Skip to content

Commit

Permalink
generated content from 2023-11-27
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Nov 27, 2023
1 parent 2166743 commit 75d9a83
Show file tree
Hide file tree
Showing 10 changed files with 207 additions and 0 deletions.
9 changes: 9 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -218425,3 +218425,12 @@ vulnerability,CVE-2023-6251,vulnerability--1b3e796f-2fce-4a4d-8009-69cc05a358f2
vulnerability,CVE-2023-33706,vulnerability--cee23eb7-fc96-45ab-80a8-c225bf3c9afd
vulnerability,CVE-2023-44303,vulnerability--b63daca8-36aa-4222-bd63-bd5297cf4755
vulnerability,CVE-2023-46575,vulnerability--1fc19011-9b00-413d-a180-6ebfc92ca3e0
vulnerability,CVE-2023-49321,vulnerability--b45bbbf6-e8b0-4455-b2ca-7181136ec1ad
vulnerability,CVE-2023-49322,vulnerability--d92fa9f8-1770-414e-8ed8-caea0bd0e676
vulnerability,CVE-2023-49312,vulnerability--d8c12aa5-4a5e-4113-b4b0-5ad4a1f9106d
vulnerability,CVE-2023-6299,vulnerability--c002ba33-b05b-4d35-9125-89a6fba5b4ac
vulnerability,CVE-2023-6296,vulnerability--8540cfa2-a8f8-46ab-918b-d3016f3c4727
vulnerability,CVE-2023-6301,vulnerability--e94f7abc-3c40-4888-976d-1db89eb30c66
vulnerability,CVE-2023-6298,vulnerability--c7c0f322-365b-4c72-abc3-9f0ed683263d
vulnerability,CVE-2023-6300,vulnerability--63673123-015b-43a6-af2c-68c8a4b030f2
vulnerability,CVE-2023-6297,vulnerability--05371852-8672-46cb-a090-33e72bf1ead9
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6fdb5cd1-17cf-4277-9e8f-0e93a2f25385",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--05371852-8672-46cb-a090-33e72bf1ead9",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:04.098216Z",
"modified": "2023-11-27T00:17:04.098216Z",
"name": "CVE-2023-6297",
"description": "A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6297"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1010186e-52b9-4e5b-8557-85e0d30a5d4e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--63673123-015b-43a6-af2c-68c8a4b030f2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:04.093259Z",
"modified": "2023-11-27T00:17:04.093259Z",
"name": "CVE-2023-6300",
"description": "A vulnerability, which was classified as problematic, was found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function. The manipulation of the argument page with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246126 is the identifier assigned to this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6300"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e0418dfa-4ce9-447b-86ca-b688ab83bf17",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--8540cfa2-a8f8-46ab-918b-d3016f3c4727",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:04.077089Z",
"modified": "2023-11-27T00:17:04.077089Z",
"name": "CVE-2023-6296",
"description": "A vulnerability was found in osCommerce 4. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /catalog/compare of the component Instant Message Handler. The manipulation of the argument compare with the input 40dz4iq\"><script>alert(1)</script>zohkx leads to cross site scripting. The attack may be launched remotely. VDB-246122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6296"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--347fabef-1160-455a-9366-441b01d311cb",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b45bbbf6-e8b0-4455-b2ca-7181136ec1ad",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:03.621294Z",
"modified": "2023-11-27T00:17:03.621294Z",
"name": "CVE-2023-49321",
"description": "Certain WithSecure products allow a Denial of Service because scanning a crafted file takes a long time, and causes the scanner to hang. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49321"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f86c6d7b-d122-4bb8-8248-a07750444a35",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--c002ba33-b05b-4d35-9125-89a6fba5b4ac",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:04.075844Z",
"modified": "2023-11-27T00:17:04.075844Z",
"name": "CVE-2023-6299",
"description": "A vulnerability, which was classified as problematic, has been found in Apryse iText 8.0.2. This issue affects some unknown processing of the file PdfDocument.java of the component Reference Table Handler. The manipulation leads to memory leak. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246125 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6299"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--13890e01-80fc-4829-b9c6-0728ee0ae344",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--c7c0f322-365b-4c72-abc3-9f0ed683263d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:04.088722Z",
"modified": "2023-11-27T00:17:04.088722Z",
"name": "CVE-2023-6298",
"description": "A vulnerability classified as problematic was found in Apryse iText 8.0.2. This vulnerability affects the function main of the file PdfDocument.java. The manipulation leads to improper validation of array index. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246124. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6298"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--23158ff4-3ece-44d0-aa98-6adf85e001da",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--d8c12aa5-4a5e-4113-b4b0-5ad4a1f9106d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:03.637072Z",
"modified": "2023-11-27T00:17:03.637072Z",
"name": "CVE-2023-49312",
"description": "Precision Bridge PrecisionBridge.exe (aka the thick client) before 7.3.21 allows an integrity violation in which the same license key is used on multiple systems, via vectors involving a Process Hacker memory dump, error message inspection, and modification of a MAC address.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49312"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d2ce0026-0451-4f78-bf80-7d6eca621a17",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--d92fa9f8-1770-414e-8ed8-caea0bd0e676",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:03.633609Z",
"modified": "2023-11-27T00:17:03.633609Z",
"name": "CVE-2023-49322",
"description": "Certain WithSecure products allow a Denial of Service because there is an unpack handler crash that can lead to a scanning engine crash. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-49322"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1bae569d-7938-42c5-9f9a-5038ed92c946",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--e94f7abc-3c40-4888-976d-1db89eb30c66",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-11-27T00:17:04.079375Z",
"modified": "2023-11-27T00:17:04.079375Z",
"name": "CVE-2023-6301",
"description": "A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-6301"
}
]
}
]
}

0 comments on commit 75d9a83

Please sign in to comment.