diff --git a/advisories/github-reviewed/2024/12/GHSA-xx95-62h6-h7v3/GHSA-xx95-62h6-h7v3.json b/advisories/github-reviewed/2024/12/GHSA-xx95-62h6-h7v3/GHSA-xx95-62h6-h7v3.json index 1d7a86b7caefc..13579d046dc7e 100644 --- a/advisories/github-reviewed/2024/12/GHSA-xx95-62h6-h7v3/GHSA-xx95-62h6-h7v3.json +++ b/advisories/github-reviewed/2024/12/GHSA-xx95-62h6-h7v3/GHSA-xx95-62h6-h7v3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xx95-62h6-h7v3", - "modified": "2024-12-26T20:20:12Z", + "modified": "2024-12-27T00:32:07Z", "published": "2024-12-26T20:20:12Z", "aliases": [ "CVE-2024-56361" @@ -51,6 +51,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-12-26T20:20:12Z", - "nvd_published_at": null + "nvd_published_at": "2024-12-26T22:15:19Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2024/12/GHSA-q4g3-whqh-fjpj/GHSA-q4g3-whqh-fjpj.json b/advisories/unreviewed/2024/12/GHSA-q4g3-whqh-fjpj/GHSA-q4g3-whqh-fjpj.json new file mode 100644 index 0000000000000..9a02857e08dd7 --- /dev/null +++ b/advisories/unreviewed/2024/12/GHSA-q4g3-whqh-fjpj/GHSA-q4g3-whqh-fjpj.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q4g3-whqh-fjpj", + "modified": "2024-12-27T00:31:35Z", + "published": "2024-12-27T00:31:35Z", + "aliases": [ + "CVE-2024-12969" + ], + "details": "A vulnerability, which was classified as critical, has been found in code-projects Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12969" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://github.com/Rocky-Bull/myCVE/blob/main/Hospital_Management_System_SQLi.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.289334" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.289334" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.469031" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-12-26T23:15:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/12/GHSA-vrrp-w75r-jcwx/GHSA-vrrp-w75r-jcwx.json b/advisories/unreviewed/2024/12/GHSA-vrrp-w75r-jcwx/GHSA-vrrp-w75r-jcwx.json new file mode 100644 index 0000000000000..f3391b2cf3fa5 --- /dev/null +++ b/advisories/unreviewed/2024/12/GHSA-vrrp-w75r-jcwx/GHSA-vrrp-w75r-jcwx.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vrrp-w75r-jcwx", + "modified": "2024-12-27T00:31:35Z", + "published": "2024-12-27T00:31:35Z", + "aliases": [ + "CVE-2024-12968" + ], + "details": "A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. Affected by this vulnerability is the function edit_jobpost of the file /_parse/_all_edits.php. The manipulation of the argument jobtype leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12968" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://github.com/705298066/cve/blob/main/sql-1-kzk.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.289333" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.289333" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.469021" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-12-26T22:15:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2024/12/GHSA-wxfc-6jrp-h7jx/GHSA-wxfc-6jrp-h7jx.json b/advisories/unreviewed/2024/12/GHSA-wxfc-6jrp-h7jx/GHSA-wxfc-6jrp-h7jx.json new file mode 100644 index 0000000000000..9f54ad8bbb215 --- /dev/null +++ b/advisories/unreviewed/2024/12/GHSA-wxfc-6jrp-h7jx/GHSA-wxfc-6jrp-h7jx.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wxfc-6jrp-h7jx", + "modified": "2024-12-27T00:31:33Z", + "published": "2024-12-27T00:31:33Z", + "aliases": [ + "CVE-2024-12967" + ], + "details": "A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. Affected is the function fln_update of the file /_parse/_all_edits.php. The manipulation of the argument fname/lname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12967" + }, + { + "type": "WEB", + "url": "https://code-projects.org" + }, + { + "type": "WEB", + "url": "https://github.com/glqt/CVE/blob/main/sql-glqt.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.289332" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.289332" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.469002" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2024-12-26T22:15:09Z" + } +} \ No newline at end of file