mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-12-28T07:00:24.566520+00:00
This commit is contained in:
parent
32e817264e
commit
208b4df67e
20
CVE-2023/CVE-2023-469xx/CVE-2023-46989.json
Normal file
20
CVE-2023/CVE-2023-469xx/CVE-2023-46989.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46989",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-28T06:15:44.227",
|
||||
"lastModified": "2023-12-28T06:15:44.227",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in the Innovadeluxe Quick Order module for PrestaShop before v.1.4.0, allows local attackers to execute arbitrary code via the getProducts() function in the productlist.php file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2023/12/12/idxquickorder.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-494xx/CVE-2023-49469.json
Normal file
24
CVE-2023/CVE-2023-494xx/CVE-2023-49469.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-49469",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-28T06:15:44.340",
|
||||
"lastModified": "2023-12-28T06:15:44.340",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shaarli/Shaarli/issues/2038",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shaarli/Shaarli/releases/tag/v0.13.0",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-504xx/CVE-2023-50445.json
Normal file
20
CVE-2023/CVE-2023-504xx/CVE-2023-50445.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-50445",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-28T05:15:08.427",
|
||||
"lastModified": "2023-12-28T05:15:08.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to execute arbitrary code via the get_system_log and get_crash_log functions of the logread module, as well as the upgrade_online function of the upgrade module."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Using%20Shell%20Metacharacter%20Injection%20via%20API.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-506xx/CVE-2023-50692.json
Normal file
20
CVE-2023/CVE-2023-506xx/CVE-2023-50692.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-50692",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-28T06:15:44.400",
|
||||
"lastModified": "2023-12-28T06:15:44.400",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Cherry-toto/jizhicms/issues/91",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
23
README.md
23
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-28T05:00:24.941795+00:00
|
||||
2023-12-28T07:00:24.566520+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-28T04:15:08.280000+00:00
|
||||
2023-12-28T06:15:44.400000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,28 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
234311
|
||||
234315
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-34829](CVE-2023/CVE-2023-348xx/CVE-2023-34829.json) (`2023-12-28T03:15:07.587`)
|
||||
* [CVE-2023-7124](CVE-2023/CVE-2023-71xx/CVE-2023-7124.json) (`2023-12-28T03:15:08.070`)
|
||||
* [CVE-2023-49228](CVE-2023/CVE-2023-492xx/CVE-2023-49228.json) (`2023-12-28T04:15:08.023`)
|
||||
* [CVE-2023-49229](CVE-2023/CVE-2023-492xx/CVE-2023-49229.json) (`2023-12-28T04:15:08.100`)
|
||||
* [CVE-2023-49230](CVE-2023/CVE-2023-492xx/CVE-2023-49230.json) (`2023-12-28T04:15:08.150`)
|
||||
* [CVE-2023-51006](CVE-2023/CVE-2023-510xx/CVE-2023-51006.json) (`2023-12-28T04:15:08.227`)
|
||||
* [CVE-2023-51010](CVE-2023/CVE-2023-510xx/CVE-2023-51010.json) (`2023-12-28T04:15:08.280`)
|
||||
* [CVE-2023-50445](CVE-2023/CVE-2023-504xx/CVE-2023-50445.json) (`2023-12-28T05:15:08.427`)
|
||||
* [CVE-2023-46989](CVE-2023/CVE-2023-469xx/CVE-2023-46989.json) (`2023-12-28T06:15:44.227`)
|
||||
* [CVE-2023-49469](CVE-2023/CVE-2023-494xx/CVE-2023-49469.json) (`2023-12-28T06:15:44.340`)
|
||||
* [CVE-2023-50692](CVE-2023/CVE-2023-506xx/CVE-2023-50692.json) (`2023-12-28T06:15:44.400`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2023-12-28T03:15:07.660`)
|
||||
* [CVE-2023-51385](CVE-2023/CVE-2023-513xx/CVE-2023-51385.json) (`2023-12-28T03:15:07.990`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user