mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2023-05-05T00:00:24.044256+00:00
This commit is contained in:
parent
fe22943ef9
commit
d6533a54af
32
CVE-2023/CVE-2023-18xx/CVE-2023-1894.json
Normal file
32
CVE-2023/CVE-2023-18xx/CVE-2023-1894.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-1894",
|
||||
"sourceIdentifier": "security@puppet.com",
|
||||
"published": "2023-05-04T23:15:08.763",
|
||||
"lastModified": "2023-05-04T23:15:08.763",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@puppet.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.puppet.com/security/cve/cve-2023-1894-puppet-server-redos",
|
||||
"source": "security@puppet.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-300xx/CVE-2023-30093.json
Normal file
20
CVE-2023/CVE-2023-300xx/CVE-2023-30093.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30093",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-04T22:15:09.120",
|
||||
"lastModified": "2023-05-04T22:15:09.120",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in Open Networking Foundation ONOS from version 1.9.0 until 2.7.0 allows attackers to execute arbitrary code via uploading a crafted YAML file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.edoardoottavianelli.it/CVE-2023-30093/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-302xx/CVE-2023-30282.json
Normal file
20
CVE-2023/CVE-2023-302xx/CVE-2023-30282.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30282",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-04T22:15:09.177",
|
||||
"lastModified": "2023-05-04T22:15:09.177",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PrestaShop scexportcustomers <= 3.6.1 is vulnerable to Incorrect Access Control. Due to a lack of permissions' control, a guest can access exports from the module which can lead to leak of personal information from customer table."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/05/02/scexportcustomers.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
98
README.md
98
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-04T21:55:23.937706+00:00
|
||||
2023-05-05T00:00:24.044256+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-04T21:26:02.407000+00:00
|
||||
2023-05-04T23:15:08.763000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,104 +29,22 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
214117
|
||||
214120
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `50`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2022-47434](CVE-2022/CVE-2022-474xx/CVE-2022-47434.json) (`2023-05-04T21:15:09.313`)
|
||||
* [CVE-2022-47449](CVE-2022/CVE-2022-474xx/CVE-2022-47449.json) (`2023-05-04T21:15:09.387`)
|
||||
* [CVE-2023-20126](CVE-2023/CVE-2023-201xx/CVE-2023-20126.json) (`2023-05-04T20:15:09.633`)
|
||||
* [CVE-2023-21484](CVE-2023/CVE-2023-214xx/CVE-2023-21484.json) (`2023-05-04T21:15:09.547`)
