Skip to content

Commit

Permalink
generated content from 2023-10-30
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Oct 30, 2023
1 parent b5ba8c0 commit fd50b68
Show file tree
Hide file tree
Showing 19 changed files with 414 additions and 0 deletions.
18 changes: 18 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -216078,3 +216078,21 @@ vulnerability,CVE-2023-46215,vulnerability--25e22592-bfe3-4eeb-80df-8f1d0ca7cca6
vulnerability,CVE-2023-46467,vulnerability--53512758-b33c-4a2c-b6b7-7248ba5fa47d
vulnerability,CVE-2023-46468,vulnerability--56af1738-19b8-4b23-a85c-b28206a53d2b
vulnerability,CVE-2023-46854,vulnerability--a975cff9-e247-434b-9d7d-69931c274c17
vulnerability,CVE-2021-33637,vulnerability--39beda89-ae40-4398-9d02-78bfeb843937
vulnerability,CVE-2021-33635,vulnerability--ba455ac2-63cb-437e-8fe2-f47d1d18a693
vulnerability,CVE-2021-33638,vulnerability--31b301bc-c72a-4ed1-8533-924361219ebd
vulnerability,CVE-2021-33636,vulnerability--9f696583-32b2-4503-9ce7-cce699931a31
vulnerability,CVE-2021-33634,vulnerability--3b407f84-b7e1-42cc-9412-5129771e7d1a
vulnerability,CVE-2023-5838,vulnerability--92d85eeb-cf73-4e55-b4d6-aecdbb54d3c2
vulnerability,CVE-2023-5839,vulnerability--0013c662-0d18-4149-8da4-4089a1cce717
vulnerability,CVE-2023-5840,vulnerability--33fd99fa-cf3a-441c-aec6-488836d9edaf
vulnerability,CVE-2023-43041,vulnerability--7b1ace98-2344-4103-af2e-dc75f5d7c0e2
vulnerability,CVE-2023-40685,vulnerability--b6c4ab0a-103f-40d9-8c74-44375a6fc98a
vulnerability,CVE-2023-40686,vulnerability--4d02c0af-bcf5-4317-afe4-6ac4cac8d90b
vulnerability,CVE-2023-4393,vulnerability--18f2aa8c-b8cc-4bfd-95be-036d10dc2ead
vulnerability,CVE-2023-46858,vulnerability--a862a633-2359-466a-be2e-c5b13c4a3997
vulnerability,CVE-2023-46862,vulnerability--1dcc3375-ff5b-4841-9fa0-4664673b4a80
vulnerability,CVE-2023-46863,vulnerability--c9d06eff-a7ff-48cd-9bfb-fa4721abc873
vulnerability,CVE-2023-46864,vulnerability--875d1606-c575-4eb6-9a99-5ee6438a8aeb
vulnerability,CVE-2007-10003,vulnerability--ef71a4cc-8de2-4620-9112-73497988b7e8
vulnerability,CVE-2005-10002,vulnerability--3b2e4e35-bd15-4a1b-a9fb-6214f6a37de3
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--910d2c79-06dd-47f8-9d2e-9d600bb916d7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0013c662-0d18-4149-8da4-4089a1cce717",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:56.662743Z",
"modified": "2023-10-30T00:16:56.662743Z",
"name": "CVE-2023-5839",
"description": "Privilege Chaining in GitHub repository hestiacp/hestiacp prior to 1.8.9.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5839"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--088ad597-937e-4710-938b-3e193e82c3c7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--18f2aa8c-b8cc-4bfd-95be-036d10dc2ead",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:59.320098Z",
"modified": "2023-10-30T00:16:59.320098Z",
"name": "CVE-2023-4393",
"description": "HTML and SMTP injections on the registration page of LiquidFiles versions 3.7.13 and below, allow an attacker to perform more advanced phishing attacks against an organization.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-4393"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--368f8017-82c0-487b-946b-5b6cdd2191c1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1dcc3375-ff5b-4841-9fa0-4664673b4a80",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:17:01.313043Z",
"modified": "2023-10-30T00:17:01.313043Z",
"name": "CVE-2023-46862",
"description": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46862"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e13ece00-2211-48bc-b1cb-32f9115ab60b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--31b301bc-c72a-4ed1-8533-924361219ebd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:38.769807Z",
"modified": "2023-10-30T00:16:38.769807Z",
"name": "CVE-2021-33638",
"description": "\nWhen the isula cp command is used to copy files from a container to a host machine and the container is controlled by an attacker, the attacker can escape the container.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-33638"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d1b701a2-e67e-426d-af41-9ab1381cd0e0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--33fd99fa-cf3a-441c-aec6-488836d9edaf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:56.670469Z",
"modified": "2023-10-30T00:16:56.670469Z",
"name": "CVE-2023-5840",
"description": "Weak Password Recovery Mechanism for Forgotten Password in GitHub repository linkstackorg/linkstack prior to v4.2.9.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5840"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--98312ede-cfa5-4996-b10d-40f42b65032b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--39beda89-ae40-4398-9d02-78bfeb843937",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:38.728453Z",
"modified": "2023-10-30T00:16:38.728453Z",
"name": "CVE-2021-33637",
"description": "\nWhen the isula export command is used to export a container to an image and the container is controlled by an attacker, the attacker can escape the container.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-33637"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3916d5f9-662d-4957-93ba-7ab0bfa274cd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3b2e4e35-bd15-4a1b-a9fb-6214f6a37de3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:17:14.689611Z",
