From 5deb25bd7bf58e3afe7e3aa52950fd1056b85869 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 30 Dec 2023 15:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-12-30T15:00:24.762597+00:00 --- CVE-2023/CVE-2023-71xx/CVE-2023-7175.json | 88 +++++++++++++++++++++++ README.md | 11 ++- 2 files changed, 93 insertions(+), 6 deletions(-) create mode 100644 CVE-2023/CVE-2023-71xx/CVE-2023-7175.json diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7175.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7175.json new file mode 100644 index 00000000000..e941b888512 --- /dev/null +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7175.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-7175", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-12-30T13:15:16.097", + "lastModified": "2023-12-30T13:15:16.097", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online College Library System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/borrow_add.php of the component HTTP POST Request Handler. The manipulation of the argument student leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249362 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://medium.com/@heishou/libsystem-sql-injection-bb74915175fe", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.249362", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.249362", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 963e96d9b39..96fc035d8c7 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-30T13:00:24.674905+00:00 +2023-12-30T15:00:24.762597+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-30T12:15:44.680000+00:00 +2023-12-30T13:15:16.097000+00:00 ``` ### Last Data Feed Release @@ -29,21 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234552 +234553 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2023-7173](CVE-2023/CVE-2023-71xx/CVE-2023-7173.json) (`2023-12-30T12:15:44.680`) +* [CVE-2023-7175](CVE-2023/CVE-2023-71xx/CVE-2023-7175.json) (`2023-12-30T13:15:16.097`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -* [CVE-2023-5408](CVE-2023/CVE-2023-54xx/CVE-2023-5408.json) (`2023-12-30T12:15:43.933`) ## Download and Usage