulnerability,CVE-2023-6274,vulnerability--82790370-c3b2-4aca-9348-eb7f8f38630b
vulnerability,CVE-2023-6275,vulnerability--87b08b6e-afcf-4813-b806-07013caa34a3
vulnerability,CVE-2023-6251,vulnerability--1b3e796f-2fce-4a4d-8009-69cc05a358f2
vulnerability,CVE-2023-33706,vulnerability--cee23eb7-fc96-45ab-80a8-c225bf3c9afd
vulnerability,CVE-2023-44303,vulnerability--b63daca8-36aa-4222-bd63-bd5297cf4755
vulnerability,CVE-2023-46575,vulnerability--1fc19011-9b00-413d-a180-6ebfc92ca3e0
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--aeda6da6-e11d-4132-b09a-898c7128cab2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--04ab2309-27bc-46f3-ac49-42306ed0aab8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.59402Z",
"modified": "2023-11-25T00:15:54.59402Z",
"name": "CVE-2023-48708",
"description": "CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. In affected versions successful login attempts are recorded with the raw tokens stored in the log table. If a malicious person somehow views the data in the log table they can obtain a raw token which can then be used to send a request with that user's authority. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. Users unable to upgrade should disable logging for successful login attempts by the configuration files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48708"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e55865c8-4911-4b57-b8ae-afde46ea4c77",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1b3e796f-2fce-4a4d-8009-69cc05a358f2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.937571Z",
"modified": "2023-11-25T00:15:54.937571Z",
"name": "CVE-2023-6251",
"description": "Cross-site Request Forgery (CSRF) in Checkmk < 2.2.0p15, < 2.1.0p37, <= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6251"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--566bc2dd-6f23-4543-9d62-897a123d9c87",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1fc19011-9b00-413d-a180-6ebfc92ca3e0",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:55.988274Z",
"modified": "2023-11-25T00:15:55.988274Z",
"name": "CVE-2023-46575",
"description": "A SQL injection vulnerability in Meshery before 0.6.179 allows a remote attacker to obtain sensitive information and execute arbitrary code via the order parameter.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46575"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fbc52a5d-2e12-41f1-944b-8fa039a9f890",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2b3a5e19-673d-41e8-b611-7cc81786be59",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.924438Z",
"modified": "2023-11-25T00:15:54.924438Z",
"name": "CVE-2023-6277",
"description": "An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6277"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ef65b48f-b31d-47ce-9a90-adbb822fb94b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--409fdbc2-28e6-4e43-b5b2-0cd2b36e439e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.626235Z",
"modified": "2023-11-25T00:15:54.626235Z",
"name": "CVE-2023-48707",
"description": "CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. The `secretKey` value is an important key for HMAC SHA256 authentication and in affected versions was stored in the database in cleartext form. If a malicious person somehow had access to the data in the database, they could use the key and secretKey for HMAC SHA256 authentication to send requests impersonating that corresponding user. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48707"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ddc70ad6-375d-4041-b60b-ede79018903a",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--5002ad37-bf52-43fd-b7fa-68ed46d60c58",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.582273Z",
"modified": "2023-11-25T00:15:54.582273Z",
"name": "CVE-2023-48312",
"description": "capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48312"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--99abd8a7-c0ba-4d66-8861-9c4d9a4914c0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--685113e3-956a-4e37-9982-29c61664fecb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.925741Z",
"modified": "2023-11-25T00:15:54.925741Z",
"name": "CVE-2023-6276",
"description": "A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6276"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b5cf4a5c-eb47-4405-a1f0-02ecad9e09d4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--82790370-c3b2-4aca-9348-eb7f8f38630b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.927344Z",
"modified": "2023-11-25T00:15:54.927344Z",
"name": "CVE-2023-6274",
"description": "A vulnerability was found in Beijing Baichuo Smart S80 up to 20231108. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/updatelib.php of the component PHP File Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246103. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6274"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--21e6e9f8-17c7-4dc3-9350-fd2c274f4dcb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--87b08b6e-afcf-4813-b806-07013caa34a3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.935001Z",
"modified": "2023-11-25T00:15:54.935001Z",
"name": "CVE-2023-6275",
"description": "A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input \"><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246104. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6275"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e9a3bf7e-ae11-43a3-94ed-0e80f8ca86c3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--8e1a2a72-40c0-4f55-85e7-615d565aaa13",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.451323Z",
"modified": "2023-11-25T00:15:54.451323Z",
"name": "CVE-2023-49298",
"description": "OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49298"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3c26bbf4-cd27-4c98-a0fb-f14237a8af74",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9da619e6-0b08-44f4-bfd5-147066c91a5a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.623384Z",
"modified": "2023-11-25T00:15:54.623384Z",
"name": "CVE-2023-48711",
"description": "google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@127.0.0.1`. This causes the full URL to become `https://[email protected]/...`, where `translate.google.` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability. This issue has been addressed in release version 4.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48711"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--0c8547c8-c132-41a4-a65c-1c6224c74d72",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9e0edd2d-4e1c-4f05-94a5-098f50217108",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.586606Z",
"modified": "2023-11-25T00:15:54.586606Z",
"name": "CVE-2023-48712",
"description": "Warpgate is an open source SSH, HTTPS and MySQL bastion host for Linux. In affected versions there is a privilege escalation vulnerability through a non-admin user's account. Limited users can impersonate another user's account if only single-factor authentication is configured. If a user knows an admin username, opens the login screen and attempts to authenticate with an incorrect password they can subsequently enter a valid non-admin username and password they will be logged in as the admin user. All installations prior to version 0.9.0 are affected. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-48712"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7c36aeda-e032-44a7-83c6-c1efab701114",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a69feb00-4432-408a-80e4-1a89917d90f5",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:54.91566Z",
"modified": "2023-11-25T00:15:54.91566Z",
"name": "CVE-2023-6293",
"description": "Prototype Pollution in GitHub repository robinbuschmann/sequelize-typescript prior to 2.1.6.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6293"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--c343aac0-e24c-43d3-b610-07e99dbca57b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b63daca8-36aa-4222-bd63-bd5297cf4755",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-25T00:15:55.71776Z",
"modified": "2023-11-25T00:15:55.71776Z",
"name": "CVE-2023-44303",
"description": "\nRVTools, Version 3.9.2 and above, contain a sensitive data exposure vulnerability in the password encryption utility (RVToolsPasswordEncryption.exe) and main application (RVTools.exe). A remote unauthenticated attacker with access to stored encrypted passwords from a users' system could potentially exploit this vulnerability, leading to the disclosure of encrypted passwords in clear text. This vulnerability is caused by an incomplete fix for CVE-2020-27688. \n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-44303"
}
]
}
]
}
Loading

0 comments on commit 2166743

Please sign in to comment.