Auto-Update: 2024-03-05T17:00:27.092116+00:00

This commit is contained in:
cad-safe-bot 2024-03-05 17:00:30 +00:00
parent 8fe54b4582
commit 84933a5016
3 changed files with 55 additions and 36 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-46088",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T16:15:49.190",
"lastModified": "2024-03-05T16:15:49.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Online Flight Booking Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the feedback form."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2022-46088/blob/main/CVE-36",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-24098",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T16:15:49.290",
"lastModified": "2024-03-05T16:15:49.290",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection via the News Feed."
}
],
"metrics": {},
"references": [
{
"url": "https://code-projects.org/scholars-tracking-system-in-php-with-source-code/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ASR511-OO7/CVE-2024-24098/blob/main/CVE-13",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-05T15:01:09.291630+00:00
2024-03-05T17:00:27.092116+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-05T14:27:46.090000+00:00
2024-03-05T16:15:49.290000+00:00
```
### Last Data Feed Release
@ -29,50 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
240564
240566
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `2`
* [CVE-2023-7103](CVE-2023/CVE-2023-71xx/CVE-2023-7103.json) (`2024-03-05T13:15:06.940`)
* [CVE-2024-2188](CVE-2024/CVE-2024-21xx/CVE-2024-2188.json) (`2024-03-05T13:15:07.203`)
* [CVE-2024-27622](CVE-2024/CVE-2024-276xx/CVE-2024-27622.json) (`2024-03-05T14:15:49.030`)
* [CVE-2024-27623](CVE-2024/CVE-2024-276xx/CVE-2024-27623.json) (`2024-03-05T14:15:49.117`)
* [CVE-2024-27625](CVE-2024/CVE-2024-276xx/CVE-2024-27625.json) (`2024-03-05T14:15:49.160`)
* [CVE-2024-27627](CVE-2024/CVE-2024-276xx/CVE-2024-27627.json) (`2024-03-05T14:15:49.210`)
* [CVE-2022-46088](CVE-2022/CVE-2022-460xx/CVE-2022-46088.json) (`2024-03-05T16:15:49.190`)
* [CVE-2024-24098](CVE-2024/CVE-2024-240xx/CVE-2024-24098.json) (`2024-03-05T16:15:49.290`)
### CVEs modified in the last Commit
Recently modified CVEs: `104`
Recently modified CVEs: `0`
* [CVE-2024-1731](CVE-2024/CVE-2024-17xx/CVE-2024-1731.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-1769](CVE-2024/CVE-2024-17xx/CVE-2024-1769.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-1782](CVE-2024/CVE-2024-17xx/CVE-2024-1782.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-22188](CVE-2024/CVE-2024-221xx/CVE-2024-22188.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-21815](CVE-2024/CVE-2024-218xx/CVE-2024-21815.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-21838](CVE-2024/CVE-2024-218xx/CVE-2024-21838.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-22383](CVE-2024/CVE-2024-223xx/CVE-2024-22383.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20829](CVE-2024/CVE-2024-208xx/CVE-2024-20829.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20830](CVE-2024/CVE-2024-208xx/CVE-2024-20830.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20831](CVE-2024/CVE-2024-208xx/CVE-2024-20831.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20832](CVE-2024/CVE-2024-208xx/CVE-2024-20832.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20834](CVE-2024/CVE-2024-208xx/CVE-2024-20834.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20835](CVE-2024/CVE-2024-208xx/CVE-2024-20835.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20836](CVE-2024/CVE-2024-208xx/CVE-2024-20836.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20837](CVE-2024/CVE-2024-208xx/CVE-2024-20837.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20838](CVE-2024/CVE-2024-208xx/CVE-2024-20838.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20839](CVE-2024/CVE-2024-208xx/CVE-2024-20839.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20840](CVE-2024/CVE-2024-208xx/CVE-2024-20840.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20841](CVE-2024/CVE-2024-208xx/CVE-2024-20841.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-20833](CVE-2024/CVE-2024-208xx/CVE-2024-20833.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-26333](CVE-2024/CVE-2024-263xx/CVE-2024-26333.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-26334](CVE-2024/CVE-2024-263xx/CVE-2024-26334.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-26335](CVE-2024/CVE-2024-263xx/CVE-2024-26335.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-26337](CVE-2024/CVE-2024-263xx/CVE-2024-26337.json) (`2024-03-05T13:41:01.900`)
* [CVE-2024-26339](CVE-2024/CVE-2024-263xx/CVE-2024-26339.json) (`2024-03-05T13:41:01.900`)
## Download and Usage