반응형
datetime subject id link
2023-03-09 18:11:47.825166 (SQL injection) CVE-2023-1251 https://cve.report/CVE-2023-1251
2023-03-09 18:11:47.825320 (Code Injection) CVE-2023-27986 https://cve.report/CVE-2023-27986
2023-03-09 18:11:47.825463 (Command Injection) CVE-2023-27985 https://cve.report/CVE-2023-27985
2023-03-09 18:11:47.826240 (SQL injection) CVE-2023-24777 https://cve.report/CVE-2023-24777
2023-03-09 18:11:47.826355 (GitHub, Code Injection) CVE-2023-1283 https://cve.report/CVE-2023-1283
2023-03-09 18:11:47.826639 (SQL injection) CVE-2023-24782 https://cve.report/CVE-2023-24782
2023-03-09 18:11:47.826818 (File Upload) CVE-2023-24282 https://cve.report/CVE-2023-24282
2023-03-09 18:11:47.827172 (Remote Code Execution) CVE-2023-22889 https://cve.report/CVE-2023-22889
2023-03-09 18:11:47.828366 (Remote Code Execution, GitHub, GitHub Enterprise Server) CVE-2023-23760 https://cve.report/CVE-2023-23760
2023-03-09 18:11:47.828524 (PHP) CVE-2023-1278 https://cve.report/CVE-2023-1278
2023-03-09 18:11:47.828682 (Command Injection, Critical) CVE-2023-1277 https://cve.report/CVE-2023-1277
2023-03-09 18:11:47.828947 (PHP, SQL injection, Critical) CVE-2023-1276 https://cve.report/CVE-2023-1276
2023-03-09 18:11:47.829201 (PHP) CVE-2023-1275 https://cve.report/CVE-2023-1275
2023-03-09 18:11:47.829459 (Docker) CVE-2023-27482 https://cve.report/CVE-2023-27482
2023-03-09 18:11:47.829773 (Remote Attack, SQL injection) CVE-2023-26922 https://cve.report/CVE-2023-26922
2023-03-09 18:11:47.829939 (SQL injection) CVE-2023-24773 https://cve.report/CVE-2023-24773
2023-03-09 18:11:47.830133 (XSS) CVE-2023-26952 https://cve.report/CVE-2023-26952
2023-03-09 18:11:47.830244 (Command Injection) CVE-2023-25395 https://cve.report/CVE-2023-25395
2023-03-09 18:11:47.830353 (Command Injection, GitHub) CVE-2023-1270 https://cve.report/CVE-2023-1270
2023-03-09 18:11:47.830477 (XSS) CVE-2023-26950 https://cve.report/CVE-2023-26950
2023-03-09 18:11:47.830601 (SQL injection) CVE-2023-1267 https://cve.report/CVE-2023-1267
2023-03-09 18:11:47.830889 (GitHub) CVE-2023-1269 https://cve.report/CVE-2023-1269
2023-03-09 18:11:47.831023 (PHP, XSS) CVE-2023-24657 https://cve.report/CVE-2023-24657
2023-03-09 18:11:47.831410 (SQL injection) CVE-2023-24780 https://cve.report/CVE-2023-24780
2023-03-09 18:11:47.832442 (GitHub) CVE-2023-1264 https://cve.report/CVE-2023-1264
2023-03-09 18:11:47.832621 (PHP, File Upload) CVE-2023-26823 https://cve.report/CVE-2023-26823
2023-03-09 18:11:47.832849 (WordPress) CVE-2023-1263 https://cve.report/CVE-2023-1263
2023-03-09 18:11:47.833001 (Remote Attack) CVE-2023-1236 https://cve.report/CVE-2023-1236
2023-03-09 18:11:47.833137 (Remote Attack) CVE-2023-1235 https://cve.report/CVE-2023-1235
2023-03-09 18:11:47.833266 (Remote Attack) CVE-2023-1234 https://cve.report/CVE-2023-1234
2023-03-09 18:11:47.833475 (Remote Attack) CVE-2023-1232 https://cve.report/CVE-2023-1232
2023-03-09 18:11:47.833608 (Remote Attack) CVE-2023-1231 https://cve.report/CVE-2023-1231
2023-03-09 18:11:47.833901 (Remote Attack) CVE-2023-1229 https://cve.report/CVE-2023-1229
2023-03-09 18:11:47.834040 (Remote Attack) CVE-2023-1228 https://cve.report/CVE-2023-1228
2023-03-09 18:11:47.834181 (Remote Attack) CVE-2023-1227 https://cve.report/CVE-2023-1227
2023-03-09 18:11:47.834308 (Remote Attack) CVE-2023-1226 https://cve.report/CVE-2023-1226
2023-03-09 18:11:47.834436 (Remote Attack) CVE-2023-1225 https://cve.report/CVE-2023-1225
2023-03-09 18:11:47.834564 (Remote Attack) CVE-2023-1224 https://cve.report/CVE-2023-1224
2023-03-09 18:11:47.834734 (Remote Attack) CVE-2023-1223 https://cve.report/CVE-2023-1223
2023-03-09 18:11:47.834909 (Remote Attack) CVE-2023-1222 https://cve.report/CVE-2023-1222
2023-03-09 18:11:47.835125 (Remote Attack) CVE-2023-1220 https://cve.report/CVE-2023-1220
2023-03-09 18:11:47.835258 (Remote Attack) CVE-2023-1219 https://cve.report/CVE-2023-1219
2023-03-09 18:11:47.835384 (Remote Attack) CVE-2023-1218 https://cve.report/CVE-2023-1218
2023-03-09 20:00:06.312000 (GitHub, XSS) CVE-2023-1286 https://cve.report/CVE-2023-1286
반응형
반응형

안녕하세요. crattack입니다.

제가 가볍게 취약점 분석을 하려고 준비하고 있는 것 중에 하나를 공유하려고 합니다.

 

1. 목적

많은 CVE가 나오고 있습니다. 그 중에 어떤 것들을 봐야할지 어떤 것들이 중요한지를 분류하기란 쉽지 않습니다.

따라서, 저는 앞으로 T(Today)-1 기준으로 다음의 분류 항목에 맞게 CVE와 CVE URL을 제공하려고 합니다.

관심 있는 분들은 이 곳에서 참고하시어 연구하시는데 도움이 되셨으면 합니다.

 

https://www.cve.org/About/Process

2. 공유 양식

[Date] [분류 (Remote Attack, SQL Injection, XSS, Command Injection, Github, Docker, 등등)] [CVE No.] [CVE URL]

추가적인 정보를 원하시면 의견을 주세요.

 

3. 마치며

앞으로 더 좋은 것들을 공유 하도록 노력 하겠습니다.

감사합니다.

반응형

+ Recent posts