diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22569.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22569.json new file mode 100644 index 00000000000..9be216d91c3 --- /dev/null +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22569.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-22569", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-31T02:15:54.467", + "lastModified": "2024-01-31T02:15:54.467", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored Cross-Site Scripting (XSS) vulnerability in POSCMS v4.6.2, allows attackers to execute arbitrary code via a crafted payload to /index.php?c=install&m=index&step=2&is_install_db=0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Num-Nine/CVE/issues/12", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23745.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23745.json new file mode 100644 index 00000000000..49995076a64 --- /dev/null +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23745.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-23745", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-31T02:15:54.520", + "lastModified": "2024-01-31T02:15:54.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/louiselalanne/CVE-2024-23745", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a1478e0b479..5f69cd703bf 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-31T00:55:25.206071+00:00 +2024-01-31T03:00:24.681901+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-31T00:15:45.920000+00:00 +2024-01-31T02:15:54.520000+00:00 ``` ### Last Data Feed Release @@ -23,40 +23,27 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-01-30T01:00:28.228568+00:00 +2024-01-31T01:00:28.300889+00:00 ``` ### Total Number of included CVEs ```plain -237163 +237165 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +* [CVE-2024-22569](CVE-2024/CVE-2024-225xx/CVE-2024-22569.json) (`2024-01-31T02:15:54.467`) +* [CVE-2024-23745](CVE-2024/CVE-2024-237xx/CVE-2024-23745.json) (`2024-01-31T02:15:54.520`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `0` -* [CVE-2017-20189](CVE-2017/CVE-2017-201xx/CVE-2017-20189.json) (`2024-01-30T23:01:53.763`) -* [CVE-2021-33630](CVE-2021/CVE-2021-336xx/CVE-2021-33630.json) (`2024-01-31T00:15:45.270`) -* [CVE-2021-33631](CVE-2021/CVE-2021-336xx/CVE-2021-33631.json) (`2024-01-31T00:15:45.387`) -* [CVE-2022-40700](CVE-2022/CVE-2022-407xx/CVE-2022-40700.json) (`2024-01-30T23:03:18.550`) -* [CVE-2023-51702](CVE-2023/CVE-2023-517xx/CVE-2023-51702.json) (`2024-01-30T23:00:53.027`) -* [CVE-2023-7063](CVE-2023/CVE-2023-70xx/CVE-2023-7063.json) (`2024-01-30T23:02:10.287`) -* [CVE-2023-3341](CVE-2023/CVE-2023-33xx/CVE-2023-3341.json) (`2024-01-31T00:15:45.500`) -* [CVE-2023-45779](CVE-2023/CVE-2023-457xx/CVE-2023-45779.json) (`2024-01-31T00:15:45.653`) -* [CVE-2023-4508](CVE-2023/CVE-2023-45xx/CVE-2023-4508.json) (`2024-01-31T00:15:45.800`) -* [CVE-2024-22229](CVE-2024/CVE-2024-222xx/CVE-2024-22229.json) (`2024-01-30T23:01:36.513`) -* [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-01-30T23:03:34.597`) -* [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-01-30T23:04:09.157`) -* [CVE-2024-0317](CVE-2024/CVE-2024-03xx/CVE-2024-0317.json) (`2024-01-30T23:04:42.877`) -* [CVE-2024-23638](CVE-2024/CVE-2024-236xx/CVE-2024-23638.json) (`2024-01-30T23:05:12.243`) -* [CVE-2024-21585](CVE-2024/CVE-2024-215xx/CVE-2024-21585.json) (`2024-01-31T00:15:45.920`) ## Download and Usage