From 3e59bdd391c51a3f6e2a9fad155ff08360d3f90b Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Mon, 25 Sep 2023 00:05:28 +0000 Subject: [PATCH] generated content from 2023-09-25 --- mapping.csv | 9 ++++++++ ...-2fb579b8-79fd-483f-86ad-6117c3519ee2.json | 22 +++++++++++++++++++ ...-59af426b-e31b-4a3a-a229-ce5e4bbc801d.json | 22 +++++++++++++++++++ ...-691aee8d-c8f6-4974-a734-76e2a1d23dd2.json | 22 +++++++++++++++++++ ...-7129d571-52e3-4052-97e3-e3358eb494f6.json | 22 +++++++++++++++++++ ...-ba9430b0-7885-42e9-886d-669e47820909.json | 22 +++++++++++++++++++ ...-bffba588-99e5-4e6d-9ccd-c1575527d0b8.json | 22 +++++++++++++++++++ ...-c399971f-a202-40fd-b0dc-0f7b4dac5bc5.json | 22 +++++++++++++++++++ ...-ca41fb39-628c-4061-b332-7b86ddfe1a81.json | 22 +++++++++++++++++++ ...-f85181e4-69c0-46e3-9c53-0628f9779512.json | 22 +++++++++++++++++++ 10 files changed, 207 insertions(+) create mode 100644 objects/vulnerability/vulnerability--2fb579b8-79fd-483f-86ad-6117c3519ee2.json create mode 100644 objects/vulnerability/vulnerability--59af426b-e31b-4a3a-a229-ce5e4bbc801d.json create mode 100644 objects/vulnerability/vulnerability--691aee8d-c8f6-4974-a734-76e2a1d23dd2.json create mode 100644 objects/vulnerability/vulnerability--7129d571-52e3-4052-97e3-e3358eb494f6.json create mode 100644 objects/vulnerability/vulnerability--ba9430b0-7885-42e9-886d-669e47820909.json create mode 100644 objects/vulnerability/vulnerability--bffba588-99e5-4e6d-9ccd-c1575527d0b8.json create mode 100644 objects/vulnerability/vulnerability--c399971f-a202-40fd-b0dc-0f7b4dac5bc5.json create mode 100644 objects/vulnerability/vulnerability--ca41fb39-628c-4061-b332-7b86ddfe1a81.json create mode 100644 objects/vulnerability/vulnerability--f85181e4-69c0-46e3-9c53-0628f9779512.json diff --git a/mapping.csv b/mapping.csv index 64e8f148652..066ce5964ea 100644 --- a/mapping.csv +++ b/mapping.csv @@ -213059,3 +213059,12 @@ vulnerability,CVE-2023-42821,vulnerability--f397b05d-1e5f-4f44-a15b-aea699939e91 vulnerability,CVE-2022-3962,vulnerability--311f97b7-7d06-49dc-a200-5cbf7fee6bf1 vulnerability,CVE-2023-5125,vulnerability--2ce2fce4-2735-4fae-8c47-7edc434990b3 vulnerability,CVE-2023-5134,vulnerability--b31654ce-57f8-4a7a-b904-27b66bad468e +vulnerability,CVE-2023-5145,vulnerability--7129d571-52e3-4052-97e3-e3358eb494f6 +vulnerability,CVE-2023-5146,vulnerability--2fb579b8-79fd-483f-86ad-6117c3519ee2 +vulnerability,CVE-2023-5143,vulnerability--bffba588-99e5-4e6d-9ccd-c1575527d0b8 +vulnerability,CVE-2023-5142,vulnerability--ca41fb39-628c-4061-b332-7b86ddfe1a81 +vulnerability,CVE-2023-5144,vulnerability--c399971f-a202-40fd-b0dc-0f7b4dac5bc5 +vulnerability,CVE-2023-1260,vulnerability--ba9430b0-7885-42e9-886d-669e47820909 +vulnerability,CVE-2023-1633,vulnerability--f85181e4-69c0-46e3-9c53-0628f9779512 +vulnerability,CVE-2023-1625,vulnerability--691aee8d-c8f6-4974-a734-76e2a1d23dd2 +vulnerability,CVE-2023-1636,vulnerability--59af426b-e31b-4a3a-a229-ce5e4bbc801d diff --git a/objects/vulnerability/vulnerability--2fb579b8-79fd-483f-86ad-6117c3519ee2.json b/objects/vulnerability/vulnerability--2fb579b8-79fd-483f-86ad-6117c3519ee2.json new file mode 100644 index 00000000000..2196b7bc598 --- /dev/null +++ b/objects/vulnerability/vulnerability--2fb579b8-79fd-483f-86ad-6117c3519ee2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--47e6b6af-837b-4376-aa40-560f5142da4c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2fb579b8-79fd-483f-86ad-6117c3519ee2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.468867Z", + "modified": "2023-09-25T00:05:16.468867Z", + "name": "CVE-2023-5146", + "description": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000 up to 20151231 and classified as critical. Affected by this issue is some unknown functionality of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240242 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-5146" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--59af426b-e31b-4a3a-a229-ce5e4bbc801d.json b/objects/vulnerability/vulnerability--59af426b-e31b-4a3a-a229-ce5e4bbc801d.json new file mode 100644 index 00000000000..4201a82d08e --- /dev/null +++ b/objects/vulnerability/vulnerability--59af426b-e31b-4a3a-a229-ce5e4bbc801d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3fbf3317-d017-4047-9df5-84d4e66f84fd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--59af426b-e31b-4a3a-a229-ce5e4bbc801d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.613661Z", + "modified": "2023-09-25T00:05:16.613661Z", + "name": "CVE-2023-1636", + "description": "A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-1636" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--691aee8d-c8f6-4974-a734-76e2a1d23dd2.json b/objects/vulnerability/vulnerability--691aee8d-c8f6-4974-a734-76e2a1d23dd2.json new file mode 100644 index 00000000000..6ca10cc31c4 --- /dev/null +++ b/objects/vulnerability/vulnerability--691aee8d-c8f6-4974-a734-76e2a1d23dd2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f01f58b6-9a5d-4521-9bfe-ea045cf5e5ac", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--691aee8d-c8f6-4974-a734-76e2a1d23dd2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.58496Z", + "modified": "2023-09-25T00:05:16.58496Z", + "name": "CVE-2023-1625", + "description": "An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-1625" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7129d571-52e3-4052-97e3-e3358eb494f6.json