diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46353.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46353.json new file mode 100644 index 00000000000..752983028a2 --- /dev/null +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46353.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46353", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-06T23:15:07.243", + "lastModified": "2023-12-06T23:15:07.243", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the module \"Product Tag Icons Pro\" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/11/28/ticons.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46354.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46354.json new file mode 100644 index 00000000000..a24190d15de --- /dev/null +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46354.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46354", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-06T23:15:07.380", + "lastModified": "2023-12-06T23:15:07.380", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the module \"Orders (CSV, Excel) Export PRO\" (ordersexport) < 5.2.0 from MyPrestaModules for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can access exports from the module which can lead to a leak of personal information from ps_customer/ps_address tables such as name / surname / email / phone number / full postal address." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://security.friendsofpresta.org/modules/2023/11/28/ordersexport.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json new file mode 100644 index 00000000000..9188d70f5ac --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6566.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6566", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-12-07T00:15:07.120", + "lastModified": "2023-12-07T00:15:07.120", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Business Logic Errors in GitHub repository microweber/microweber prior to 2.0." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-840" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/microweber/microweber/commit/eee0c6771e152022a91089a547272c8a542bb74e", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index db514c53fb6..05756b27a08 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-06T23:00:17.620733+00:00 +2023-12-07T00:55:18.627053+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-06T22:16:29.727000+00:00 +2023-12-07T00:15:07.120000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -232421 +232424 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `3` +* [CVE-2023-46353](CVE-2023/CVE-2023-463xx/CVE-2023-46353.json) (`2023-12-06T23:15:07.243`) +* [CVE-2023-46354](CVE-2023/CVE-2023-463xx/CVE-2023-46354.json) (`2023-12-06T23:15:07.380`) +* [CVE-2023-6566](CVE-2023/CVE-2023-65xx/CVE-2023-6566.json) (`2023-12-07T00:15:07.120`) ### CVEs modified in the last Commit -Recently modified CVEs: `34` +Recently modified CVEs: `0` -* [CVE-2023-6019](CVE-2023/CVE-2023-60xx/CVE-2023-6019.json) (`2023-12-06T21:15:08.467`) -* [CVE-2023-6020](CVE-2023/CVE-2023-60xx/CVE-2023-6020.json) (`2023-12-06T21:15:08.560`) -* [CVE-2023-6021](CVE-2023/CVE-2023-60xx/CVE-2023-6021.json) (`2023-12-06T21:15:08.647`) -* [CVE-2023-6473](CVE-2023/CVE-2023-64xx/CVE-2023-6473.json) (`2023-12-06T22:03:54.937`) -* [CVE-2023-6472](CVE-2023/CVE-2023-64xx/CVE-2023-6472.json) (`2023-12-06T22:06:00.133`) -* [CVE-2023-42678](CVE-2023/CVE-2023-426xx/CVE-2023-42678.json) (`2023-12-06T22:07:51.867`) -* [CVE-2023-42677](CVE-2023/CVE-2023-426xx/CVE-2023-42677.json) (`2023-12-06T22:08:43.167`) -* [CVE-2023-42676](CVE-2023/CVE-2023-426xx/CVE-2023-42676.json) (`2023-12-06T22:09:03.450`) -* [CVE-2023-42675](CVE-2023/CVE-2023-426xx/CVE-2023-42675.json) (`2023-12-06T22:09:15.220`) -* [CVE-2023-42674](CVE-2023/CVE-2023-426xx/CVE-2023-42674.json) (`2023-12-06T22:09:24.530`) -* [CVE-2023-42673](CVE-2023/CVE-2023-426xx/CVE-2023-42673.json) (`2023-12-06T22:09:33.433`) -* [CVE-2023-42672](CVE-2023/CVE-2023-426xx/CVE-2023-42672.json) (`2023-12-06T22:09:42.317`) -* [CVE-2023-42671](CVE-2023/CVE-2023-426xx/CVE-2023-42671.json) (`2023-12-06T22:09:53.053`) -* [CVE-2023-42690](CVE-2023/CVE-2023-426xx/CVE-2023-42690.json) (`2023-12-06T22:12:53.343`) -* [CVE-2023-42689](CVE-2023/CVE-2023-426xx/CVE-2023-42689.json) (`2023-12-06T22:13:02.787`) -* [CVE-2023-42688](CVE-2023/CVE-2023-426xx/CVE-2023-42688.json) (`2023-12-06T22:13:16.387`) -* [CVE-2023-42687](CVE-2023/CVE-2023-426xx/CVE-2023-42687.json) (`2023-12-06T22:13:44.037`) -* [CVE-2023-42686](CVE-2023/CVE-2023-426xx/CVE-2023-42686.json) (`2023-12-06T22:13:54.267`) -* [CVE-2023-4586](CVE-2023/CVE-2023-45xx/CVE-2023-4586.json) (`2023-12-06T22:15:06.693`) -* [CVE-2023-42695](CVE-2023/CVE-2023-426xx/CVE-2023-42695.json) (`2023-12-06T22:15:23.793`) -* [CVE-2023-42694](CVE-2023/CVE-2023-426xx/CVE-2023-42694.json) (`2023-12-06T22:15:35.147`) -* [CVE-2023-42693](CVE-2023/CVE-2023-426xx/CVE-2023-42693.json) (`2023-12-06T22:15:44.227`) -* [CVE-2023-42692](CVE-2023/CVE-2023-426xx/CVE-2023-42692.json) (`2023-12-06T22:16:04.247`) -* [CVE-2023-42691](CVE-2023/CVE-2023-426xx/CVE-2023-42691.json) (`2023-12-06T22:16:16.917`) -* [CVE-2023-42685](CVE-2023/CVE-2023-426xx/CVE-2023-42685.json) (`2023-12-06T22:16:29.727`) ## Download and Usage