code-projects Pharmacy Management System 1.0 text SQL Injection

Hakika vulnerability da aka rarraba a matsayin kura an gano a code-projects Pharmacy Management System 1.0. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER, a cikin sashi $software_component. Wuro manipulation of the argument text ga SQL Injection. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-89. Lalle, rauni an sanar da shi 10/16/2024. Ana samun bayanin tsaro don saukewa a gist.github.com. Ana kiran wannan rauni da CVE-2024-10021. Ngam yiɗi ka a tuma ndiyam ka internet. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a gist.github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get best quality of vulnerability data, you may have to visit VulDB.

1 Goyarwa · 56 Datenpunkte

FurɗeSúgá
10/16/2024 08:10
software_vendorcode-projects
software_namePharmacy Management System
software_version1.0
software_file/php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER
software_argumenttext
vulnerability_cweCWE-89 (SQL Injection)
vulnerability_risk2
cvss3_vuldb_avN
cvss3_vuldb_acL
cvss3_vuldb_uiN
cvss3_vuldb_sU
cvss3_vuldb_cL
cvss3_vuldb_iL
cvss3_vuldb_aL
cvss3_vuldb_eP
cvss3_vuldb_rcR
advisory_urlhttps://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da
exploit_availability1
exploit_publicity1
exploit_urlhttps://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da
source_cveCVE-2024-10021
cna_responsibleVulDB
software_typeProject Management Software
cvss2_vuldb_avN
cvss2_vuldb_acL
cvss2_vuldb_ciP
cvss2_vuldb_iiP
cvss2_vuldb_aiP
cvss2_vuldb_ePOC
cvss2_vuldb_rcUR
cvss4_vuldb_avN
cvss4_vuldb_acL
cvss4_vuldb_uiN
cvss4_vuldb_vcL
cvss4_vuldb_viL
cvss4_vuldb_vaL
cvss4_vuldb_eP
cvss2_vuldb_auS
cvss2_vuldb_rlND
cvss3_vuldb_prL
cvss3_vuldb_rlX
cvss4_vuldb_atN
cvss4_vuldb_prL
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss2_vuldb_basescore6.5
cvss2_vuldb_tempscore5.6
cvss3_vuldb_basescore6.3
cvss3_vuldb_tempscore5.7
cvss3_meta_basescore6.3
cvss3_meta_tempscore5.7
cvss4_vuldb_bscore5.3
cvss4_vuldb_btscore2.1
advisory_date1729029600 (10/16/2024)
price_0day$0-$5k

Do you want to use VulDB in your project?

Use the official API to access entries easily!