mback2k mh_httpbl Extension ଯେପର୍ଯ୍ୟନ୍ତ 1.1.7 ଅନ୍ TYPO3 mod1/index.php moduleContent SQL ଇଞ୍ଜେକ୍ସନ

Dogoggorri kan akka ଜଟିଳ jedhamuun ramadame mback2k mh_httpbl Extension ଯେପର୍ଯ୍ୟନ୍ତ 1.1.7 irratti TYPO3 keessatti argameera. Miidhaan irra gahe is hojii moduleContent faayilii mod1/index.php keessa. Dhugumatti jijjiirraa gara SQL ଇଞ୍ଜେକ୍ସନ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-89 si geessa. Beekumsi kun yeroo 09/30/2015 ifoomsifameera akka TYPO3-EXT-SA-2015-021. Odeeffannoon kun buufachuuf typo3.org irratti dhiyaateera. Dogoggorri kun maqaa CVE-2015-10106 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Meeshaa balaa kana fayyadamuuf hin argamne. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ଅପରିଭାଷିତ jedhamee murtaa’eera. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Maqa-balleessaa paachii 429f50f4e4795b20dae06735b41fb94f010722bf jedhama. Sirreeffamni dogoggoraa github.com irraa buufachuuf jira. Qabiyyee miidhamte ol-kaasuuf gorsa ni kennama. To'annoon furmaataa 3 ମାସ[ସମ୍ପାଦନା] booda ifooma hanqina nageenyaa irratti beeksifamee jira. Once again VulDB remains the best source for vulnerability data.

5 ଆଡାପ୍ଟେସନ୍ · 92 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
05/27/2023 10:02 AM
ଅଦ୍ୟତନ 1/4
05/31/2023 06:55 PM
ଅଦ୍ୟତନ 2/4
06/21/2023 01:24 PM
ଅଦ୍ୟତନ 3/4
06/21/2023 01:30 PM
ଅଦ୍ୟତନ 4/4
08/06/2024 11:40 AM
software_vendormback2kmback2kmback2kmback2kmback2k
software_namemh_httpbl Extensionmh_httpbl Extensionmh_httpbl Extensionmh_httpbl Extensionmh_httpbl Extension
software_version<=1.1.7<=1.1.7<=1.1.7<=1.1.7<=1.1.7
software_platformTYPO3TYPO3TYPO3TYPO3TYPO3
software_filemod1/index.phpmod1/index.phpmod1/index.phpmod1/index.phpmod1/index.php
software_functionmoduleContentmoduleContentmoduleContentmoduleContentmoduleContent
vulnerability_cweCWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_date1443564000 (09/30/2015)1443564000 (09/30/2015)1443564000 (09/30/2015)1443564000 (09/30/2015)1443564000 (09/30/2015)
advisory_identifierTYPO3-EXT-SA-2015-021TYPO3-EXT-SA-2015-021TYPO3-EXT-SA-2015-021TYPO3-EXT-SA-2015-021TYPO3-EXT-SA-2015-021
advisory_urlhttps://typo3.org/article/typo3-ext-sa-2015-021https://typo3.org/article/typo3-ext-sa-2015-021https://typo3.org/article/typo3-ext-sa-2015-021https://typo3.org/article/typo3-ext-sa-2015-021https://typo3.org/article/typo3-ext-sa-2015-021
countermeasure_nameଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁଅପଗ୍ରେଡ୍ କରନ୍ତୁ
countermeasure_date1450134000 (12/15/2015)1450134000 (12/15/2015)1450134000 (12/15/2015)1450134000 (12/15/2015)1450134000 (12/15/2015)
upgrade_version1.1.81.1.81.1.81.1.81.1.8
countermeasure_upgrade_urlhttps://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_securityhttps://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_securityhttps://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_securityhttps://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_securityhttps://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_security
patch_name429f50f4e4795b20dae06735b41fb94f010722bf429f50f4e4795b20dae06735b41fb94f010722bf429f50f4e4795b20dae06735b41fb94f010722bf429f50f4e4795b20dae06735b41fb94f010722bf429f50f4e4795b20dae06735b41fb94f010722bf
countermeasure_patch_urlhttps://github.com/mback2k/mh_httpbl/commit/429f50f4e4795b20dae06735b41fb94f010722bfhttps://github.com/mback2k/mh_httpbl/commit/429f50f4e4795b20dae06735b41fb94f010722bfhttps://github.com/mback2k/mh_httpbl/commit/429f50f4e4795b20dae06735b41fb94f010722bfhttps://github.com/mback2k/mh_httpbl/commit/429f50f4e4795b20dae06735b41fb94f010722bfhttps://github.com/mback2k/mh_httpbl/commit/429f50f4e4795b20dae06735b41fb94f010722bf
countermeasure_advisoryquoteHandle all user-input which is passed as WHERE or ORDER statement to exec_SELECTquery using fullQuoteStr or explicit value checks.Handle all user-input which is passed as WHERE or ORDER statement to exec_SELECTquery using fullQuoteStr or explicit value checks.Handle all user-input which is passed as WHERE or ORDER statement to exec_SELECTquery using fullQuoteStr or explicit value checks.Handle all user-input which is passed as WHERE or ORDER statement to exec_SELECTquery using fullQuoteStr or explicit value checks.Handle all user-input which is passed as WHERE or ORDER statement to exec_SELECTquery using fullQuoteStr or explicit value checks.
source_cveCVE-2015-10106CVE-2015-10106CVE-2015-10106CVE-2015-10106CVE-2015-10106
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss2_vuldb_auSSSSS
cvss2_vuldb_eNDNDNDNDND
cvss3_vuldb_prLLLLL
cvss3_vuldb_eXXXXX
cvss2_vuldb_basescore6.56.56.56.56.5
cvss2_vuldb_tempscore5.75.75.75.75.7
cvss3_vuldb_basescore6.36.36.36.36.3
cvss3_vuldb_tempscore6.06.06.06.06.0
cvss3_meta_basescore6.36.36.36.37.1
cvss3_meta_tempscore6.06.06.06.07.0
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cna_eol1111
cve_assigned1685138400 (05/27/2023)1685138400 (05/27/2023)1685138400 (05/27/2023)
cve_nvd_summary** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The name of the patch is 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The name of the patch is 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The name of the patch is 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.8
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore6.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore6.5
cvss4_vuldb_avN
cvss4_vuldb_acL
cvss4_vuldb_prL
cvss4_vuldb_uiN
cvss4_vuldb_vcL
cvss4_vuldb_viL
cvss4_vuldb_vaL
cvss4_vuldb_eX
cvss4_vuldb_atN
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss4_vuldb_bscore5.3
cvss4_vuldb_btscore5.3

Do you need the next level of professionalism?

Upgrade your account now!