diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39645.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39645.json index 51e52470075..7cc1bd56920 100644 --- a/CVE-2023/CVE-2023-396xx/CVE-2023-39645.json +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39645.json @@ -2,12 +2,12 @@ "id": "CVE-2023-39645", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-03T21:15:10.240", - "lastModified": "2023-10-03T21:15:10.240", + "lastModified": "2023-10-03T22:15:09.877", "vulnStatus": "Received", "descriptions": [ { "lang": "en", - "value": "Theme volty tvcmspaymenticon up to v4.0.1 was discovered to contain a SQL injection vulnerability via the component /tvcmspaymenticon/ajax.php?action=update_position&recordsArray." + "value": "Improper neutralization of SQL parameter in Theme Volty CMS Payment Icon module for PrestaShop. In the module \u201cTheme Volty CMS Payment Icon\u201d (tvcmspaymenticon) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39646.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39646.json new file mode 100644 index 00000000000..870e223e524 --- /dev/null +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39646.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-39646", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-03T22:15:10.263", + "lastModified": "2023-10-03T22:15:10.263", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of SQL parameter in Theme Volty CMS Category Chain Slider module for PrestaShop. In the module \u201cTheme Volty CMS Category Chain Slide\"(tvcmscategorychainslider) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategorychainslider.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39647.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39647.json new file mode 100644 index 00000000000..c12912514db --- /dev/null +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39647.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-39647", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-03T23:15:09.380", + "lastModified": "2023-10-03T23:15:09.380", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of SQL parameter in Theme Volty CMS Category Product module for PrestaShop. In the module \u201cTheme Volty CMS Category Product\u201d (tvcmscategoryproduct) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategoryproduct.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39648.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39648.json new file mode 100644 index 00000000000..f0264a6b78c --- /dev/null +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39648.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-39648", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-03T22:15:10.323", + "lastModified": "2023-10-03T22:15:10.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of SQL parameter in Theme Volty CMS Testimonial module for PrestaShop. In the module \u201cTheme Volty CMS Testimonial\u201d (tvcmstestimonial) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/09/26/tvcmstestimonial.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39649.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39649.json new file mode 100644 index 00000000000..5a7989a4baf --- /dev/null +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39649.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-39649", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-03T22:15:10.367", + "lastModified": "2023-10-03T22:15:10.367", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of SQL parameter in Theme Volty CMS Category Slider module for PrestaShop. In the module \u201cTheme Volty CMS Category Slider\u201d (tvcmscategoryslider) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategoryslider.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39651.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39651.json new file mode 100644 index 00000000000..7e543bfd52a --- /dev/null +++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39651.