diff --git a/CVE-2022/CVE-2022-249xx/CVE-2022-24989.json b/CVE-2022/CVE-2022-249xx/CVE-2022-24989.json new file mode 100644 index 00000000000..c1ae2fde2f1 --- /dev/null +++ b/CVE-2022/CVE-2022-249xx/CVE-2022-24989.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2022-24989", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-20T18:15:09.523", + "lastModified": "2023-08-20T18:15:09.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990", + "source": "cve@mitre.org" + }, + { + "url": "https://forum.terra-master.com/en/viewforum.php?f=28", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/0xf4n9x/CVE-2022-24990", + "source": "cve@mitre.org" + }, + { + "url": "https://octagon.net/blog/2022/03/07/cve-2022-24990-terrmaster-tos-unauthenticated-remote-command-execution-via-php-object-instantiation", + "source": "cve@mitre.org" + }, + { + "url": "https://packetstormsecurity.com/files/172904", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36674.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36674.json new file mode 100644 index 00000000000..eb015836a27 --- /dev/null +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36674.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-36674", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-20T18:15:09.930", + "lastModified": "2023-08-20T18:15:09.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, 1.39.x before 1.39.4, and 1.40.x before 1.40.1. It is possible to bypass the Bad image list (aka badFile) by using the thumb parameter (aka Manualthumb) of the File syntax." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://phabricator.wikimedia.org/T335612", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e3b2fef1cff..f865fc9db0e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-20T16:00:27.752757+00:00 +2023-08-20T20:00:29.595789+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-20T15:15:29.760000+00:00 +2023-08-20T18:15:09.930000+00:00 ``` ### Last Data Feed Release @@ -29,14 +29,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -223015 +223017 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -* [CVE-2023-4451](CVE-2023/CVE-2023-44xx/CVE-2023-4451.json) (`2023-08-20T15:15:29.760`) +* [CVE-2022-24989](CVE-2022/CVE-2022-249xx/CVE-2022-24989.json) (`2023-08-20T18:15:09.523`) +* [CVE-2023-36674](CVE-2023/CVE-2023-366xx/CVE-2023-36674.json) (`2023-08-20T18:15:09.930`) ### CVEs modified in the last Commit