mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2023-12-07T00:55:18.627053+00:00
This commit is contained in:
parent
89266accc6
commit
cd7c910847
20
CVE-2023/CVE-2023-463xx/CVE-2023-46353.json
Normal file
20
CVE-2023/CVE-2023-463xx/CVE-2023-46353.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-46353",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-12-06T23:15:07.243",
|
||||||
|
"lastModified": "2023-12-06T23:15:07.243",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the module \"Product Tag Icons Pro\" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://security.friendsofpresta.org/modules/2023/11/28/ticons.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2023/CVE-2023-463xx/CVE-2023-46354.json
Normal file
20
CVE-2023/CVE-2023-463xx/CVE-2023-46354.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-46354",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-12-06T23:15:07.380",
|
||||||
|
"lastModified": "2023-12-06T23:15:07.380",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the module \"Orders (CSV, Excel) Export PRO\" (ordersexport) < 5.2.0 from MyPrestaModules for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can access exports from the module which can lead to a leak of personal information from ps_customer/ps_address tables such as name / surname / email / phone number / full postal address."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://security.friendsofpresta.org/modules/2023/11/28/ordersexport.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2023/CVE-2023-65xx/CVE-2023-6566.json
Normal file
59
CVE-2023/CVE-2023-65xx/CVE-2023-6566.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6566",
|
||||||
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
|
"published": "2023-12-07T00:15:07.120",
|
||||||
|
"lastModified": "2023-12-07T00:15:07.120",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Business Logic Errors in GitHub repository microweber/microweber prior to 2.0."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV30": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.0",
|
||||||
|
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 4.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@huntr.dev",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-840"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/microweber/microweber/commit/eee0c6771e152022a91089a547272c8a542bb74e",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6",
|
||||||
|
"source": "security@huntr.dev"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
38
README.md
38
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-12-06T23:00:17.620733+00:00
|
2023-12-07T00:55:18.627053+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-12-06T22:16:29.727000+00:00
|
2023-12-07T00:15:07.120000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,44 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
232421
|
232424
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `0`
|
Recently added CVEs: `3`
|
||||||
|
|
||||||
|
* [CVE-2023-46353](CVE-2023/CVE-2023-463xx/CVE-2023-46353.json) (`2023-12-06T23:15:07.243`)
|
||||||
|
* [CVE-2023-46354](CVE-2023/CVE-2023-463xx/CVE-2023-46354.json) (`2023-12-06T23:15:07.380`)
|
||||||
|
* [CVE-2023-6566](CVE-2023/CVE-2023-65xx/CVE-2023-6566.json) (`2023-12-07T00:15:07.120`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `34`
|
Recently modified CVEs: `0`
|
||||||
|
|
||||||
* [CVE-2023-6019](CVE-2023/CVE-2023-60xx/CVE-2023-6019.json) (`2023-12-06T21:15:08.467`)
|
|
||||||
* [CVE-2023-6020](CVE-2023/CVE-2023-60xx/CVE-2023-6020.json) (`2023-12-06T21:15:08.560`)
|
|
||||||
* [CVE-2023-6021](CVE-2023/CVE-2023-60xx/CVE-2023-6021.json) (`2023-12-06T21:15:08.647`)
|
|
||||||
* [CVE-2023-6473](CVE-2023/CVE-2023-64xx/CVE-2023-6473.json) (`2023-12-06T22:03:54.937`)
|
|
||||||
* [CVE-2023-6472](CVE-2023/CVE-2023-64xx/CVE-2023-6472.json) (`2023-12-06T22:06:00.133`)
|
|
||||||
* [CVE-2023-42678](CVE-2023/CVE-2023-426xx/CVE-2023-42678.json) (`2023-12-06T22:07:51.867`)
|
|
||||||
* [CVE-2023-42677](CVE-2023/CVE-2023-426xx/CVE-2023-42677.json) (`2023-12-06T22:08:43.167`)
|
|
||||||
* [CVE-2023-42676](CVE-2023/CVE-2023-426xx/CVE-2023-42676.json) (`2023-12-06T22:09:03.450`)
|
|
||||||
* [CVE-2023-42675](CVE-2023/CVE-2023-426xx/CVE-2023-42675.json) (`2023-12-06T22:09:15.220`)
|
|
||||||
* [CVE-2023-42674](CVE-2023/CVE-2023-426xx/CVE-2023-42674.json) (`2023-12-06T22:09:24.530`)
|
|
||||||
* [CVE-2023-42673](CVE-2023/CVE-2023-426xx/CVE-2023-42673.json) (`2023-12-06T22:09:33.433`)
|
|
||||||
* [CVE-2023-42672](CVE-2023/CVE-2023-426xx/CVE-2023-42672.json) (`2023-12-06T22:09:42.317`)
|
|
||||||
* [CVE-2023-42671](CVE-2023/CVE-2023-426xx/CVE-2023-42671.json) (`2023-12-06T22:09:53.053`)
|
|
||||||
* [CVE-2023-42690](CVE-2023/CVE-2023-426xx/CVE-2023-42690.json) (`2023-12-06T22:12:53.343`)
|
|
||||||
* [CVE-2023-42689](CVE-2023/CVE-2023-426xx/CVE-2023-42689.json) (`2023-12-06T22:13:02.787`)
|
|
||||||
* [CVE-2023-42688](CVE-2023/CVE-2023-426xx/CVE-2023-42688.json) (`2023-12-06T22:13:16.387`)
|
|
||||||
* [CVE-2023-42687](CVE-2023/CVE-2023-426xx/CVE-2023-42687.json) (`2023-12-06T22:13:44.037`)
|
|
||||||
* [CVE-2023-42686](CVE-2023/CVE-2023-426xx/CVE-2023-42686.json) (`2023-12-06T22:13:54.267`)
|
|
||||||
* [CVE-2023-4586](CVE-2023/CVE-2023-45xx/CVE-2023-4586.json) (`2023-12-06T22:15:06.693`)
|
|
||||||
* [CVE-2023-42695](CVE-2023/CVE-2023-426xx/CVE-2023-42695.json) (`2023-12-06T22:15:23.793`)
|
|
||||||
* [CVE-2023-42694](CVE-2023/CVE-2023-426xx/CVE-2023-42694.json) (`2023-12-06T22:15:35.147`)
|
|
||||||
* [CVE-2023-42693](CVE-2023/CVE-2023-426xx/CVE-2023-42693.json) (`2023-12-06T22:15:44.227`)
|
|
||||||
* [CVE-2023-42692](CVE-2023/CVE-2023-426xx/CVE-2023-42692.json) (`2023-12-06T22:16:04.247`)
|
|
||||||
* [CVE-2023-42691](CVE-2023/CVE-2023-426xx/CVE-2023-42691.json) (`2023-12-06T22:16:16.917`)
|
|
||||||
* [CVE-2023-42685](CVE-2023/CVE-2023-426xx/CVE-2023-42685.json) (`2023-12-06T22:16:29.727`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user