"modified": "2023-10-30T00:17:14.689611Z",
"name": "CVE-2005-10002",
"description": "A vulnerability, which was classified as critical, was found in almosteffortless secure-files Plugin up to 1.1 on WordPress. Affected is the function sf_downloads of the file secure-files.php. The manipulation of the argument downloadfile leads to path traversal. Upgrading to version 1.2 is able to address this issue. The name of the patch is cab025e5fc2bcdad8032d833ebc38e6bd2a13c92. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-243804.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2005-10002"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6c0ec7aa-c50e-4ddf-830e-2b4c5a34b96d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3b407f84-b7e1-42cc-9412-5129771e7d1a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:38.832147Z",
"modified": "2023-10-30T00:16:38.832147Z",
"name": "CVE-2021-33634",
"description": "iSulad uses the lcr+lxc runtime (default) to run malicious images, which can cause DOS.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-33634"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e07b03f3-db2f-49a9-9130-7cde189953d5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4d02c0af-bcf5-4317-afe4-6ac4cac8d90b",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:58.508903Z",
"modified": "2023-10-30T00:16:58.508903Z",
"name": "CVE-2023-40686",
"description": "Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain component access to the operating system. IBM X-Force ID: 264114.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40686"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--2cc4e00d-b110-49bb-be02-3a300fb9f162",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--7b1ace98-2344-4103-af2e-dc75f5d7c0e2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:57.298784Z",
"modified": "2023-10-30T00:16:57.298784Z",
"name": "CVE-2023-43041",
"description": "IBM QRadar SIEM 7.5 is vulnerable to information exposure allowing a delegated Admin tenant user with a specific domain security profile assigned to see data from other domains. This vulnerability is due to an incomplete fix for CVE-2022-34352. IBM X-Force ID: 266808.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-43041"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b671fe96-b133-4e78-8ab3-0ea3d03372f7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--875d1606-c575-4eb6-9a99-5ee6438a8aeb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:17:01.394388Z",
"modified": "2023-10-30T00:17:01.394388Z",
"name": "CVE-2023-46864",
"description": "Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46864"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d9d04e97-6585-49df-95c5-11f86dc45b23",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--92d85eeb-cf73-4e55-b4d6-aecdbb54d3c2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:56.619868Z",
"modified": "2023-10-30T00:16:56.619868Z",
"name": "CVE-2023-5838",
"description": "Insufficient Session Expiration in GitHub repository linkstackorg/linkstack prior to v4.2.9.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-5838"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f33fc50d-f428-4fb5-bf1a-4030dab097e0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9f696583-32b2-4503-9ce7-cce699931a31",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:38.799736Z",
"modified": "2023-10-30T00:16:38.799736Z",
"name": "CVE-2021-33636",
"description": "\nWhen the isula load command is used to load malicious images, attackers can execute arbitrary code.\n\n",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-33636"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--75a03f66-b3d2-48f4-9f90-66f12b5b3e90",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a862a633-2359-466a-be2e-c5b13c4a3997",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:17:01.284747Z",
"modified": "2023-10-30T00:17:01.284747Z",
"name": "CVE-2023-46858",
"description": "** DISPUTED ** Moodle 4.3 allows /grade/report/grader/index.php?searchvalue= reflected XSS when logged in as a teacher. NOTE: the Moodle Security FAQ link states \"Some forms of rich content [are] used by teachers to enhance their courses ... admins and teachers can post XSS-capable content, but students can not.\"",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-46858"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--be09e56d-efd3-402e-8462-c74cfa9b2661",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b6c4ab0a-103f-40d9-8c74-44375a6fc98a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2023-10-30T00:16:58.474369Z",
"modified": "2023-10-30T00:16:58.474369Z",
"name": "CVE-2023-40685",
"description": "Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain root access to the operating system. IBM X-Force ID: 264116.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-40685"
}
]
}
]
}
Loading

0 comments on commit fd50b68

Please sign in to comment.