mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-12-07T00:55:18.627053+00:00
This commit is contained in:
parent
89266accc6
commit
cd7c910847
20
CVE-2023/CVE-2023-463xx/CVE-2023-46353.json
Normal file
20
CVE-2023/CVE-2023-463xx/CVE-2023-46353.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46353",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-06T23:15:07.243",
|
||||
"lastModified": "2023-12-06T23:15:07.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the module \"Product Tag Icons Pro\" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2023/11/28/ticons.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-463xx/CVE-2023-46354.json
Normal file
20
CVE-2023/CVE-2023-463xx/CVE-2023-46354.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46354",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-06T23:15:07.380",
|
||||
"lastModified": "2023-12-06T23:15:07.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the module \"Orders (CSV, Excel) Export PRO\" (ordersexport) < 5.2.0 from MyPrestaModules for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can access exports from the module which can lead to a leak of personal information from ps_customer/ps_address tables such as name / surname / email / phone number / full postal address."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2023/11/28/ordersexport.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-65xx/CVE-2023-6566.json
Normal file
59
CVE-2023/CVE-2023-65xx/CVE-2023-6566.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-6566",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-12-07T00:15:07.120",
|
||||
"lastModified": "2023-12-07T00:15:07.120",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Business Logic Errors in GitHub repository microweber/microweber prior to 2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-840"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/microweber/microweber/commit/eee0c6771e152022a91089a547272c8a542bb74e",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
38
README.md
38
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-06T23:00:17.620733+00:00
|
||||
2023-12-07T00:55:18.627053+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-06T22:16:29.727000+00:00
|
||||
2023-12-07T00:15:07.120000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,44 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
232421
|
||||
232424
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-46353](CVE-2023/CVE-2023-463xx/CVE-2023-46353.json) (`2023-12-06T23:15:07.243`)
|
||||
* [CVE-2023-46354](CVE-2023/CVE-2023-463xx/CVE-2023-46354.json) (`2023-12-06T23:15:07.380`)
|
||||
* [CVE-2023-6566](CVE-2023/CVE-2023-65xx/CVE-2023-6566.json) (`2023-12-07T00:15:07.120`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `34`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-6019](CVE-2023/CVE-2023-60xx/CVE-2023-6019.json) (`2023-12-06T21:15:08.467`)
|
||||
* [CVE-2023-6020](CVE-2023/CVE-2023-60xx/CVE-2023-6020.json) (`2023-12-06T21:15:08.560`)
|
||||
* [CVE-2023-6021](CVE-2023/CVE-2023-60xx/CVE-2023-6021.json) (`2023-12-06T21:15:08.647`)
|
||||
* [CVE-2023-6473](CVE-2023/CVE-2023-64xx/CVE-2023-6473.json) (`2023-12-06T22:03:54.937`)
|
||||
* [CVE-2023-6472](CVE-2023/CVE-2023-64xx/CVE-2023-6472.json) (`2023-12-06T22:06:00.133`)
|
||||
* [CVE-2023-42678](CVE-2023/CVE-2023-426xx/CVE-2023-42678.json) (`2023-12-06T22:07:51.867`)
|
||||
* [CVE-2023-42677](CVE-2023/CVE-2023-426xx/CVE-2023-42677.json) (`2023-12-06T22:08:43.167`)
|
||||
* [CVE-2023-42676](CVE-2023/CVE-2023-426xx/CVE-2023-42676.json) (`2023-12-06T22:09:03.450`)
|
||||
* [CVE-2023-42675](CVE-2023/CVE-2023-426xx/CVE-2023-42675.json) (`2023-12-06T22:09:15.220`)
|
||||
* [CVE-2023-42674](CVE-2023/CVE-2023-426xx/CVE-2023-42674.json) (`2023-12-06T22:09:24.530`)
|
||||
* [CVE-2023-42673](CVE-2023/CVE-2023-426xx/CVE-2023-42673.json) (`2023-12-06T22:09:33.433`)
|
||||
* [CVE-2023-42672](CVE-2023/CVE-2023-426xx/CVE-2023-42672.json) (`2023-12-06T22:09:42.317`)
|
||||
* [CVE-2023-42671](CVE-2023/CVE-2023-426xx/CVE-2023-42671.json) (`2023-12-06T22:09:53.053`)
|
||||
* [CVE-2023-42690](CVE-2023/CVE-2023-426xx/CVE-2023-42690.json) (`2023-12-06T22:12:53.343`)
|
||||
* [CVE-2023-42689](CVE-2023/CVE-2023-426xx/CVE-2023-42689.json) (`2023-12-06T22:13:02.787`)
|
||||
* [CVE-2023-42688](CVE-2023/CVE-2023-426xx/CVE-2023-42688.json) (`2023-12-06T22:13:16.387`)
|
||||
* [CVE-2023-42687](CVE-2023/CVE-2023-426xx/CVE-2023-42687.json) (`2023-12-06T22:13:44.037`)
|
||||
* [CVE-2023-42686](CVE-2023/CVE-2023-426xx/CVE-2023-42686.json) (`2023-12-06T22:13:54.267`)
|
||||
* [CVE-2023-4586](CVE-2023/CVE-2023-45xx/CVE-2023-4586.json) (`2023-12-06T22:15:06.693`)
|
||||
* [CVE-2023-42695](CVE-2023/CVE-2023-426xx/CVE-2023-42695.json) (`2023-12-06T22:15:23.793`)
|
||||
* [CVE-2023-42694](CVE-2023/CVE-2023-426xx/CVE-2023-42694.json) (`2023-12-06T22:15:35.147`)
|
||||
* [CVE-2023-42693](CVE-2023/CVE-2023-426xx/CVE-2023-42693.json) (`2023-12-06T22:15:44.227`)
|
||||
* [CVE-2023-42692](CVE-2023/CVE-2023-426xx/CVE-2023-42692.json) (`2023-12-06T22:16:04.247`)
|
||||
* [CVE-2023-42691](CVE-2023/CVE-2023-426xx/CVE-2023-42691.json) (`2023-12-06T22:16:16.917`)
|
||||
* [CVE-2023-42685](CVE-2023/CVE-2023-426xx/CVE-2023-42685.json) (`2023-12-06T22:16:29.727`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user