b/objects/vulnerability/vulnerability--7129d571-52e3-4052-97e3-e3358eb494f6.json new file mode 100644 index 00000000000..c6af3e4cbc8 --- /dev/null +++ b/objects/vulnerability/vulnerability--7129d571-52e3-4052-97e3-e3358eb494f6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1dace131-0db3-4928-8bf2-4efa0a39b032", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7129d571-52e3-4052-97e3-e3358eb494f6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.455386Z", + "modified": "2023-09-25T00:05:16.455386Z", + "name": "CVE-2023-5145", + "description": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-7000 up to 20151231 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/licence.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240241 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-5145" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ba9430b0-7885-42e9-886d-669e47820909.json b/objects/vulnerability/vulnerability--ba9430b0-7885-42e9-886d-669e47820909.json new file mode 100644 index 00000000000..08d7e75d9af --- /dev/null +++ b/objects/vulnerability/vulnerability--ba9430b0-7885-42e9-886d-669e47820909.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e05eaa26-0768-4605-ae69-56bac0b80c72", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ba9430b0-7885-42e9-886d-669e47820909", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.56889Z", + "modified": "2023-09-25T00:05:16.56889Z", + "name": "CVE-2023-1260", + "description": "An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions \"update, patch\" the \"pods/ephemeralcontainers\" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-1260" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bffba588-99e5-4e6d-9ccd-c1575527d0b8.json b/objects/vulnerability/vulnerability--bffba588-99e5-4e6d-9ccd-c1575527d0b8.json new file mode 100644 index 00000000000..f5b0ca32d6d --- /dev/null +++ b/objects/vulnerability/vulnerability--bffba588-99e5-4e6d-9ccd-c1575527d0b8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b957db72-d13c-4dea-97d0-ae1b5f7005ca", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bffba588-99e5-4e6d-9ccd-c1575527d0b8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.471216Z", + "modified": "2023-09-25T00:05:16.471216Z", + "name": "CVE-2023-5143", + "description": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 up to 20151231. This issue affects some unknown processing of the file /log/webmailattach.php. The manipulation of the argument table_name leads to an unknown weakness. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240239. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-5143" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c399971f-a202-40fd-b0dc-0f7b4dac5bc5.json b/objects/vulnerability/vulnerability--c399971f-a202-40fd-b0dc-0f7b4dac5bc5.json new file mode 100644 index 00000000000..13077d0e7c3 --- /dev/null +++ b/objects/vulnerability/vulnerability--c399971f-a202-40fd-b0dc-0f7b4dac5bc5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--902f9636-6b48-4342-bb64-6a86def58398", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c399971f-a202-40fd-b0dc-0f7b4dac5bc5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.477355Z", + "modified": "2023-09-25T00:05:16.477355Z", + "name": "CVE-2023-5144", + "description": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /sysmanage/updateos.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240240. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-5144" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ca41fb39-628c-4061-b332-7b86ddfe1a81.json b/objects/vulnerability/vulnerability--ca41fb39-628c-4061-b332-7b86ddfe1a81.json new file mode 100644 index 00000000000..648f4a2e025 --- /dev/null +++ b/objects/vulnerability/vulnerability--ca41fb39-628c-4061-b332-7b86ddfe1a81.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--116d65e5-4c1e-4885-ab23-09a9509d1480", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ca41fb39-628c-4061-b332-7b86ddfe1a81", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.474667Z", + "modified": "2023-09-25T00:05:16.474667Z", + "name": "CVE-2023-5142", + "description": "A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-5142" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f85181e4-69c0-46e3-9c53-0628f9779512.json b/objects/vulnerability/vulnerability--f85181e4-69c0-46e3-9c53-0628f9779512.json new file mode 100644 index 00000000000..6b3e6cd9738 --- /dev/null +++ b/objects/vulnerability/vulnerability--f85181e4-69c0-46e3-9c53-0628f9779512.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2ea36ec7-d6bf-46c3-be6a-55ace5533d8b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f85181e4-69c0-46e3-9c53-0628f9779512", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2023-09-25T00:05:16.574336Z", + "modified": "2023-09-25T00:05:16.574336Z", + "name": "CVE-2023-1633", + "description": "A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-1633" + } + ] + } + ] +} \ No newline at end of file