Auto-Update: 2023-12-07T00:55:18.627053+00:00

This commit is contained in:
cad-safe-bot 2023-12-07 00:55:22 +00:00
parent 89266accc6
commit cd7c910847
4 changed files with 107 additions and 30 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46353",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-06T23:15:07.243",
"lastModified": "2023-12-06T23:15:07.243",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the module \"Product Tag Icons Pro\" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection."
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/11/28/ticons.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46354",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-06T23:15:07.380",
"lastModified": "2023-12-06T23:15:07.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the module \"Orders (CSV, Excel) Export PRO\" (ordersexport) < 5.2.0 from MyPrestaModules for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can access exports from the module which can lead to a leak of personal information from ps_customer/ps_address tables such as name / surname / email / phone number / full postal address."
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/11/28/ordersexport.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-6566",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-07T00:15:07.120",
"lastModified": "2023-12-07T00:15:07.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Business Logic Errors in GitHub repository microweber/microweber prior to 2.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-840"
}
]
}
],
"references": [
{
"url": "https://github.com/microweber/microweber/commit/eee0c6771e152022a91089a547272c8a542bb74e",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6",
"source": "security@huntr.dev"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-06T23:00:17.620733+00:00
2023-12-07T00:55:18.627053+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-06T22:16:29.727000+00:00
2023-12-07T00:15:07.120000+00:00
```
### Last Data Feed Release
@ -29,44 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
232421
232424
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `3`
* [CVE-2023-46353](CVE-2023/CVE-2023-463xx/CVE-2023-46353.json) (`2023-12-06T23:15:07.243`)
* [CVE-2023-46354](CVE-2023/CVE-2023-463xx/CVE-2023-46354.json) (`2023-12-06T23:15:07.380`)
* [CVE-2023-6566](CVE-2023/CVE-2023-65xx/CVE-2023-6566.json) (`2023-12-07T00:15:07.120`)
### CVEs modified in the last Commit
Recently modified CVEs: `34`
Recently modified CVEs: `0`
* [CVE-2023-6019](CVE-2023/CVE-2023-60xx/CVE-2023-6019.json) (`2023-12-06T21:15:08.467`)
* [CVE-2023-6020](CVE-2023/CVE-2023-60xx/CVE-2023-6020.json) (`2023-12-06T21:15:08.560`)
* [CVE-2023-6021](CVE-2023/CVE-2023-60xx/CVE-2023-6021.json) (`2023-12-06T21:15:08.647`)
* [CVE-2023-6473](CVE-2023/CVE-2023-64xx/CVE-2023-6473.json) (`2023-12-06T22:03:54.937`)
* [CVE-2023-6472](CVE-2023/CVE-2023-64xx/CVE-2023-6472.json) (`2023-12-06T22:06:00.133`)
* [CVE-2023-42678](CVE-2023/CVE-2023-426xx/CVE-2023-42678.json) (`2023-12-06T22:07:51.867`)
* [CVE-2023-42677](CVE-2023/CVE-2023-426xx/CVE-2023-42677.json) (`2023-12-06T22:08:43.167`)
* [CVE-2023-42676](CVE-2023/CVE-2023-426xx/CVE-2023-42676.json) (`2023-12-06T22:09:03.450`)
* [CVE-2023-42675](CVE-2023/CVE-2023-426xx/CVE-2023-42675.json) (`2023-12-06T22:09:15.220`)
* [CVE-2023-42674](CVE-2023/CVE-2023-426xx/CVE-2023-42674.json) (`2023-12-06T22:09:24.530`)
* [CVE-2023-42673](CVE-2023/CVE-2023-426xx/CVE-2023-42673.json) (`2023-12-06T22:09:33.433`)
* [CVE-2023-42672](CVE-2023/CVE-2023-426xx/CVE-2023-42672.json) (`2023-12-06T22:09:42.317`)
* [CVE-2023-42671](CVE-2023/CVE-2023-426xx/CVE-2023-42671.json) (`2023-12-06T22:09:53.053`)
* [CVE-2023-42690](CVE-2023/CVE-2023-426xx/CVE-2023-42690.json) (`2023-12-06T22:12:53.343`)
* [CVE-2023-42689](CVE-2023/CVE-2023-426xx/CVE-2023-42689.json) (`2023-12-06T22:13:02.787`)
* [CVE-2023-42688](CVE-2023/CVE-2023-426xx/CVE-2023-42688.json) (`2023-12-06T22:13:16.387`)
* [CVE-2023-42687](CVE-2023/CVE-2023-426xx/CVE-2023-42687.json) (`2023-12-06T22:13:44.037`)
* [CVE-2023-42686](CVE-2023/CVE-2023-426xx/CVE-2023-42686.json) (`2023-12-06T22:13:54.267`)
* [CVE-2023-4586](CVE-2023/CVE-2023-45xx/CVE-2023-4586.json) (`2023-12-06T22:15:06.693`)
* [CVE-2023-42695](CVE-2023/CVE-2023-426xx/CVE-2023-42695.json) (`2023-12-06T22:15:23.793`)
* [CVE-2023-42694](CVE-2023/CVE-2023-426xx/CVE-2023-42694.json) (`2023-12-06T22:15:35.147`)
* [CVE-2023-42693](CVE-2023/CVE-2023-426xx/CVE-2023-42693.json) (`2023-12-06T22:15:44.227`)
* [CVE-2023-42692](CVE-2023/CVE-2023-426xx/CVE-2023-42692.json) (`2023-12-06T22:16:04.247`)
* [CVE-2023-42691](CVE-2023/CVE-2023-426xx/CVE-2023-42691.json) (`2023-12-06T22:16:16.917`)
* [CVE-2023-42685](CVE-2023/CVE-2023-426xx/CVE-2023-42685.json) (`2023-12-06T22:16:29.727`)
## Download and Usage