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-39651", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-03T22:15:10.417", + "lastModified": "2023-10-03T22:15:10.417", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of SQL parameter in Theme Volty CMS BrandList module for PrestaShop In the module \u201cTheme Volty CMS BrandList\u201d (tvcmsbrandlist) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/09/26/tvcmsbrandlist.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json index 0dc2dd47f37..44a6a90b0c2 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4911", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-03T18:15:10.463", - "lastModified": "2023-10-03T21:15:10.783", + "lastModified": "2023-10-03T22:15:10.473", "vulnStatus": "Received", "descriptions": [ { @@ -51,6 +51,10 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352", "source": "secalert@redhat.com" }, + { + "url": "https://www.debian.org/security/2023/dsa-5514", + "source": "secalert@redhat.com" + }, { "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json index f8c3caa835a..517f8518958 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5169", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.127", - "lastModified": "2023-10-02T18:58:51.953", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T22:15:10.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -130,6 +130,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.debian.org/security/2023/dsa-5513", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json index f8150bcac9c..c6718e0611f 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5171", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.227", - "lastModified": "2023-10-02T18:57:34.917", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T22:15:10.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -131,6 +131,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.debian.org/security/2023/dsa-5513", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json index c9317fc91ad..9e7e8b42e79 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5176", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.767", - "lastModified": "2023-09-29T15:17:46.987", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-03T22:15:10.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -123,6 +123,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.debian.org/security/2023/dsa-5513", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json index ea818955b5a..7cdf3e7d584 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5255.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5255", "sourceIdentifier": "security@puppet.com", "published": "2023-10-03T18:15:10.577", - "lastModified": "2023-10-03T18:15:10.577", + "lastModified": "2023-10-03T23:15:09.440", "vulnStatus": "Received", "descriptions": [ { @@ -48,7 +48,7 @@ ], "references": [ { - "url": "https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates-0", + "url": "https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates", "source": "security@puppet.com" } ] diff --git a/README.md b/README.md index bf625422dd4..101e53f9192 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-03T22:00:24.582012+00:00 +2023-10-03T23:55:24.123835+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-03T21:15:10.857000+00:00 +2023-10-03T23:15:09.440000+00:00 ``` ### Last Data Feed Release @@ -29,60 +29,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -226913 +226918 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `5` -* [CVE-2023-40830](CVE-2023/CVE-2023-408xx/CVE-2023-40830.json) (`2023-10-03T20:15:09.967`) -* [CVE-2023-33268](CVE-2023/CVE-2023-332xx/CVE-2023-33268.json) (`2023-10-03T21:15:09.953`) -* [CVE-2023-33269](CVE-2023/CVE-2023-332xx/CVE-2023-33269.json) (`2023-10-03T21:15:10.003`) -* [CVE-2023-33270](CVE-2023/CVE-2023-332xx/CVE-2023-33270.json) (`2023-10-03T21:15:10.050`) -* [CVE-2023-33271](CVE-2023/CVE-2023-332xx/CVE-2023-33271.json) (`2023-10-03T21:15:10.097`) -* [CVE-2023-33272](CVE-2023/CVE-2023-332xx/CVE-2023-33272.json) (`2023-10-03T21:15:10.143`) -* [CVE-2023-33273](CVE-2023/CVE-2023-332xx/CVE-2023-33273.json) (`2023-10-03T21:15:10.193`) -* [CVE-2023-39645](CVE-2023/CVE-2023-396xx/CVE-2023-39645.json) (`2023-10-03T21:15:10.240`) -* [CVE-2023-40519