From c2d789826e2e850cb0eef6b7d1cb3a171bc10278 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Fri, 5 May 2023 06:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-05-05T04:00:24.732972+00:00 --- CVE-2023/CVE-2023-300xx/CVE-2023-30090.json | 20 ++++++++++++++++++++ CVE-2023/CVE-2023-301xx/CVE-2023-30122.json | 20 ++++++++++++++++++++ CVE-2023/CVE-2023-301xx/CVE-2023-30135.json | 20 ++++++++++++++++++++ README.md | 13 +++++++------ 4 files changed, 67 insertions(+), 6 deletions(-) create mode 100644 CVE-2023/CVE-2023-300xx/CVE-2023-30090.json create mode 100644 CVE-2023/CVE-2023-301xx/CVE-2023-30122.json create mode 100644 CVE-2023/CVE-2023-301xx/CVE-2023-30135.json diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30090.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30090.json new file mode 100644 index 00000000000..3e1bdce15b2 --- /dev/null +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30090.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30090", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-05T03:15:08.767", + "lastModified": "2023-05-05T03:15:08.767", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Semcms Shop v4.2 was discovered to contain an arbitrary file uplaod vulnerability via the component SEMCMS_Upfile.php. This vulnerability allows attackers to execute arbitrary code via uploading a crafted PHP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xlccccc/vuln/tree/master/Semcms", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30122.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30122.json new file mode 100644 index 00000000000..11f35ecee92 --- /dev/null +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30122.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30122", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-05T02:15:08.753", + "lastModified": "2023-05-05T02:15:08.753", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the component /admin/ajax.php?action=save_menu of Online Food Ordering System v2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xtxxueyan/bug_report/blob/main/vendors/onetnom23/online-food-ordering-system-v2/RCE-1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30135.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30135.json new file mode 100644 index 00000000000..24a8abb9bc3 --- /dev/null +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30135.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30135", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-05T02:15:08.813", + "lastModified": "2023-05-05T02:15:08.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Tenda AC18 v15.03.05.19(6318_)_cn was discovered to contain a command injection vulnerability via the deviceName parameter in the setUsbUnload function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DrizzlingSun/Tenda/blob/main/AC18/8/8.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cd08421edde..aa46bae0484 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-05T02:00:23.830381+00:00 +2023-05-05T04:00:24.732972+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-05T01:15:08.683000+00:00 +2023-05-05T03:15:08.767000+00:00 ``` ### Last Data Feed Release @@ -29,15 +29,16 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -214122 +214125 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `3` -* [CVE-2017-20183](CVE-2017/CVE-2017-201xx/CVE-2017-20183.json) (`2023-05-05T01:15:08.550`) -* [CVE-2023-2531](CVE-2023/CVE-2023-25xx/CVE-2023-2531.json) (`2023-05-05T01:15:08.683`) +* [CVE-2023-30090](CVE-2023/CVE-2023-300xx/CVE-2023-30090.json) (`2023-05-05T03:15:08.767`) +* [CVE-2023-30122](CVE-2023/CVE-2023-301xx/CVE-2023-30122.json) (`2023-05-05T02:15:08.753`) +* [CVE-2023-30135](CVE-2023/CVE-2023-301xx/CVE-2023-30135.json) (`2023-05-05T02:15:08.813`) ### CVEs modified in the last Commit