From 73324ca51e9a52dac71b8d735e79f832722eb477 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 12 Jan 2024 11:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-01-12T11:00:24.440890+00:00 --- CVE-2023/CVE-2023-300xx/CVE-2023-30014.json | 20 +++++++++ CVE-2023/CVE-2023-300xx/CVE-2023-30015.json | 20 +++++++++ CVE-2023/CVE-2023-300xx/CVE-2023-30016.json | 20 +++++++++ CVE-2023/CVE-2023-489xx/CVE-2023-48909.json | 24 +++++++++++ README.md | 48 ++++----------------- 5 files changed, 93 insertions(+), 39 deletions(-) create mode 100644 CVE-2023/CVE-2023-300xx/CVE-2023-30014.json create mode 100644 CVE-2023/CVE-2023-300xx/CVE-2023-30015.json create mode 100644 CVE-2023/CVE-2023-300xx/CVE-2023-30016.json create mode 100644 CVE-2023/CVE-2023-489xx/CVE-2023-48909.json diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30014.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30014.json new file mode 100644 index 00000000000..a9a4cb5f8b3 --- /dev/null +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30014.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30014", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-12T09:15:43.927", + "lastModified": "2024-01-12T09:15:43.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30015.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30015.json new file mode 100644 index 00000000000..35607f871b3 --- /dev/null +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30015.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30015", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-12T09:15:44.040", + "lastModified": "2024-01-12T09:15:44.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via txtsearch parameter in review_search.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-3.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30016.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30016.json new file mode 100644 index 00000000000..3c37c2f16eb --- /dev/null +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30016.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-30016", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-12T09:15:44.083", + "lastModified": "2024-01-12T09:15:44.083", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_details_edit.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48909.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48909.json new file mode 100644 index 00000000000..3b9b8a0ca3e --- /dev/null +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48909.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-48909", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-12T09:15:44.133", + "lastModified": "2024-01-12T09:15:44.133", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Dollhouse-18/288b4774bc296722c9e3c60bafa392bf", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dollhouse-18/jave-core-Command-execution-vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 4f0ce978e7c..8327b8d8b0e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-12T09:00:24.398886+00:00 +2024-01-12T11:00:24.440890+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-12T08:15:43.920000+00:00 +2024-01-12T09:15:44.133000+00:00 ``` ### Last Data Feed Release @@ -29,53 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -235734 +235738 