Skip to content

Commit

Permalink
Publish Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Dec 27, 2024
1 parent 0a86226 commit 2fdc38f
Show file tree
Hide file tree
Showing 4 changed files with 170 additions and 2 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
"schema_version": "1.4.0",
"id": "GHSA-xx95-62h6-h7v3",
"modified": "2024-12-26T20:20:12Z",
"modified": "2024-12-27T00:32:07Z",
"published": "2024-12-26T20:20:12Z",
"aliases": [
"CVE-2024-56361"
Expand Down Expand Up @@ -51,6 +51,6 @@
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-12-26T20:20:12Z",
"nvd_published_at": null
"nvd_published_at": "2024-12-26T22:15:19Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
{
"schema_version": "1.4.0",
"id": "GHSA-q4g3-whqh-fjpj",
"modified": "2024-12-27T00:31:35Z",
"published": "2024-12-27T00:31:35Z",
"aliases": [
"CVE-2024-12969"
],
"details": "A vulnerability, which was classified as critical, has been found in code-projects Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12969"
},
{
"type": "WEB",
"url": "https://code-projects.org"
},
{
"type": "WEB",
"url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_SQLi.md"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.289334"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.289334"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.469031"
}
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-26T23:15:05Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vrrp-w75r-jcwx",
"modified": "2024-12-27T00:31:35Z",
"published": "2024-12-27T00:31:35Z",
"aliases": [
"CVE-2024-12968"
],
"details": "A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. Affected by this vulnerability is the function edit_jobpost of the file /_parse/_all_edits.php. The manipulation of the argument jobtype leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12968"
},
{
"type": "WEB",
"url": "https://code-projects.org"
},
{
"type": "WEB",
"url": "https://github.com/705298066/cve/blob/main/sql-1-kzk.md"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.289333"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.289333"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.469021"
}
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-26T22:15:11Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
{
"schema_version": "1.4.0",
"id": "GHSA-wxfc-6jrp-h7jx",
"modified": "2024-12-27T00:31:33Z",
"published": "2024-12-27T00:31:33Z",
"aliases": [
"CVE-2024-12967"
],
"details": "A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. Affected is the function fln_update of the file /_parse/_all_edits.php. The manipulation of the argument fname/lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12967"
},
{
"type": "WEB",
"url": "https://code-projects.org"
},
{
"type": "WEB",
"url": "https://github.com/glqt/CVE/blob/main/sql-glqt.md"
},
{
"type": "WEB",
"url": "https://vuldb.com/?ctiid.289332"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.289332"
},
{
"type": "WEB",
"url": "https://vuldb.com/?submit.469002"
}
],
"database_specific": {
"cwe_ids": [
"CWE-74"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-12-26T22:15:09Z"
}
}

0 comments on commit 2fdc38f

Please sign in to comment.