{"id":"CVE-2020-23685","details":"SQL Injection vulnerability in 188Jianzhan v2.1.0, allows attackers to execute arbitrary code and gain escalated privileges, via the username parameter to login.php.","modified":"2026-04-11T20:42:41.787553Z","published":"2021-11-02T18:15:08.163Z","references":[{"type":"REPORT","url":"https://github.com/vtime-tech/188Jianzhan/issues/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/vtime-tech/188jianzhan","events":[{"introduced":"0"},{"last_affected":"eb8bf7855b220a36753e8a9bcd941646907684c0"}],"database_specific":{"cpe":"cpe:2.3:a:vtimecn:188jianzhan:2.10:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"2.10"}],"source":"CPE_FIELD"}}],"versions":["v2.10"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-23685.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}