mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-01-12T11:00:24.440890+00:00
This commit is contained in:
parent
d1868e17e2
commit
73324ca51e
20
CVE-2023/CVE-2023-300xx/CVE-2023-30014.json
Normal file
20
CVE-2023/CVE-2023-300xx/CVE-2023-30014.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30014",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-12T09:15:43.927",
|
||||
"lastModified": "2024-01-12T09:15:43.927",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-300xx/CVE-2023-30015.json
Normal file
20
CVE-2023/CVE-2023-300xx/CVE-2023-30015.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30015",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-12T09:15:44.040",
|
||||
"lastModified": "2024-01-12T09:15:44.040",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via txtsearch parameter in review_search.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-3.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-300xx/CVE-2023-30016.json
Normal file
20
CVE-2023/CVE-2023-300xx/CVE-2023-30016.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30016",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-12T09:15:44.083",
|
||||
"lastModified": "2024-01-12T09:15:44.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_details_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-489xx/CVE-2023-48909.json
Normal file
24
CVE-2023/CVE-2023-489xx/CVE-2023-48909.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-48909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-12T09:15:44.133",
|
||||
"lastModified": "2024-01-12T09:15:44.133",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Dollhouse-18/288b4774bc296722c9e3c60bafa392bf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Dollhouse-18/jave-core-Command-execution-vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
48
README.md
48
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-01-12T09:00:24.398886+00:00
|
||||
2024-01-12T11:00:24.440890+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-01-12T08:15:43.920000+00:00
|
||||
2024-01-12T09:15:44.133000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,53 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
235734
|
||||
235738
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-34061](CVE-2023/CVE-2023-340xx/CVE-2023-34061.json) (`2024-01-12T07:15:11.747`)
|
||||
* [CVE-2023-37117](CVE-2023/CVE-2023-371xx/CVE-2023-37117.json) (`2024-01-12T07:15:12.077`)
|
||||
* [CVE-2023-31211](CVE-2023/CVE-2023-312xx/CVE-2023-31211.json) (`2024-01-12T08:15:43.137`)
|
||||
* [CVE-2023-40362](CVE-2023/CVE-2023-403xx/CVE-2023-40362.json) (`2024-01-12T08:15:43.467`)
|
||||
* [CVE-2023-50919](CVE-2023/CVE-2023-509xx/CVE-2023-50919.json) (`2024-01-12T08:15:43.533`)
|
||||
* [CVE-2023-50920](CVE-2023/CVE-2023-509xx/CVE-2023-50920.json) (`2024-01-12T08:15:43.590`)
|
||||
* [CVE-2023-6735](CVE-2023/CVE-2023-67xx/CVE-2023-6735.json) (`2024-01-12T08:15:43.650`)
|
||||
* [CVE-2023-6740](CVE-2023/CVE-2023-67xx/CVE-2023-6740.json) (`2024-01-12T08:15:43.920`)
|
||||
