mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-10-17T06:00:26.115785+00:00
This commit is contained in:
parent
f6e88dce66
commit
b72a94ef27
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T12:15:08.197",
|
||||
"lastModified": "2023-10-11T12:15:09.843",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-17T05:15:49.187",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28652",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T12:15:08.230",
|
||||
"lastModified": "2023-10-11T12:15:09.960",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-17T05:15:49.470",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -142,6 +142,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-28662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T12:15:08.263",
|
||||
"lastModified": "2023-10-11T12:15:10.060",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-17T05:15:49.577",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -137,6 +137,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-31806",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T13:15:08.270",
|
||||
"lastModified": "2023-10-11T12:15:10.147",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-17T05:15:49.683",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -156,6 +156,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-31807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-06-08T20:15:09.057",
|
||||
"lastModified": "2023-10-11T12:15:10.237",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-17T05:15:49.790",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -252,6 +252,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-31808",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-27T14:15:07.500",
|
||||
"lastModified": "2023-10-11T12:15:10.333",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-17T05:15:49.943",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -156,6 +156,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-33620",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-28T12:15:07.697",
|
||||
"lastModified": "2023-10-11T12:15:10.413",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-10-17T05:15:50.050",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -156,6 +156,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
|
||||
"source": "cve@mitre.org"
|
||||
|
55
CVE-2023/CVE-2023-342xx/CVE-2023-34207.json
Normal file
55
CVE-2023/CVE-2023-342xx/CVE-2023-34207.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-34207",
|
||||
"sourceIdentifier": "ART@zuso.ai",
|
||||
"published": "2023-10-17T04:15:11.937",
|
||||
"lastModified": "2023-10-17T04:15:11.937",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted upload of file with dangerous type vulnerability in create template function in EasyUse MailHunter Ultimate 2023 and earlier allows remote authenticated users to perform arbitrary system commands with \u2018NT Authority\\SYSTEM\u2018 privilege via a crafted ZIP archive."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://zuso.ai/Advisory/ZA-2023-04",
|
||||
"source": "ART@zuso.ai"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-342xx/CVE-2023-34208.json
Normal file
55
CVE-2023/CVE-2023-342xx/CVE-2023-34208.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-34208",
|
||||
"sourceIdentifier": "ART@zuso.ai",
|
||||
"published": "2023-10-17T04:15:12.077",
|
||||
"lastModified": "2023-10-17T04:15:12.077",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Path Traversal in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to extract files into arbitrary directories via a crafted ZIP archive."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://zuso.ai/Advisory/ZA-2023-05",
|
||||
"source": "ART@zuso.ai"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-342xx/CVE-2023-34209.json
Normal file
55
CVE-2023/CVE-2023-342xx/CVE-2023-34209.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-34209",
|
||||
"sourceIdentifier": "ART@zuso.ai",
|
||||
"published": "2023-10-17T05:15:50.207",
|
||||
"lastModified": "2023-10-17T05:15:50.207",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to obtain the absolute path via unencrypted VIEWSTATE parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://zuso.ai/Advisory/ZA-2023-06",
|
||||
"source": "ART@zuso.ai"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-342xx/CVE-2023-34210.json
Normal file
55
CVE-2023/CVE-2023-342xx/CVE-2023-34210.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-34210",
|
||||
"sourceIdentifier": "ART@zuso.ai",
|
||||
"published": "2023-10-17T05:15:50.300",
|
||||
"lastModified": "2023-10-17T05:15:50.300",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection in create customer group function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to execute arbitrary SQL commands via the ctl00$ContentPlaceHolder1$txtCustSQL parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ART@zuso.ai",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://zuso.ai/Advisory/ZA-2023-07",
|
||||
"source": "ART@zuso.ai"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38039",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-09-15T04:15:10.127",
|
||||
"lastModified": "2023-10-13T22:15:10.100",
|
||||
"lastModified": "2023-10-17T05:15:50.377",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,6 +85,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/17",
|
||||
"source": "support@hackerone.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2072338",
|
||||
"source": "support@hackerone.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42824",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-04T19:15:10.490",
|
||||
"lastModified": "2023-10-10T23:15:10.847",
|
||||
"lastModified": "2023-10-17T05:15:50.497",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-10-05",
|
||||
"cisaActionDue": "2023-10-26",
|
||||
@ -15,7 +15,7 @@
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.0.3 y iPadOS 17.0.3. Un atacante local podr\u00eda aumentar sus privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.6."