](CVE-2023/CVE-2023-405xx/CVE-2023-40519.json) (`2023-10-03T21:15:10.283`) -* [CVE-2023-43176](CVE-2023/CVE-2023-431xx/CVE-2023-43176.json) (`2023-10-03T21:15:10.330`) -* [CVE-2023-43898](CVE-2023/CVE-2023-438xx/CVE-2023-43898.json) (`2023-10-03T21:15:10.440`) -* [CVE-2023-43951](CVE-2023/CVE-2023-439xx/CVE-2023-43951.json) (`2023-10-03T21:15:10.487`) -* [CVE-2023-43952](CVE-2023/CVE-2023-439xx/CVE-2023-43952.json) (`2023-10-03T21:15:10.533`) -* [CVE-2023-43953](CVE-2023/CVE-2023-439xx/CVE-2023-43953.json) (`2023-10-03T21:15:10.573`) -* [CVE-2023-44973](CVE-2023/CVE-2023-449xx/CVE-2023-44973.json) (`2023-10-03T21:15:10.617`) -* [CVE-2023-44974](CVE-2023/CVE-2023-449xx/CVE-2023-44974.json) (`2023-10-03T21:15:10.660`) +* [CVE-2023-39646](CVE-2023/CVE-2023-396xx/CVE-2023-39646.json) (`2023-10-03T22:15:10.263`) +* [CVE-2023-39648](CVE-2023/CVE-2023-396xx/CVE-2023-39648.json) (`2023-10-03T22:15:10.323`) +* [CVE-2023-39649](CVE-2023/CVE-2023-396xx/CVE-2023-39649.json) (`2023-10-03T22:15:10.367`) +* [CVE-2023-39651](CVE-2023/CVE-2023-396xx/CVE-2023-39651.json) (`2023-10-03T22:15:10.417`) +* [CVE-2023-39647](CVE-2023/CVE-2023-396xx/CVE-2023-39647.json) (`2023-10-03T23:15:09.380`) ### CVEs modified in the last Commit -Recently modified CVEs: `29` +Recently modified CVEs: `6` -* [CVE-2023-5259](CVE-2023/CVE-2023-52xx/CVE-2023-5259.json) (`2023-10-03T20:36:25.593`) -* [CVE-2023-41444](CVE-2023/CVE-2023-414xx/CVE-2023-41444.json) (`2023-10-03T20:44:50.587`) -* [CVE-2023-20262](CVE-2023/CVE-2023-202xx/CVE-2023-20262.json) (`2023-10-03T20:49:29.247`) -* [CVE-2023-5300](CVE-2023/CVE-2023-53xx/CVE-2023-5300.json) (`2023-10-03T20:52:49.163`) -* [CVE-2023-41797](CVE-2023/CVE-2023-417xx/CVE-2023-41797.json) (`2023-10-03T20:54:36.833`) -* [CVE-2023-41737](CVE-2023/CVE-2023-417xx/CVE-2023-41737.json) (`2023-10-03T20:54:48.490`) -* [CVE-2023-41736](CVE-2023/CVE-2023-417xx/CVE-2023-41736.json) (`2023-10-03T20:54:57.590`) -* [CVE-2023-41734](CVE-2023/CVE-2023-417xx/CVE-2023-41734.json) (`2023-10-03T20:55:10.330`) -* [CVE-2023-41733](CVE-2023/CVE-2023-417xx/CVE-2023-41733.json) (`2023-10-03T20:55:19.597`) -* [CVE-2023-41731](CVE-2023/CVE-2023-417xx/CVE-2023-41731.json) (`2023-10-03T20:55:28.333`) -* [CVE-2023-41729](CVE-2023/CVE-2023-417xx/CVE-2023-41729.json) (`2023-10-03T20:55:37.293`) -* [CVE-2023-41728](CVE-2023/CVE-2023-417xx/CVE-2023-41728.json) (`2023-10-03T20:55:45.703`) -* [CVE-2023-41692](CVE-2023/CVE-2023-416xx/CVE-2023-41692.json) (`2023-10-03T20:56:03.563`) -* [CVE-2023-42132](CVE-2023/CVE-2023-421xx/CVE-2023-42132.json) (`2023-10-03T20:56:24.067`) -* [CVE-2023-5329](CVE-2023/CVE-2023-53xx/CVE-2023-5329.json) (`2023-10-03T20:56:43.613`) -* [CVE-2023-5322](CVE-2023/CVE-2023-53xx/CVE-2023-5322.json) (`2023-10-03T20:57:06.370`) -* [CVE-2023-43907](CVE-2023/CVE-2023-439xx/CVE-2023-43907.json) (`2023-10-03T20:57:20.290`) -* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-03T20:57:51.777`) -* [CVE-2023-5321](CVE-2023/CVE-2023-53xx/CVE-2023-5321.json) (`2023-10-03T20:58:47.980`) -* [CVE-2023-20253](CVE-2023/CVE-2023-202xx/CVE-2023-20253.json) (`2023-10-03T21:06:46.027`) -* [CVE-2023-44477](CVE-2023/CVE-2023-444xx/CVE-2023-44477.json) (`2023-10-03T21:08:10.020`) -* [CVE-2023-43256](CVE-2023/CVE-2023-432xx/CVE-2023-43256.json) (`2023-10-03T21:15:10.377`) -* [CVE-2023-4806](CVE-2023/CVE-2023-48xx/CVE-2023-4806.json) (`2023-10-03T21:15:10.707`) -* [CVE-2023-4911](CVE-2023/CVE-2023-49xx/CVE-2023-4911.json) (`2023-10-03T21:15:10.783`) -* [CVE-2023-5156](CVE-2023/CVE-2023-51xx/CVE-2023-5156.json) (`2023-10-03T21:15:10.857`) +* [CVE-2023-39645](CVE-2023/CVE-2023-396xx/CVE-2023-39645.json) (`2023-10-03T22:15:09.877`) +* [CVE-2023-4911](CVE-2023/CVE-2023-49xx/CVE-2023-4911.json) (`2023-10-03T22:15:10.473`) +* [CVE-2023-5169](CVE-2023/CVE-2023-51xx/CVE-2023-5169.json) (`2023-10-03T22:15:10.547`) +* [CVE-2023-5171](CVE-2023/CVE-2023-51xx/CVE-2023-5171.json) (`2023-10-03T22:15:10.653`) +* [CVE-2023-5176](CVE-2023/CVE-2023-51xx/CVE-2023-5176.json) (`2023-10-03T22:15:10.717`) +* [CVE-2023-5255](CVE-2023/CVE-2023-52xx/CVE-2023-5255.json) (`2023-10-03T23:15:09.440`) ## Download and Usage