diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46989.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46989.json new file mode 100644 index 00000000000..dccc7cd524d --- /dev/null +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46989.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46989", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-28T06:15:44.227", + "lastModified": "2023-12-28T06:15:44.227", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in the Innovadeluxe Quick Order module for PrestaShop before v.1.4.0, allows local attackers to execute arbitrary code via the getProducts() function in the productlist.php file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/12/12/idxquickorder.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49469.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49469.json new file mode 100644 index 00000000000..118e55b71f6 --- /dev/null +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49469.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-49469", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-28T06:15:44.340", + "lastModified": "2023-12-28T06:15:44.340", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shaarli/Shaarli/issues/2038", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/shaarli/Shaarli/releases/tag/v0.13.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50445.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50445.json new file mode 100644 index 00000000000..e964b986dbe --- /dev/null +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50445.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-50445", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-28T05:15:08.427", + "lastModified": "2023-12-28T05:15:08.427", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to execute arbitrary code via the get_system_log and get_crash_log functions of the logread module, as well as the upgrade_online function of the upgrade module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Using%20Shell%20Metacharacter%20Injection%20via%20API.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50692.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50692.json new file mode 100644 index 00000000000..4e30faf4049 --- /dev/null +++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50692.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-50692", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-28T06:15:44.400", + "lastModified": "2023-12-28T06:15:44.400", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Cherry-toto/jizhicms/issues/91", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 64de23b35d7..f2943d455f4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-28T05:00:24.941795+00:00 +2023-12-28T07:00:24.566520+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-28T04:15:08.280000+00:00 +2023-12-28T06:15:44.400000+00:00 ``` ### Last Data Feed Release @@ -29,28 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234311 +234315 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `4` -* [CVE-2023-34829](CVE-2023/CVE-2023-348xx/CVE-2023-34829.json) (`2023-12-28T03:15:07.587`) -* [CVE-2023-7124](CVE-2023/CVE-2023-71xx/CVE-2023-7124.json) (`2023-12-28T03:15:08.070`) -* [CVE-2023-49228](CVE-2023/CVE-2023-492xx/CVE-2023-49228.json) (`2023-12-28T04:15:08.023`) -* [CVE-2023-49229](CVE-2023/CVE-2023-492xx/CVE-2023-49229.json) (`2023-12-28T04:15:08.100`) -* [CVE-2023-49230](CVE-2023/CVE-2023-492xx/CVE-2023-49230.json) (`2023-12-28T04:15:08.150`) -* [CVE-2023-51006](CVE-2023/CVE-2023-510xx/CVE-2023-51006.json) (`2023-12-28T04:15:08.227`) -* [CVE-2023-51010](CVE-2023/CVE-2023-510xx/CVE-2023-51010.json) (`2023-12-28T04:15:08.280`) +* [CVE-2023-50445](CVE-2023/CVE-2023-504xx/CVE-2023-50445.json) (`2023-12-28T05:15:08.427`) +* [CVE-2023-46989](CVE-2023/CVE-2023-469xx/CVE-2023-46989.json) (`2023-12-28T06:15:44.227`) +* [CVE-2023-49469](CVE-2023/CVE-2023-494xx/CVE-2023-49469.json) (`2023-12-28T06:15:44.340`) +* [CVE-2023-50692](CVE-2023/CVE-2023-506xx/CVE-2023-50692.json) (`2023-12-28T06:15:44.400`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -* [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2023-12-28T03:15:07.660`) -* [CVE-2023-51385](CVE-2023/CVE-2023-513xx/CVE-2023-51385.json) (`2023-12-28T03:15:07.990`) ## Download and Usage