|
||||
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.0.3 y iPadOS 17.0.3, iOS 16.7.1 y iPadOS 16.7.1. Un atacante local podr\u00eda aumentar sus privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -79,6 +79,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/16",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213961",
|
||||
"source": "product-security@apple.com",
|
||||
|
43
CVE-2023/CVE-2023-453xx/CVE-2023-45357.json
Normal file
43
CVE-2023/CVE-2023-453xx/CVE-2023-45357.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-45357",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-17T05:15:50.583",
|
||||
"lastModified": "2023-10-17T05:15:50.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a sensitive information disclosure vulnerability. An authenticated attacker could potentially obtain access to sensitive information via a popup warning message. 6.14 (6.14.0) is also a fixed release."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-453xx/CVE-2023-45358.json
Normal file
43
CVE-2023/CVE-2023-453xx/CVE-2023-45358.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-45358",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-17T05:15:50.657",
|
||||
"lastModified": "2023-10-17T05:15:50.657",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 (6.14.0) is also a fixed release."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-453xx/CVE-2023-45375.json
Normal file
20
CVE-2023/CVE-2023-453xx/CVE-2023-45375.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-45375",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-17T05:15:50.733",
|
||||
"lastModified": "2023-10-17T05:15:50.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the module \"PireosPay\" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-453xx/CVE-2023-45386.json
Normal file
20
CVE-2023/CVE-2023-453xx/CVE-2023-45386.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-45386",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-17T05:15:50.787",
|
||||
"lastModified": "2023-10-17T05:15:50.787",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the module extratabspro before version 2.2.8 from MyPresta.eu for PrestaShop, a guest can perform SQL injection via `extratabspro::searchcategory()`, `extratabspro::searchproduct()` and `extratabspro::searchmanufacturer().'"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5217",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-28T16:15:10.980",
|
||||
"lastModified": "2023-10-09T16:15:10.960",
|
||||
"lastModified": "2023-10-17T05:15:50.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-10-02",
|
||||
"cisaActionDue": "2023-10-23",
|
||||
@ -113,6 +113,10 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/12",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/16",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/5",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
40
README.md
40
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-17T04:00:25.167719+00:00
|
||||
2023-10-17T06:00:26.115785+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-17T03:15:09.703000+00:00
|
||||
2023-10-17T05:15:50.840000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,31 +29,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