* [CVE-2024-22027](CVE-2024/CVE-2024-220xx/CVE-2024-22027.json) (`2024-01-12T07:15:12.243`)
|
||||
* [CVE-2023-30014](CVE-2023/CVE-2023-300xx/CVE-2023-30014.json) (`2024-01-12T09:15:43.927`)
|
||||
* [CVE-2023-30015](CVE-2023/CVE-2023-300xx/CVE-2023-30015.json) (`2024-01-12T09:15:44.040`)
|
||||
* [CVE-2023-30016](CVE-2023/CVE-2023-300xx/CVE-2023-30016.json) (`2024-01-12T09:15:44.083`)
|
||||
* [CVE-2023-48909](CVE-2023/CVE-2023-489xx/CVE-2023-48909.json) (`2024-01-12T09:15:44.133`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `39`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-26427](CVE-2023/CVE-2023-264xx/CVE-2023-26427.json) (`2024-01-12T08:15:39.610`)
|
||||
* [CVE-2023-26428](CVE-2023/CVE-2023-264xx/CVE-2023-26428.json) (`2024-01-12T08:15:39.950`)
|
||||
* [CVE-2023-26429](CVE-2023/CVE-2023-264xx/CVE-2023-26429.json) (`2024-01-12T08:15:40.080`)
|
||||
* [CVE-2023-26430](CVE-2023/CVE-2023-264xx/CVE-2023-26430.json) (`2024-01-12T08:15:40.210`)
|
||||
* [CVE-2023-26431](CVE-2023/CVE-2023-264xx/CVE-2023-26431.json) (`2024-01-12T08:15:40.353`)
|
||||
* [CVE-2023-26432](CVE-2023/CVE-2023-264xx/CVE-2023-26432.json) (`2024-01-12T08:15:40.477`)
|
||||
* [CVE-2023-26433](CVE-2023/CVE-2023-264xx/CVE-2023-26433.json) (`2024-01-12T08:15:40.610`)
|
||||
* [CVE-2023-26434](CVE-2023/CVE-2023-264xx/CVE-2023-26434.json) (`2024-01-12T08:15:40.737`)
|
||||
* [CVE-2023-26435](CVE-2023/CVE-2023-264xx/CVE-2023-26435.json) (`2024-01-12T08:15:40.867`)
|
||||
* [CVE-2023-26436](CVE-2023/CVE-2023-264xx/CVE-2023-26436.json) (`2024-01-12T08:15:41.010`)
|
||||
* [CVE-2023-26438](CVE-2023/CVE-2023-264xx/CVE-2023-26438.json) (`2024-01-12T08:15:41.150`)
|
||||
* [CVE-2023-26439](CVE-2023/CVE-2023-264xx/CVE-2023-26439.json) (`2024-01-12T08:15:41.267`)
|
||||
* [CVE-2023-26440](CVE-2023/CVE-2023-264xx/CVE-2023-26440.json) (`2024-01-12T08:15:41.397`)
|
||||
* [CVE-2023-26441](CVE-2023/CVE-2023-264xx/CVE-2023-26441.json) (`2024-01-12T08:15:41.510`)
|
||||
* [CVE-2023-26442](CVE-2023/CVE-2023-264xx/CVE-2023-26442.json) (`2024-01-12T08:15:41.630`)
|
||||
* [CVE-2023-26443](CVE-2023/CVE-2023-264xx/CVE-2023-26443.json) (`2024-01-12T08:15:41.757`)
|
||||
* [CVE-2023-26445](CVE-2023/CVE-2023-264xx/CVE-2023-26445.json) (`2024-01-12T08:15:41.920`)
|
||||
* [CVE-2023-26446](CVE-2023/CVE-2023-264xx/CVE-2023-26446.json) (`2024-01-12T08:15:42.043`)
|
||||
* [CVE-2023-26447](CVE-2023/CVE-2023-264xx/CVE-2023-26447.json) (`2024-01-12T08:15:42.157`)
|
||||
* [CVE-2023-26448](CVE-2023/CVE-2023-264xx/CVE-2023-26448.json) (`2024-01-12T08:15:42.273`)
|
||||
* [CVE-2023-26449](CVE-2023/CVE-2023-264xx/CVE-2023-26449.json) (`2024-01-12T08:15:42.387`)
|
||||
* [CVE-2023-26450](CVE-2023/CVE-2023-264xx/CVE-2023-26450.json) (`2024-01-12T08:15:42.500`)
|
||||
* [CVE-2023-26454](CVE-2023/CVE-2023-264xx/CVE-2023-26454.json) (`2024-01-12T08:15:42.613`)
|
||||
* [CVE-2023-26455](CVE-2023/CVE-2023-264xx/CVE-2023-26455.json) (`2024-01-12T08:15:42.813`)
|
||||
* [CVE-2023-26456](CVE-2023/CVE-2023-264xx/CVE-2023-26456.json) (`2024-01-12T08:15:42.977`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user