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `4` -* [CVE-2023-34061](CVE-2023/CVE-2023-340xx/CVE-2023-34061.json) (`2024-01-12T07:15:11.747`) -* [CVE-2023-37117](CVE-2023/CVE-2023-371xx/CVE-2023-37117.json) (`2024-01-12T07:15:12.077`) -* [CVE-2023-31211](CVE-2023/CVE-2023-312xx/CVE-2023-31211.json) (`2024-01-12T08:15:43.137`) -* [CVE-2023-40362](CVE-2023/CVE-2023-403xx/CVE-2023-40362.json) (`2024-01-12T08:15:43.467`) -* [CVE-2023-50919](CVE-2023/CVE-2023-509xx/CVE-2023-50919.json) (`2024-01-12T08:15:43.533`) -* [CVE-2023-50920](CVE-2023/CVE-2023-509xx/CVE-2023-50920.json) (`2024-01-12T08:15:43.590`) -* [CVE-2023-6735](CVE-2023/CVE-2023-67xx/CVE-2023-6735.json) (`2024-01-12T08:15:43.650`) -* [CVE-2023-6740](CVE-2023/CVE-2023-67xx/CVE-2023-6740.json) (`2024-01-12T08:15:43.920`) -* [CVE-2024-22027](CVE-2024/CVE-2024-220xx/CVE-2024-22027.json) (`2024-01-12T07:15:12.243`) +* [CVE-2023-30014](CVE-2023/CVE-2023-300xx/CVE-2023-30014.json) (`2024-01-12T09:15:43.927`) +* [CVE-2023-30015](CVE-2023/CVE-2023-300xx/CVE-2023-30015.json) (`2024-01-12T09:15:44.040`) +* [CVE-2023-30016](CVE-2023/CVE-2023-300xx/CVE-2023-30016.json) (`2024-01-12T09:15:44.083`) +* [CVE-2023-48909](CVE-2023/CVE-2023-489xx/CVE-2023-48909.json) (`2024-01-12T09:15:44.133`) ### CVEs modified in the last Commit -Recently modified CVEs: `39` +Recently modified CVEs: `0` -* [CVE-2023-26427](CVE-2023/CVE-2023-264xx/CVE-2023-26427.json) (`2024-01-12T08:15:39.610`) -* [CVE-2023-26428](CVE-2023/CVE-2023-264xx/CVE-2023-26428.json) (`2024-01-12T08:15:39.950`) -* [CVE-2023-26429](CVE-2023/CVE-2023-264xx/CVE-2023-26429.json) (`2024-01-12T08:15:40.080`) -* [CVE-2023-26430](CVE-2023/CVE-2023-264xx/CVE-2023-26430.json) (`2024-01-12T08:15:40.210`) -* [CVE-2023-26431](CVE-2023/CVE-2023-264xx/CVE-2023-26431.json) (`2024-01-12T08:15:40.353`) -* [CVE-2023-26432](CVE-2023/CVE-2023-264xx/CVE-2023-26432.json) (`2024-01-12T08:15:40.477`) -* [CVE-2023-26433](CVE-2023/CVE-2023-264xx/CVE-2023-26433.json) (`2024-01-12T08:15:40.610`) -* [CVE-2023-26434](CVE-2023/CVE-2023-264xx/CVE-2023-26434.json) (`2024-01-12T08:15:40.737`) -* [CVE-2023-26435](CVE-2023/CVE-2023-264xx/CVE-2023-26435.json) (`2024-01-12T08:15:40.867`) -* [CVE-2023-26436](CVE-2023/CVE-2023-264xx/CVE-2023-26436.json) (`2024-01-12T08:15:41.010`) -* [CVE-2023-26438](CVE-2023/CVE-2023-264xx/CVE-2023-26438.json) (`2024-01-12T08:15:41.150`) -* [CVE-2023-26439](CVE-2023/CVE-2023-264xx/CVE-2023-26439.json) (`2024-01-12T08:15:41.267`) -* [CVE-2023-26440](CVE-2023/CVE-2023-264xx/CVE-2023-26440.json) (`2024-01-12T08:15:41.397`) -* [CVE-2023-26441](CVE-2023/CVE-2023-264xx/CVE-2023-26441.json) (`2024-01-12T08:15:41.510`) -* [CVE-2023-26442](CVE-2023/CVE-2023-264xx/CVE-2023-26442.json) (`2024-01-12T08:15:41.630`) -* [CVE-2023-26443](CVE-2023/CVE-2023-264xx/CVE-2023-26443.json) (`2024-01-12T08:15:41.757`) -* [CVE-2023-26445](CVE-2023/CVE-2023-264xx/CVE-2023-26445.json) (`2024-01-12T08:15:41.920`) -* [CVE-2023-26446](CVE-2023/CVE-2023-264xx/CVE-2023-26446.json) (`2024-01-12T08:15:42.043`) -* [CVE-2023-26447](CVE-2023/CVE-2023-264xx/CVE-2023-26447.json) (`2024-01-12T08:15:42.157`) -* [CVE-2023-26448](CVE-2023/CVE-2023-264xx/CVE-2023-26448.json) (`2024-01-12T08:15:42.273`) -* [CVE-2023-26449](CVE-2023/CVE-2023-264xx/CVE-2023-26449.json) (`2024-01-12T08:15:42.387`) -* [CVE-2023-26450](CVE-2023/CVE-2023-264xx/CVE-2023-26450.json) (`2024-01-12T08:15:42.500`) -* [CVE-2023-26454](CVE-2023/CVE-2023-264xx/CVE-2023-26454.json) (`2024-01-12T08:15:42.613`) -* [CVE-2023-26455](CVE-2023/CVE-2023-264xx/CVE-2023-26455.json) (`2024-01-12T08:15:42.813`) -* [CVE-2023-26456](CVE-2023/CVE-2023-264xx/CVE-2023-26456.json) (`2024-01-12T08:15:42.977`) ## Download and Usage