228007
|
||||
228015
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
* [CVE-2021-20581](CVE-2021/CVE-2021-205xx/CVE-2021-20581.json) (`2023-10-17T02:15:09.813`)
|
||||
* [CVE-2021-29913](CVE-2021/CVE-2021-299xx/CVE-2021-29913.json) (`2023-10-17T02:15:09.910`)
|
||||
* [CVE-2021-38859](CVE-2021/CVE-2021-388xx/CVE-2021-38859.json) (`2023-10-17T02:15:10.000`)
|
||||
* [CVE-2022-22375](CVE-2022/CVE-2022-223xx/CVE-2022-22375.json) (`2023-10-17T02:15:10.090`)
|
||||
* [CVE-2022-22380](CVE-2022/CVE-2022-223xx/CVE-2022-22380.json) (`2023-10-17T02:15:10.177`)
|
||||
* [CVE-2022-22385](CVE-2022/CVE-2022-223xx/CVE-2022-22385.json) (`2023-10-17T02:15:10.257`)
|
||||
* [CVE-2022-22386](CVE-2022/CVE-2022-223xx/CVE-2022-22386.json) (`2023-10-17T02:15:10.340`)
|
||||
* [CVE-2022-43889](CVE-2022/CVE-2022-438xx/CVE-2022-43889.json) (`2023-10-17T02:15:10.427`)
|
||||
* [CVE-2022-43893](CVE-2022/CVE-2022-438xx/CVE-2022-43893.json) (`2023-10-17T02:15:10.507`)
|
||||
* [CVE-2022-43891](CVE-2022/CVE-2022-438xx/CVE-2022-43891.json) (`2023-10-17T03:15:09.520`)
|
||||
* [CVE-2022-43892](CVE-2022/CVE-2022-438xx/CVE-2022-43892.json) (`2023-10-17T03:15:09.603`)
|
||||
* [CVE-2023-34207](CVE-2023/CVE-2023-342xx/CVE-2023-34207.json) (`2023-10-17T04:15:11.937`)
|
||||
* [CVE-2023-34208](CVE-2023/CVE-2023-342xx/CVE-2023-34208.json) (`2023-10-17T04:15:12.077`)
|
||||
* [CVE-2023-34209](CVE-2023/CVE-2023-342xx/CVE-2023-34209.json) (`2023-10-17T05:15:50.207`)
|
||||
* [CVE-2023-34210](CVE-2023/CVE-2023-342xx/CVE-2023-34210.json) (`2023-10-17T05:15:50.300`)
|
||||
* [CVE-2023-45357](CVE-2023/CVE-2023-453xx/CVE-2023-45357.json) (`2023-10-17T05:15:50.583`)
|
||||
* [CVE-2023-45358](CVE-2023/CVE-2023-453xx/CVE-2023-45358.json) (`2023-10-17T05:15:50.657`)
|
||||
* [CVE-2023-45375](CVE-2023/CVE-2023-453xx/CVE-2023-45375.json) (`2023-10-17T05:15:50.733`)
|
||||
* [CVE-2023-45386](CVE-2023/CVE-2023-453xx/CVE-2023-45386.json) (`2023-10-17T05:15:50.787`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
* [CVE-2023-45133](CVE-2023/CVE-2023-451xx/CVE-2023-45133.json) (`2023-10-17T03:15:09.703`)
|
||||
* [CVE-2021-28651](CVE-2021/CVE-2021-286xx/CVE-2021-28651.json) (`2023-10-17T05:15:49.187`)
|
||||
* [CVE-2021-28652](CVE-2021/CVE-2021-286xx/CVE-2021-28652.json) (`2023-10-17T05:15:49.470`)
|
||||
* [CVE-2021-28662](CVE-2021/CVE-2021-286xx/CVE-2021-28662.json) (`2023-10-17T05:15:49.577`)
|
||||
* [CVE-2021-31806](CVE-2021/CVE-2021-318xx/CVE-2021-31806.json) (`2023-10-17T05:15:49.683`)
|
||||
* [CVE-2021-31807](CVE-2021/CVE-2021-318xx/CVE-2021-31807.json) (`2023-10-17T05:15:49.790`)
|
||||
* [CVE-2021-31808](CVE-2021/CVE-2021-318xx/CVE-2021-31808.json) (`2023-10-17T05:15:49.943`)
|
||||
* [CVE-2021-33620](CVE-2021/CVE-2021-336xx/CVE-2021-33620.json) (`2023-10-17T05:15:50.050`)
|
||||
* [CVE-2023-38039](CVE-2023/CVE-2023-380xx/CVE-2023-38039.json) (`2023-10-17T05:15:50.377`)
|
||||
* [CVE-2023-42824](CVE-2023/CVE-2023-428xx/CVE-2023-42824.json) (`2023-10-17T05:15:50.497`)
|
||||
* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-17T05:15:50.840`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user