githuis P2Manage PTwoManage/Database.cs Execute sql SQL ଇଞ୍ଜେକ୍ସନ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu githuis P2Manage keessatti argameera. Kan miidhamte is hojii Execute faayilii PTwoManage/Database.cs keessa. Hojii jijjiirraa irratti gaggeeffame sql gara SQL ଇଞ୍ଜେକ୍ସନ geessa. CWE fayyadamuun rakkoo ibsuun gara CWE-89 geessa. Dadhabbii kana yeroo 01/15/2023 maxxanfameera akka 717380aba80002414f82d93c770035198b7858cc. Odeeffannoon kun buufachuuf github.com irratti qoodameera. Dogoggorri kun akka CVE-2015-10054tti beekama. Konkolaataa naannoo keessa seenuu barbaachisa ta'ee, weerarri kun milkaa'uuf. Faayidaaleen teeknikaa ni jiru. Meeshaa balaa kana fayyadamuuf hin jiru. Amma, gatii ammee exploit might be approx. USD $0-$5k ta'uu danda'a. Akka ଅପରିଭାଷିତ jedhamee ibsameera. Akka 0-daytti, gatii daldalaa dhoksaa tilmaamame $0-$5k ta'ee ture. Beekamtii paachii kanaa 717380aba80002414f82d93c770035198b7858cc dha. Sirreeffamni rakkoo github.com irratti buufachuuf qophaa’eera. Paachii itti fayyadamuun rakkoo kana furuuf ni gorfama. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

3 ଆଡାପ୍ଟେସନ୍ · 73 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
01/15/2023 06:47 PM
ଅଦ୍ୟତନ 1/2
02/07/2023 07:15 PM
ଅଦ୍ୟତନ 2/2
02/07/2023 07:23 PM
software_vendorgithuisgithuisgithuis
software_nameP2ManageP2ManageP2Manage
software_filePTwoManage/Database.csPTwoManage/Database.csPTwoManage/Database.cs
software_functionExecuteExecuteExecute
software_argumentsqlsqlsql
vulnerability_cweCWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)
vulnerability_risk222
cvss3_vuldb_acLLL
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
advisory_identifier717380aba80002414f82d93c770035198b7858cc717380aba80002414f82d93c770035198b7858cc717380aba80002414f82d93c770035198b7858cc
advisory_urlhttps://github.com/githuis/P2Manage/commit/717380aba80002414f82d93c770035198b7858cchttps://github.com/githuis/P2Manage/commit/717380aba80002414f82d93c770035198b7858cchttps://github.com/githuis/P2Manage/commit/717380aba80002414f82d93c770035198b7858cc
countermeasure_nameପ୍ୟାଚ୍ପ୍ୟାଚ୍ପ୍ୟାଚ୍
patch_name717380aba80002414f82d93c770035198b7858cc717380aba80002414f82d93c770035198b7858cc717380aba80002414f82d93c770035198b7858cc
countermeasure_patch_urlhttps://github.com/githuis/P2Manage/commit/717380aba80002414f82d93c770035198b7858cchttps://github.com/githuis/P2Manage/commit/717380aba80002414f82d93c770035198b7858cchttps://github.com/githuis/P2Manage/commit/717380aba80002414f82d93c770035198b7858cc
countermeasure_advisoryquoteLittle fix against sql injectionsLittle fix against sql injectionsLittle fix against sql injections
source_cveCVE-2015-10054CVE-2015-10054CVE-2015-10054
cna_responsibleVulDBVulDBVulDB
advisory_date1673737200 (01/15/2023)1673737200 (01/15/2023)1673737200 (01/15/2023)
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_avAAA
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.25.25.2
cvss2_vuldb_tempscore4.54.54.5
cvss3_vuldb_basescore5.55.55.5
cvss3_vuldb_tempscore5.35.35.3
cvss3_meta_basescore5.55.56.9
cvss3_meta_tempscore5.35.36.9
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1673737200 (01/15/2023)1673737200 (01/15/2023)
cve_nvd_summaryA vulnerability, which was classified as critical, was found in githuis P2Manage. This affects the function Execute of the file PTwoManage/Database.cs. The manipulation of the argument sql leads to sql injection. The name of the patch is 717380aba80002414f82d93c770035198b7858cc. It is recommended to apply a patch to fix this issue. The identifier VDB-218397 was assigned to this vulnerability.A vulnerability, which was classified as critical, was found in githuis P2Manage. This affects the function Execute of the file PTwoManage/Database.cs. The manipulation of the argument sql leads to sql injection. The name of the patch is 717380aba80002414f82d93c770035198b7858cc. It is recommended to apply a patch to fix this issue. The identifier VDB-218397 was assigned to this vulnerability.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avA
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore5.2
cvss3_nvd_basescore9.8
cvss3_cna_basescore5.5

Do you want to use VulDB in your project?

Use the official API to access entries easily!