Auto-Update: 2023-12-28T07:00:24.566520+00:00

This commit is contained in:
cad-safe-bot 2023-12-28 07:00:28 +00:00
parent 32e817264e
commit 208b4df67e
5 changed files with 93 additions and 14 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46989",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-28T06:15:44.227",
"lastModified": "2023-12-28T06:15:44.227",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in the Innovadeluxe Quick Order module for PrestaShop before v.1.4.0, allows local attackers to execute arbitrary code via the getProducts() function in the productlist.php file."
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/12/12/idxquickorder.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-49469",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-28T06:15:44.340",
"lastModified": "2023-12-28T06:15:44.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/shaarli/Shaarli/issues/2038",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/shaarli/Shaarli/releases/tag/v0.13.0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50445",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-28T05:15:08.427",
"lastModified": "2023-12-28T05:15:08.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to execute arbitrary code via the get_system_log and get_crash_log functions of the logread module, as well as the upgrade_online function of the upgrade module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Using%20Shell%20Metacharacter%20Injection%20via%20API.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50692",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-28T06:15:44.400",
"lastModified": "2023-12-28T06:15:44.400",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Cherry-toto/jizhicms/issues/91",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-28T05:00:24.941795+00:00
2023-12-28T07:00:24.566520+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-28T04:15:08.280000+00:00
2023-12-28T06:15:44.400000+00:00
```
### Last Data Feed Release
@ -29,28 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
234311
234315
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `4`
* [CVE-2023-34829](CVE-2023/CVE-2023-348xx/CVE-2023-34829.json) (`2023-12-28T03:15:07.587`)
* [CVE-2023-7124](CVE-2023/CVE-2023-71xx/CVE-2023-7124.json) (`2023-12-28T03:15:08.070`)
* [CVE-2023-49228](CVE-2023/CVE-2023-492xx/CVE-2023-49228.json) (`2023-12-28T04:15:08.023`)
* [CVE-2023-49229](CVE-2023/CVE-2023-492xx/CVE-2023-49229.json) (`2023-12-28T04:15:08.100`)
* [CVE-2023-49230](CVE-2023/CVE-2023-492xx/CVE-2023-49230.json) (`2023-12-28T04:15:08.150`)
* [CVE-2023-51006](CVE-2023/CVE-2023-510xx/CVE-2023-51006.json) (`2023-12-28T04:15:08.227`)
* [CVE-2023-51010](CVE-2023/CVE-2023-510xx/CVE-2023-51010.json) (`2023-12-28T04:15:08.280`)
* [CVE-2023-50445](CVE-2023/CVE-2023-504xx/CVE-2023-50445.json) (`2023-12-28T05:15:08.427`)
* [CVE-2023-46989](CVE-2023/CVE-2023-469xx/CVE-2023-46989.json) (`2023-12-28T06:15:44.227`)
* [CVE-2023-49469](CVE-2023/CVE-2023-494xx/CVE-2023-49469.json) (`2023-12-28T06:15:44.340`)
* [CVE-2023-50692](CVE-2023/CVE-2023-506xx/CVE-2023-50692.json) (`2023-12-28T06:15:44.400`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `0`
* [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2023-12-28T03:15:07.660`)
* [CVE-2023-51385](CVE-2023/CVE-2023-513xx/CVE-2023-51385.json) (`2023-12-28T03:15:07.990`)
## Download and Usage