code-projects E-Commerce Website 1.0 user_signup.php SQL Injection

Hakika vulnerability da aka rarraba a matsayin kura an gano a code-projects E-Commerce Website 1.0. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil user_signup.php, a cikin sashi $software_component. Wuro manipulation of the argument firstname/middlename/email/address/contact/username ga SQL Injection. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-89. Lalle, rauni an sanar da shi 12/25/2023. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2023-7107. Ngam yiɗi ka a tuma ndiyam ka nder layi. Bayani na fasaha ga. Babu wani exploit da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí a wondi feere. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get best quality of vulnerability data, you may have to visit VulDB.

3 Goyarwa · 84 Datenpunkte

FurɗeSúgá
12/25/2023 15:16
Gargadi 1/2
01/19/2024 09:01
Gargadi 2/2
12/06/2024 21:08
price_0day$0-$5k$0-$5k$0-$5k
software_vendorcode-projectscode-projectscode-projects
software_nameE-Commerce WebsiteE-Commerce WebsiteE-Commerce Website
software_version1.01.01.0
software_fileuser_signup.phpuser_signup.phpuser_signup.php
software_argumentfirstname/middlename/email/address/contact/usernamefirstname/middlename/email/address/contact/usernamefirstname/middlename/email/address/contact/username
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.mdhttps://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.mdhttps://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md
source_cveCVE-2023-7107CVE-2023-7107CVE-2023-7107
cna_responsibleVulDBVulDBVulDB
advisory_date1703458800 (12/25/2023)1703458800 (12/25/2023)1703458800 (12/25/2023)
software_typeE-Commerce Management SoftwareE-Commerce Management SoftwareE-Commerce Management Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_rcURURUR
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlNDNDND
cvss3_vuldb_eXXX
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore7.57.57.5
cvss2_vuldb_tempscore7.17.17.1
cvss3_vuldb_basescore7.37.37.3
cvss3_vuldb_tempscore7.17.17.1
cvss3_meta_basescore7.37.38.1
cvss3_meta_tempscore7.17.18.1
cve_assigned1703458800 (12/25/2023)1703458800 (12/25/2023)
cve_nvd_summaryA vulnerability was found in code-projects E-Commerce Website 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file user_signup.php. The manipulation of the argument firstname/middlename/email/address/contact/username leads to sql injection. The attack may be launched remotely. VDB-249002 is the identifier assigned to this vulnerability.A vulnerability was found in code-projects E-Commerce Website 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file user_signup.php. The manipulation of the argument firstname/middlename/email/address/contact/username leads to sql injection. The attack may be launched remotely. VDB-249002 is the identifier assigned to this vulnerability.
cve_nvd_summaryesSe encontró una vulnerabilidad en code-projects E-Commerce Website 1.0. Ha sido calificada como crítica. Una función desconocida del archivo user_signup.php es afectada por esta vulnerabilidad. La manipulación del argumento nombre/segundo nombre/correo electrónico/dirección/contacto/nombre de usuario conduce a la inyección de SQL. El ataque puede lanzarse de forma remota. VDB-249002 es el identificador asignado a esta vulnerabilidad.
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore7.3
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore9.8
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auN
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore7.5
cvss4_vuldb_avN
cvss4_vuldb_acL
cvss4_vuldb_prN
cvss4_vuldb_uiN
cvss4_vuldb_vcL
cvss4_vuldb_viL
cvss4_vuldb_vaL
cvss4_vuldb_eX
cvss4_vuldb_atN
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss4_vuldb_bscore6.9
cvss4_vuldb_btscore6.9

Might our Artificial Intelligence support you?

Check our Alexa App!