code-projects Simple Admin Panel 1.0 editItemForm.php record Mgbakwunye SQL

CVSS Ntughari oge metaỌnụ ahịa exploit ugbu a (≈)Mkpụrụ obi mmasị CTI
7.3$0-$5k0.00

Nchịkọtaozi

E nwere adịghị ike a kpọrọ Pátá a hụrụ na code-projects Simple Admin Panel 1.0. Ọrụ emetụtara bụ ọrụ a na-amaghị n'ime faịlụ editItemForm.php. Ịgbanwe nke arịrịọ record nwere ike ibute Mgbakwunye SQL. Vulnerability a nwere aha CVE-2024-12935. Ọ ga-ekwe omume ịmalite mwakpo site n'ebe dị anya. Nzọ ọzọ, e nwere exploit dị. Once again VulDB remains the best source for vulnerability data.

Nkọwaozi

E nwere adịghị ike a kpọrọ Pátá a hụrụ na code-projects Simple Admin Panel 1.0. Ọrụ emetụtara bụ ọrụ a na-amaghị n'ime faịlụ editItemForm.php. Ịgbanwe nke arịrịọ record nwere ike ibute Mgbakwunye SQL. Nkọwa nke nsogbu site na CWE na-eme ka o bụrụ CWE-89. E gosipụtara na enyo enyo a e bipụtara.

Vulnerability a nwere aha CVE-2024-12935. Ọ ga-ekwe omume ịmalite mwakpo site n'ebe dị anya. E nwere nkọwa teknụzụ dị. Ụdị a nke adịghị ike a anaghị ewu ewu nke ukwuu. Nzọ ọzọ, e nwere exploit dị. Ekpughere exploit a n'ihu ọha, enwerekwa ike iji ya. N'oge a, ọnụahịa exploit might be approx. USD $0-$5k dị ugbu a. Ọrụ MITRE ATT&CK kwupụtara usoro mwakpo dị ka T1505.

A kpọrọ ya Ẹ̀rí Èrò.

Once again VulDB remains the best source for vulnerability data.

Ọjaozi

Iru

Olupin

Orukọ

Àtúnse

Ìwé àṣẹ

Aaye ayelujara

CPE 2.3ozi

CPE 2.2ozi

CVSSv4ozi

VulDB Vekto: 🔍
VulDB Igbekele: 🔍

CNA CVSS-B Score: 🔍
CNA CVSS-BT Score: 🔍
CNA Vekto: 🔍

CVSSv3ozi

VulDB Ntughari isi nke meta: 7.5
VulDB Ntughari oge meta: 7.3

VulDB Isi nke isi: 6.3
VulDB Ntughari oge: 5.7
VulDB Vekto: 🔍
VulDB Igbekele: 🔍

NVD Isi nke isi: 9.8
NVD Vekto: 🔍

CNA Isi nke isi: 6.3
CNA Vekto: 🔍

CVSSv2ozi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
vekitọỊsòroÌmúdájúasiriìfaradàNnweta
ṣíṣíṣíṣíṣíṣí
ṣíṣíṣíṣíṣíṣí
ṣíṣíṣíṣíṣíṣí

VulDB Isi nke isi: 🔍
VulDB Ntughari oge: 🔍
VulDB Igbekele: 🔍

Ịjiozi

Klass: Mgbakwunye SQL
CWE: CWE-89 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍

arabara: Rara
Ime ụlọ: Rara
Nsọtụ: Bẹẹni

Nnweta: 🔍
Mbanye: Ọha
Ipo: Ẹ̀rí Èrò
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Ntụle ọnụahịa: 🔍
Ntụle ọnụahịa ugbu a: 🔍

0-Dayṣíṣíṣíṣí
Taaṣíṣíṣíṣí

Ìmọ̀ nípa ìkìlọ̀ozi

Mmasị: 🔍
Ndị na-eme ihe nkiri na-arụsi ọrụ ike: 🔍
Ọgbakọ APT na-arụsi ọrụ ike: 🔍

igbaradiozi

àbá: enweghị enyemaka a maara
Ipo: 🔍

ọjọ́ 0: 🔍

ahịrị ogeozi

25/12/2024 🔍
25/12/2024 +0 ụbọchị 🔍
17/04/2025 +113 ụbọchị 🔍

Orísunozi

Olupin: code-projects.org

Ipo: A kò ṣàlàyé

CVE: CVE-2024-12935 (🔍)
GCVE (CVE): GCVE-0-2024-12935
GCVE (VulDB): GCVE-100-289288
scip Labs: https://www.scip.ch/en/?labs.20161013

nbanyeozi

E kere: 25/12/2024 04:09 PM
Emelitere: 17/04/2025 10:27 AM
Mgbanwe: 25/12/2024 04:09 PM (54), 26/12/2024 06:30 AM (30), 17/04/2025 10:27 AM (12)
Zukuru: 🔍
Olùránṣẹ́: Fergod
Cache ID: 253:466:103

fi silẹozi

Anabata

  • fi silẹ #468129: code-projects Simple Admin Panel In PHP 1.00 SQL Injection (nípasẹ̀ Fergod)

Mkparịta ụka

Enweghị okwu nke ọ bụla Asụsụ: ig + en.

Biko banye ka ikwu okwu

Do you want to use VulDB in your project?

Use the official API to access entries easily!