Auto-Update: 2024-01-12T11:00:24.440890+00:00

This commit is contained in:
cad-safe-bot 2024-01-12 11:00:28 +00:00
parent d1868e17e2
commit 73324ca51e
5 changed files with 93 additions and 39 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-30014",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T09:15:43.927",
"lastModified": "2024-01-12T09:15:43.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-30015",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T09:15:44.040",
"lastModified": "2024-01-12T09:15:44.040",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via txtsearch parameter in review_search.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-3.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-30016",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T09:15:44.083",
"lastModified": "2024-01-12T09:15:44.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_details_edit.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-48909",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-12T09:15:44.133",
"lastModified": "2024-01-12T09:15:44.133",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Dollhouse-18/288b4774bc296722c9e3c60bafa392bf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Dollhouse-18/jave-core-Command-execution-vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-12T09:00:24.398886+00:00
2024-01-12T11:00:24.440890+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-12T08:15:43.920000+00:00
2024-01-12T09:15:44.133000+00:00
```
### Last Data Feed Release
@ -29,53 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
235734
235738
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `4`
* [CVE-2023-34061](CVE-2023/CVE-2023-340xx/CVE-2023-34061.json) (`2024-01-12T07:15:11.747`)
* [CVE-2023-37117](CVE-2023/CVE-2023-371xx/CVE-2023-37117.json) (`2024-01-12T07:15:12.077`)
* [CVE-2023-31211](CVE-2023/CVE-2023-312xx/CVE-2023-31211.json) (`2024-01-12T08:15:43.137`)
* [CVE-2023-40362](CVE-2023/CVE-2023-403xx/CVE-2023-40362.json) (`2024-01-12T08:15:43.467`)
* [CVE-2023-50919](CVE-2023/CVE-2023-509xx/CVE-2023-50919.json) (`2024-01-12T08:15:43.533`)
* [CVE-2023-50920](CVE-2023/CVE-2023-509xx/CVE-2023-50920.json) (`2024-01-12T08:15:43.590`)
* [CVE-2023-6735](CVE-2023/CVE-2023-67xx/CVE-2023-6735.json) (`2024-01-12T08:15:43.650`)
* [CVE-2023-6740](CVE-2023/CVE-2023-67xx/CVE-2023-6740.json) (`2024-01-12T08:15:43.920`)
* [CVE-2024-22027](CVE-2024/CVE-2024-220xx/CVE-2024-22027.json) (`2024-01-12T07:15:12.243`)
* [CVE-2023-30014](CVE-2023/CVE-2023-300xx/CVE-2023-30014.json) (`2024-01-12T09:15:43.927`)
* [CVE-2023-30015](CVE-2023/CVE-2023-300xx/CVE-2023-30015.json) (`2024-01-12T09:15:44.040`)
* [CVE-2023-30016](CVE-2023/CVE-2023-300xx/CVE-2023-30016.json) (`2024-01-12T09:15:44.083`)
* [CVE-2023-48909](CVE-2023/CVE-2023-489xx/CVE-2023-48909.json) (`2024-01-12T09:15:44.133`)
### CVEs modified in the last Commit
Recently modified CVEs: `39`
Recently modified CVEs: `0`
* [CVE-2023-26427](CVE-2023/CVE-2023-264xx/CVE-2023-26427.json) (`2024-01-12T08:15:39.610`)
* [CVE-2023-26428](CVE-2023/CVE-2023-264xx/CVE-2023-26428.json) (`2024-01-12T08:15:39.950`)
* [CVE-2023-26429](CVE-2023/CVE-2023-264xx/CVE-2023-26429.json) (`2024-01-12T08:15:40.080`)
* [CVE-2023-26430](CVE-2023/CVE-2023-264xx/CVE-2023-26430.json) (`2024-01-12T08:15:40.210`)
* [CVE-2023-26431](CVE-2023/CVE-2023-264xx/CVE-2023-26431.json) (`2024-01-12T08:15:40.353`)
* [CVE-2023-26432](CVE-2023/CVE-2023-264xx/CVE-2023-26432.json) (`2024-01-12T08:15:40.477`)
* [CVE-2023-26433](CVE-2023/CVE-2023-264xx/CVE-2023-26433.json) (`2024-01-12T08:15:40.610`)
* [CVE-2023-26434](CVE-2023/CVE-2023-264xx/CVE-2023-26434.json) (`2024-01-12T08:15:40.737`)
* [CVE-2023-26435](CVE-2023/CVE-2023-264xx/CVE-2023-26435.json) (`2024-01-12T08:15:40.867`)
* [CVE-2023-26436](CVE-2023/CVE-2023-264xx/CVE-2023-26436.json) (`2024-01-12T08:15:41.010`)
* [CVE-2023-26438](CVE-2023/CVE-2023-264xx/CVE-2023-26438.json) (`2024-01-12T08:15:41.150`)
* [CVE-2023-26439](CVE-2023/CVE-2023-264xx/CVE-2023-26439.json) (`2024-01-12T08:15:41.267`)
* [CVE-2023-26440](CVE-2023/CVE-2023-264xx/CVE-2023-26440.json) (`2024-01-12T08:15:41.397`)
* [CVE-2023-26441](CVE-2023/CVE-2023-264xx/CVE-2023-26441.json) (`2024-01-12T08:15:41.510`)
* [CVE-2023-26442](CVE-2023/CVE-2023-264xx/CVE-2023-26442.json) (`2024-01-12T08:15:41.630`)
* [CVE-2023-26443](CVE-2023/CVE-2023-264xx/CVE-2023-26443.json) (`2024-01-12T08:15:41.757`)
* [CVE-2023-26445](CVE-2023/CVE-2023-264xx/CVE-2023-26445.json) (`2024-01-12T08:15:41.920`)
* [CVE-2023-26446](CVE-2023/CVE-2023-264xx/CVE-2023-26446.json) (`2024-01-12T08:15:42.043`)
* [CVE-2023-26447](CVE-2023/CVE-2023-264xx/CVE-2023-26447.json) (`2024-01-12T08:15:42.157`)
* [CVE-2023-26448](CVE-2023/CVE-2023-264xx/CVE-2023-26448.json) (`2024-01-12T08:15:42.273`)
* [CVE-2023-26449](CVE-2023/CVE-2023-264xx/CVE-2023-26449.json) (`2024-01-12T08:15:42.387`)
* [CVE-2023-26450](CVE-2023/CVE-2023-264xx/CVE-2023-26450.json) (`2024-01-12T08:15:42.500`)
* [CVE-2023-26454](CVE-2023/CVE-2023-264xx/CVE-2023-26454.json) (`2024-01-12T08:15:42.613`)
* [CVE-2023-26455](CVE-2023/CVE-2023-264xx/CVE-2023-26455.json) (`2024-01-12T08:15:42.813`)
* [CVE-2023-26456](CVE-2023/CVE-2023-264xx/CVE-2023-26456.json) (`2024-01-12T08:15:42.977`)
## Download and Usage