|
||||
* [CVE-2023-21485](CVE-2023/CVE-2023-214xx/CVE-2023-21485.json) (`2023-05-04T21:15:09.627`)
|
||||
* [CVE-2023-21486](CVE-2023/CVE-2023-214xx/CVE-2023-21486.json) (`2023-05-04T21:15:09.697`)
|
||||
* [CVE-2023-21487](CVE-2023/CVE-2023-214xx/CVE-2023-21487.json) (`2023-05-04T21:15:09.760`)
|
||||
* [CVE-2023-21488](CVE-2023/CVE-2023-214xx/CVE-2023-21488.json) (`2023-05-04T21:15:09.817`)
|
||||
* [CVE-2023-21489](CVE-2023/CVE-2023-214xx/CVE-2023-21489.json) (`2023-05-04T21:15:09.883`)
|
||||
* [CVE-2023-21490](CVE-2023/CVE-2023-214xx/CVE-2023-21490.json) (`2023-05-04T21:15:09.943`)
|
||||
* [CVE-2023-21491](CVE-2023/CVE-2023-214xx/CVE-2023-21491.json) (`2023-05-04T21:15:10.007`)
|
||||
* [CVE-2023-21492](CVE-2023/CVE-2023-214xx/CVE-2023-21492.json) (`2023-05-04T21:15:10.070`)
|
||||
* [CVE-2023-21493](CVE-2023/CVE-2023-214xx/CVE-2023-21493.json) (`2023-05-04T21:15:10.137`)
|
||||
* [CVE-2023-21494](CVE-2023/CVE-2023-214xx/CVE-2023-21494.json) (`2023-05-04T21:15:10.200`)
|
||||
* [CVE-2023-21495](CVE-2023/CVE-2023-214xx/CVE-2023-21495.json) (`2023-05-04T21:15:10.267`)
|
||||
* [CVE-2023-21496](CVE-2023/CVE-2023-214xx/CVE-2023-21496.json) (`2023-05-04T21:15:10.333`)
|
||||
* [CVE-2023-21497](CVE-2023/CVE-2023-214xx/CVE-2023-21497.json) (`2023-05-04T21:15:10.403`)
|
||||
* [CVE-2023-21498](CVE-2023/CVE-2023-214xx/CVE-2023-21498.json) (`2023-05-04T21:15:10.477`)
|
||||
* [CVE-2023-21499](CVE-2023/CVE-2023-214xx/CVE-2023-21499.json) (`2023-05-04T21:15:10.540`)
|
||||
* [CVE-2023-21500](CVE-2023/CVE-2023-215xx/CVE-2023-21500.json) (`2023-05-04T21:15:10.600`)
|
||||
* [CVE-2023-21501](CVE-2023/CVE-2023-215xx/CVE-2023-21501.json) (`2023-05-04T21:15:10.663`)
|
||||
* [CVE-2023-21502](CVE-2023/CVE-2023-215xx/CVE-2023-21502.json) (`2023-05-04T21:15:10.727`)
|
||||
* [CVE-2023-21503](CVE-2023/CVE-2023-215xx/CVE-2023-21503.json) (`2023-05-04T21:15:10.790`)
|
||||
* [CVE-2023-21504](CVE-2023/CVE-2023-215xx/CVE-2023-21504.json) (`2023-05-04T21:15:10.853`)
|
||||
* [CVE-2023-21505](CVE-2023/CVE-2023-215xx/CVE-2023-21505.json) (`2023-05-04T21:15:10.917`)
|
||||
* [CVE-2023-21506](CVE-2023/CVE-2023-215xx/CVE-2023-21506.json) (`2023-05-04T21:15:11.080`)
|
||||
* [CVE-2023-21507](CVE-2023/CVE-2023-215xx/CVE-2023-21507.json) (`2023-05-04T21:15:11.150`)
|
||||
* [CVE-2023-21508](CVE-2023/CVE-2023-215xx/CVE-2023-21508.json) (`2023-05-04T21:15:11.207`)
|
||||
* [CVE-2023-21509](CVE-2023/CVE-2023-215xx/CVE-2023-21509.json) (`2023-05-04T21:15:11.270`)
|
||||
* [CVE-2023-21510](CVE-2023/CVE-2023-215xx/CVE-2023-21510.json) (`2023-05-04T21:15:11.327`)
|
||||
* [CVE-2023-21511](CVE-2023/CVE-2023-215xx/CVE-2023-21511.json) (`2023-05-04T21:15:11.387`)
|
||||
* [CVE-2023-23059](CVE-2023/CVE-2023-230xx/CVE-2023-23059.json) (`2023-05-04T20:15:09.737`)
|
||||
