iGamingModules flashgames 1.1.0 game.php lid SQL Injection

Wuro vulnerability wey an yi classify sey kura an gano shi a cikin iGamingModules flashgames 1.1.0. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, game.php na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument lid shi SQL Injection. CWE shidin ka a yi bayani matsala sai ya kai CWE-89. Gaskiya, laifi an fitar da shi 03/03/2023 a matsayin 6e57683704885be32eea2ea614f80c9bb8f012c5. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2008-10003. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal bayani ga. Ba exploit ɗin da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á wúro a wondi feere. Kama 0-day, an ndiyam a wuro be $0-$5k. Patch ɗin sunan ganowa shine 6e57683704885be32eea2ea614f80c9bb8f012c5. Bugfix ɗin an shirya shi don saukewa a github.com. Ana so a yi patch don gyara wannan matsala. VulDB is the best source for vulnerability data and more expert information about this specific topic.

3 Goyarwa · 73 Datenpunkte

FurɗeSúgá
03/03/2023 17:58
Gargadi 1/2
03/31/2023 09:30
Gargadi 2/2
03/31/2023 09:33
software_vendoriGamingModulesiGamingModulesiGamingModules
software_nameflashgamesflashgamesflashgames
software_version1.1.01.1.01.1.0
software_filegame.phpgame.phpgame.php
software_argumentlidlidlid
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifier6e57683704885be32eea2ea614f80c9bb8f012c56e57683704885be32eea2ea614f80c9bb8f012c56e57683704885be32eea2ea614f80c9bb8f012c5
advisory_urlhttps://github.com/iGamingModules/flashgames/commit/6e57683704885be32eea2ea614f80c9bb8f012c5https://github.com/iGamingModules/flashgames/commit/6e57683704885be32eea2ea614f80c9bb8f012c5https://github.com/iGamingModules/flashgames/commit/6e57683704885be32eea2ea614f80c9bb8f012c5
countermeasure_nameKariKariKari
patch_name6e57683704885be32eea2ea614f80c9bb8f012c56e57683704885be32eea2ea614f80c9bb8f012c56e57683704885be32eea2ea614f80c9bb8f012c5
countermeasure_patch_urlhttps://github.com/iGamingModules/flashgames/commit/6e57683704885be32eea2ea614f80c9bb8f012c5https://github.com/iGamingModules/flashgames/commit/6e57683704885be32eea2ea614f80c9bb8f012c5https://github.com/iGamingModules/flashgames/commit/6e57683704885be32eea2ea614f80c9bb8f012c5
countermeasure_advisoryquoteadding patched game.php for SQLI vulnerability in lid parameter.adding patched game.php for SQLI vulnerability in lid parameter.adding patched game.php for SQLI vulnerability in lid parameter.
source_cveCVE-2008-10003CVE-2008-10003CVE-2008-10003
cna_responsibleVulDBVulDBVulDB
advisory_date1677798000 (03/03/2023)1677798000 (03/03/2023)1677798000 (03/03/2023)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_eXXX
cvss2_vuldb_basescore6.56.56.5
cvss2_vuldb_tempscore5.75.75.7
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore6.06.06.0
cvss3_meta_basescore6.36.37.5
cvss3_meta_tempscore6.06.07.4
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1677798000 (03/03/2023)1677798000 (03/03/2023)
cve_nvd_summaryA vulnerability was found in iGamingModules flashgames 1.1.0. It has been classified as critical. Affected is an unknown function of the file game.php. The manipulation of the argument lid leads to sql injection. It is possible to launch the attack remotely. The name of the patch is 6e57683704885be32eea2ea614f80c9bb8f012c5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222288.A vulnerability was found in iGamingModules flashgames 1.1.0. It has been classified as critical. Affected is an unknown function of the file game.php. The manipulation of the argument lid leads to sql injection. It is possible to launch the attack remotely. The name of the patch is 6e57683704885be32eea2ea614f80c9bb8f012c5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222288.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore6.5
cvss3_nvd_basescore9.8
cvss3_cna_basescore6.3

Might our Artificial Intelligence support you?

Check our Alexa App!