From f3b510e5e321bb4898124e2e9420693780a1d9c3 Mon Sep 17 00:00:00 2001 From: vin01 Date: Wed, 24 Jul 2024 10:04:30 +0200 Subject: [PATCH] Add CVE-2023-42282 --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 226bc4b..c891ab4 100644 --- a/README.md +++ b/README.md @@ -34,6 +34,7 @@ Got a bogus CVE? Please share here! |28| [CVE-2024-27322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27322) | [HiddenLayer Inc.](https://hiddenlayer.com/research/r-bitrary-code-execution/) | https://github.com/traversc/qs/issues/93#issuecomment-2089733765
https://mstdn.social/@gws/112359739655466497
https://stackoverflow.com/questions/58426972/r-could-malicious-code-be-injected-into-an-rds-object
https://rud.is/b/2024/05/03/cve-2024-27322-should-never-have-been-assigned-and-r-data-files-are-still-super-risky-even-in-r-4-4-0/ | |29| [CVE-2024-23081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23081) and [CVE-2024-23082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23082) | [LLMISP](https://github.com/LLMISP/LLMISP/issues/1), [LLM4IG](https://gist.github.com/llm4ig) | https://www.threeten.org/threetenbp/security.html
https://github.com/ThreeTen/threetenbp/issues/191
https://gist.github.com/LLM4IG/3cc9183dcd887020368a0bafeafec5e3
https://gist.github.com/LLM4IG/d2618f5f4e5ac37eb75cff5617e58b90 | |30| [CVE-2019-8341](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8341) | [JameelNabbo](https://github.com/JameelNabbo) | https://bugzilla.redhat.com/show_bug.cgi?id=1677653#c4 | +|31| [CVE-2023-42282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42282) | [cosmosofcyberspace](https://github.com/cosmosofcyberspace) | https://github.com/indutny/node-ip/pull/138#issuecomment-1938010731
https://github.com/github/advisory-database/pull/3504#issuecomment-2189530624 | ## Why do people do this?