* [CVE-2023-25289](CVE-2023/CVE-2023-252xx/CVE-2023-25289.json) (`2023-05-04T21:15:11.447`)
|
||||
* [CVE-2023-25458](CVE-2023/CVE-2023-254xx/CVE-2023-25458.json) (`2023-05-04T20:15:09.797`)
|
||||
* [CVE-2023-25961](CVE-2023/CVE-2023-259xx/CVE-2023-25961.json) (`2023-05-04T20:15:09.897`)
|
||||
* [CVE-2023-25977](CVE-2023/CVE-2023-259xx/CVE-2023-25977.json) (`2023-05-04T20:15:09.977`)
|
||||
* [CVE-2023-25982](CVE-2023/CVE-2023-259xx/CVE-2023-25982.json) (`2023-05-04T20:15:10.060`)
|
||||
* [CVE-2023-30094](CVE-2023/CVE-2023-300xx/CVE-2023-30094.json) (`2023-05-04T20:15:10.153`)
|
||||
* [CVE-2023-30095](CVE-2023/CVE-2023-300xx/CVE-2023-30095.json) (`2023-05-04T20:15:10.213`)
|
||||
* [CVE-2023-30096](CVE-2023/CVE-2023-300xx/CVE-2023-30096.json) (`2023-05-04T20:15:10.267`)
|
||||
* [CVE-2023-30097](CVE-2023/CVE-2023-300xx/CVE-2023-30097.json) (`2023-05-04T20:15:10.320`)
|
||||
* [CVE-2023-30216](CVE-2023/CVE-2023-302xx/CVE-2023-30216.json) (`2023-05-04T21:15:11.493`)
|
||||
* [CVE-2023-30264](CVE-2023/CVE-2023-302xx/CVE-2023-30264.json) (`2023-05-04T20:15:10.377`)
|
||||
* [CVE-2023-30268](CVE-2023/CVE-2023-302xx/CVE-2023-30268.json) (`2023-05-04T20:15:10.567`)
|
||||
* [CVE-2023-30328](CVE-2023/CVE-2023-303xx/CVE-2023-30328.json) (`2023-05-04T21:15:11.540`)
|
||||
* [CVE-2023-30399](CVE-2023/CVE-2023-303xx/CVE-2023-30399.json) (`2023-05-04T21:15:11.593`)
|
||||
* [CVE-2023-31284](CVE-2023/CVE-2023-312xx/CVE-2023-31284.json) (`2023-05-04T20:15:10.717`)
|
||||
* [CVE-2023-31413](CVE-2023/CVE-2023-314xx/CVE-2023-31413.json) (`2023-05-04T21:15:11.640`)
|
||||
* [CVE-2023-31414](CVE-2023/CVE-2023-314xx/CVE-2023-31414.json) (`2023-05-04T21:15:11.703`)
|
||||
* [CVE-2023-31415](CVE-2023/CVE-2023-314xx/CVE-2023-31415.json) (`2023-05-04T21:15:11.760`)
|
||||
* [CVE-2023-1894](CVE-2023/CVE-2023-18xx/CVE-2023-1894.json) (`2023-05-04T23:15:08.763`)
|
||||
* [CVE-2023-30093](CVE-2023/CVE-2023-300xx/CVE-2023-30093.json) (`2023-05-04T22:15:09.120`)
|
||||
* [CVE-2023-30282](CVE-2023/CVE-2023-302xx/CVE-2023-30282.json) (`2023-05-04T22:15:09.177`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `35`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2022-47648](CVE-2022/CVE-2022-476xx/CVE-2022-47648.json) (`2023-05-04T21:15:09.457`)
|
||||
* [CVE-2023-0698](CVE-2023/CVE-2023-06xx/CVE-2023-0698.json) (`2023-05-04T20:15:09.503`)
|
||||
* [CVE-2023-20869](CVE-2023/CVE-2023-208xx/CVE-2023-20869.json) (`2023-05-04T20:19:48.860`)
|
||||
* [CVE-2023-20871](CVE-2023/CVE-2023-208xx/CVE-2023-20871.json) (`2023-05-04T21:24:33.350`)
|
||||
* [CVE-2023-20872](CVE-2023/CVE-2023-208xx/CVE-2023-20872.json) (`2023-05-04T21:24:15.877`)
|
||||
* [CVE-2023-22729](CVE-2023/CVE-2023-227xx/CVE-2023-22729.json) (`2023-05-04T20:13:00.437`)
|
||||
* [CVE-2023-2293](CVE-2023/CVE-2023-22xx/CVE-2023-2293.json) (`2023-05-04T20:08:07.957`)
