Auto-Update: 2023-12-30T23:00:24.423827+00:00

This commit is contained in:
cad-safe-bot 2023-12-30 23:00:28 +00:00
parent f02a6661c1
commit 1c956455d4
7 changed files with 56 additions and 21 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-31698", "id": "CVE-2023-31698",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-17T13:15:09.463", "published": "2023-05-17T13:15:09.463",
"lastModified": "2023-05-25T15:41:38.163", "lastModified": "2023-12-30T21:15:43.680",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo." "value": "Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration)."
} }
], ],
"metrics": { "metrics": {
@ -73,6 +73,14 @@
"VDB Entry" "VDB Entry"
] ]
}, },
{
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199",
"source": "cve@mitre.org"
},
{ {
"url": "https://github.com/bludit/bludit/issues/1509", "url": "https://github.com/bludit/bludit/issues/1509",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-34845", "id": "CVE-2023-34845",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-06-16T04:15:14.143", "published": "2023-06-16T04:15:14.143",
"lastModified": "2023-06-23T18:54:20.387", "lastModified": "2023-12-30T21:15:43.790",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file." "value": "Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration)."
}, },
{ {
"lang": "es", "lang": "es",
@ -68,6 +68,14 @@
} }
], ],
"references": [ "references": [
{
"url": "https://github.com/bludit/bludit/issues/1212#issuecomment-649514491",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/bludit/bludit/issues/1369#issuecomment-940806199",
"source": "cve@mitre.org"
},
{ {
"url": "https://github.com/bludit/bludit/issues/1508", "url": "https://github.com/bludit/bludit/issues/1508",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49465", "id": "CVE-2023-49465",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T20:15:38.370", "published": "2023-12-07T20:15:38.370",
"lastModified": "2023-12-11T17:31:41.460", "lastModified": "2023-12-30T21:15:43.877",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -76,6 +76,10 @@
"Issue Tracking", "Issue Tracking",
"Patch" "Patch"
] ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49467", "id": "CVE-2023-49467",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T20:15:38.427", "published": "2023-12-07T20:15:38.427",
"lastModified": "2023-12-11T17:31:18.677", "lastModified": "2023-12-30T21:15:43.957",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -76,6 +76,10 @@
"Issue Tracking", "Issue Tracking",
"Patch" "Patch"
] ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49468", "id": "CVE-2023-49468",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-12-07T20:15:38.477", "published": "2023-12-07T20:15:38.477",
"lastModified": "2023-12-11T17:30:55.310", "lastModified": "2023-12-30T21:15:44.010",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -76,6 +76,10 @@
"Issue Tracking", "Issue Tracking",
"Patch" "Patch"
] ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50471", "id": "CVE-2023-50471",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T20:15:53.130", "published": "2023-12-14T20:15:53.130",
"lastModified": "2023-12-19T20:51:50.550", "lastModified": "2023-12-30T21:15:44.067",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -77,6 +77,10 @@
"Patch", "Patch",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00023.html",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-12-30T21:00:24.544760+00:00 2023-12-30T23:00:24.423827+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-12-30T19:15:08.303000+00:00 2023-12-30T21:15:44.067000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -34,17 +34,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `0`
* [CVE-2023-52262](CVE-2023/CVE-2023-522xx/CVE-2023-52262.json) (`2023-12-30T19:15:08.197`)
* [CVE-2023-52263](CVE-2023/CVE-2023-522xx/CVE-2023-52263.json) (`2023-12-30T19:15:08.253`)
* [CVE-2023-6998](CVE-2023/CVE-2023-69xx/CVE-2023-6998.json) (`2023-12-30T19:15:08.303`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `6`
* [CVE-2023-31698](CVE-2023/CVE-2023-316xx/CVE-2023-31698.json) (`2023-12-30T21:15:43.680`)
* [CVE-2023-34845](CVE-2023/CVE-2023-348xx/CVE-2023-34845.json) (`2023-12-30T21:15:43.790`)
* [CVE-2023-49465](CVE-2023/CVE-2023-494xx/CVE-2023-49465.json) (`2023-12-30T21:15:43.877`)
* [CVE-2023-49467](CVE-2023/CVE-2023-494xx/CVE-2023-49467.json) (`2023-12-30T21:15:43.957`)
* [CVE-2023-49468](CVE-2023/CVE-2023-494xx/CVE-2023-49468.json) (`2023-12-30T21:15:44.010`)
* [CVE-2023-50471](CVE-2023/CVE-2023-504xx/CVE-2023-50471.json) (`2023-12-30T21:15:44.067`)
## Download and Usage ## Download and Usage