itsourcecode Tailoring Management System 1.0 /expcatedit.php ID Mgbakwunye SQL

CVSS Ntughari oge metaỌnụ ahịa exploit ugbu a (≈)Mkpụrụ obi mmasị CTI
5.7$0-$5k0.00

Nchịkọtaozi

E nyere adịghị ike nke ụdị Pátá na itsourcecode Tailoring Management System 1.0. Nke a metụtara ọrụ amaghi ama nke faịlụ /expcatedit.php. Mmegharị a n'ime arịrịọ ID nwere ike ibute Mgbakwunye SQL. A na-agbaso adịghị ike a site na ID CVE-2024-11589. Enwere ohere ịmalite mwakpo ahụ n'ụzọ dịpụrụ adịpụ. N'ịbụ nke ọzọ, exploit dị. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Nkọwaozi

E nyere adịghị ike nke ụdị Pátá na itsourcecode Tailoring Management System 1.0. Nke a metụtara ọrụ amaghi ama nke faịlụ /expcatedit.php. Mmegharị a n'ime arịrịọ ID nwere ike ibute Mgbakwunye SQL. Ọ bụrụ na ejiri CWE kọwaa nsogbu, ọ ga-eduga na CWE-89. A kọrọ na enyo enyo a e bipụtara. Enyere ndụmọdụ ahụ maka nbudata na github.com.

A na-agbaso adịghị ike a site na ID CVE-2024-11589. Enwere ohere ịmalite mwakpo ahụ n'ụzọ dịpụrụ adịpụ. A na-enweta nkọwa teknụzụ. Ịkpoputa nke adịghị ike a dị n'okpuru nkezi. N'ịbụ nke ọzọ, exploit dị. Ekpughere exploit a n'ihu ọha, enwerekwa ike iji ya. Ahụmahụ ọnụahịa exploit ugbu a ga-abụ ihe dị ka USD $0-$5k. Ọrụ MITRE ATT&CK kwupụtara usoro mwakpo dịka T1505.

A na-akpọ ya Ẹ̀rí Èrò. E nyere exploit ka e budata na github.com.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Ọjaozi

Olupin

Orukọ

Àtúnse

Ìwé àṣẹ

Aaye ayelujara

CPE 2.3ozi

CPE 2.2ozi

CVSSv4ozi

VulDB Vekto: 🔍
VulDB Igbekele: 🔍

CVSSv3ozi

VulDB Ntughari isi nke meta: 6.3
VulDB Ntughari oge meta: 5.7

VulDB Isi nke isi: 6.3
VulDB Ntughari oge: 5.7
VulDB Vekto: 🔍
VulDB Igbekele: 🔍

CVSSv2ozi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
vekitọỊsòroÌmúdájúasiriìfaradàNnweta
ṣíṣíṣíṣíṣíṣí
ṣíṣíṣíṣíṣíṣí
ṣíṣíṣíṣíṣíṣí

VulDB Isi nke isi: 🔍
VulDB Ntughari oge: 🔍
VulDB Igbekele: 🔍

Ịjiozi

Klass: Mgbakwunye SQL
CWE: CWE-89 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍

arabara: Rara
Ime ụlọ: Rara
Nsọtụ: Bẹẹni

Nnweta: 🔍
Mbanye: Ọha
Ipo: Ẹ̀rí Èrò
Gba: 🔍
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Ntụle ọnụahịa: 🔍
Ntụle ọnụahịa ugbu a: 🔍

0-Dayṣíṣíṣíṣí
Taaṣíṣíṣíṣí

Ìmọ̀ nípa ìkìlọ̀ozi

Mmasị: 🔍
Ndị na-eme ihe nkiri na-arụsi ọrụ ike: 🔍
Ọgbakọ APT na-arụsi ọrụ ike: 🔍

igbaradiozi

àbá: enweghị enyemaka a maara
Ipo: 🔍

ọjọ́ 0: 🔍

ahịrị ogeozi

21/11/2024 🔍
21/11/2024 +0 ụbọchị 🔍
21/11/2024 +0 ụbọchị 🔍

Orísunozi

Olupin: itsourcecode.com

Imọran: github.com
Ipo: A kò ṣàlàyé

CVE: CVE-2024-11589 (🔍)
GCVE (CVE): GCVE-0-2024-11589
GCVE (VulDB): GCVE-100-285661
scip Labs: https://www.scip.ch/en/?labs.20161013

nbanyeozi

E kere: 21/11/2024 08:02 AM
Mgbanwe: 21/11/2024 08:02 AM (55)
Zukuru: 🔍
Olùránṣẹ́: ttttt123
Cache ID: 253:DC5:103

fi silẹozi

Anabata

  • fi silẹ #445506: itsourcecode Tailoring Management System Project 1.0 SQL Injection (nípasẹ̀ ttttt123)

Mkparịta ụka

Enweghị okwu nke ọ bụla Asụsụ: ig + en.

Biko banye ka ikwu okwu

Do you need the next level of professionalism?

Upgrade your account now!