|
||||
* [CVE-2023-2336](CVE-2023/CVE-2023-23xx/CVE-2023-2336.json) (`2023-05-04T20:03:07.463`)
|
||||
* [CVE-2023-2338](CVE-2023/CVE-2023-23xx/CVE-2023-2338.json) (`2023-05-04T20:02:34.583`)
|
||||
* [CVE-2023-2339](CVE-2023/CVE-2023-23xx/CVE-2023-2339.json) (`2023-05-04T20:07:25.237`)
|
||||
* [CVE-2023-2340](CVE-2023/CVE-2023-23xx/CVE-2023-2340.json) (`2023-05-04T20:07:12.930`)
|
||||
* [CVE-2023-2341](CVE-2023/CVE-2023-23xx/CVE-2023-2341.json) (`2023-05-04T20:08:13.433`)
|
||||
* [CVE-2023-2342](CVE-2023/CVE-2023-23xx/CVE-2023-2342.json) (`2023-05-04T20:07:48.483`)
|
||||
* [CVE-2023-2343](CVE-2023/CVE-2023-23xx/CVE-2023-2343.json) (`2023-05-04T20:08:35.407`)
|
||||
* [CVE-2023-2344](CVE-2023/CVE-2023-23xx/CVE-2023-2344.json) (`2023-05-04T20:00:56.577`)
|
||||
* [CVE-2023-23839](CVE-2023/CVE-2023-238xx/CVE-2023-23839.json) (`2023-05-04T21:19:44.067`)
|
||||
* [CVE-2023-24966](CVE-2023/CVE-2023-249xx/CVE-2023-24966.json) (`2023-05-04T20:04:20.473`)
|
||||
* [CVE-2023-25652](CVE-2023/CVE-2023-256xx/CVE-2023-25652.json) (`2023-05-04T21:26:02.407`)
|
||||
* [CVE-2023-25815](CVE-2023/CVE-2023-258xx/CVE-2023-25815.json) (`2023-05-04T21:25:27.333`)
|
||||
* [CVE-2023-27860](CVE-2023/CVE-2023-278xx/CVE-2023-27860.json) (`2023-05-04T20:44:00.350`)
|
||||
* [CVE-2023-28084](CVE-2023/CVE-2023-280xx/CVE-2023-28084.json) (`2023-05-04T21:24:46.610`)
|
||||
* [CVE-2023-28384](CVE-2023/CVE-2023-283xx/CVE-2023-28384.json) (`2023-05-04T20:59:02.907`)
|
||||
* [CVE-2023-28400](CVE-2023/CVE-2023-284xx/CVE-2023-28400.json) (`2023-05-04T20:58:34.487`)
|
||||
* [CVE-2023-28471](CVE-2023/CVE-2023-284xx/CVE-2023-28471.json) (`2023-05-04T20:59:56.717`)
|
||||
* [CVE-2023-28716](CVE-2023/CVE-2023-287xx/CVE-2023-28716.json) (`2023-05-04T20:56:00.797`)
|
||||
* [CVE-2023-29007](CVE-2023/CVE-2023-290xx/CVE-2023-29007.json) (`2023-05-04T21:19:21.177`)
|
||||
* [CVE-2023-29011](CVE-2023/CVE-2023-290xx/CVE-2023-29011.json) (`2023-05-04T21:18:43.457`)
|
||||
* [CVE-2023-29012](CVE-2023/CVE-2023-290xx/CVE-2023-29012.json) (`2023-05-04T21:18:15.470`)
|
||||
* [CVE-2023-29150](CVE-2023/CVE-2023-291xx/CVE-2023-29150.json) (`2023-05-04T20:53:54.113`)
|
||||
* [CVE-2023-29169](CVE-2023/CVE-2023-291xx/CVE-2023-29169.json) (`2023-05-04T20:40:25.643`)
|
||||
* [CVE-2023-29255](CVE-2023/CVE-2023-292xx/CVE-2023-29255.json) (`2023-05-04T20:06:43.167`)
|
||||
* [CVE-2023-30265](CVE-2023/CVE-2023-302xx/CVE-2023-30265.json) (`2023-05-04T20:15:10.427`)
|
||||
* [CVE-2023-30266](CVE-2023/CVE-2023-302xx/CVE-2023-30266.json) (`2023-05-04T20:15:10.493`)
|
||||
* [CVE-2023-30269](CVE-2023/CVE-2023-302xx/CVE-2023-30269.json) (`2023-05-04T20:15:10.617`)
|
||||
* [CVE-2023-30444](CVE-2023/CVE-2023-304xx/CVE-2023-30444.json) (`2023-05-04T20:05:05.557`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user