CodeZips Project Management System 1.0 /index.php email SQL Injection

Wuro vulnerability wey an yi classify sey kura an gano shi a cikin CodeZips Project Management System 1.0. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /index.php na cikin fayil, $software_component na cikin sashi. Ngam manipulation of the argument email shi SQL Injection. CWE shidin ka a yi bayani matsala sai ya kai CWE-89. Gaskiya, laifi an fitar da shi 12/05/2024. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2024-12231. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $0-$5k. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

2 Goyarwa · 113 Datenpunkte

FurɗeSúgá
12/05/2024 09:49
Gargadi 1/1
02/28/2025 05:35
software_vendorCodeZipsCodeZips
software_nameProject Management SystemProject Management System
software_version1.01.0
software_file/index.php/index.php
software_argumentemailemail
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/SkGoing/CVE-repo_00/issues/3https://github.com/SkGoing/CVE-repo_00/issues/3
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/SkGoing/CVE-repo_00/issues/3https://github.com/SkGoing/CVE-repo_00/issues/3
source_cveCVE-2024-12231CVE-2024-12231
cna_responsibleVulDBVulDB
software_typeProject Management SoftwareProject Management Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auNN
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prNN
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_rlNDND
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore7.57.5
cvss2_vuldb_tempscore6.46.4
cvss3_vuldb_basescore7.37.3
cvss3_vuldb_tempscore6.66.6
cvss3_meta_basescore7.38.1
cvss3_meta_tempscore6.67.9
cvss4_vuldb_bscore6.96.9
cvss4_vuldb_btscore5.55.5
advisory_date1733353200 (12/05/2024)1733353200 (12/05/2024)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability, which was classified as critical, was found in CodeZips Project Management System 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cve_nvd_summaryesSe ha encontrado una vulnerabilidad clasificada como crítica en CodeZips Project Management System 1.0. Afecta a una parte desconocida del archivo /index.php. La manipulación del argumento email provoca una inyección SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse.
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_uiN
cvss4_cna_bscore6.9
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_basescore7.3
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auN
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore7.5
cvss4_cna_avN
cvss4_cna_prN
cvss3_cna_prN
cvss3_cna_aL
cvss3_nvd_sU
cvss3_nvd_basescore9.8

Want to stay up to date on a daily basis?

Enable the mail alert feature now!