jeanmarc77 123solar 1.8.4.5 config/config_invt1.php PASSOx ବିସ୍ତାରିତ ଅଧିକାର

Dogoggorri kan akka ଜଟିଳ jedhamuun ramadame jeanmarc77 123solar 1.8.4.5 keessatti argameera. Miidhamni argame is hojii hin beekamne faayilii config/config_invt1.php keessa. Wanti jijjiirame irratti PASSOx gara ବିସ୍ତାରିତ ଅଧିକାର geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-94 si geessa. Odeeffannoon kun yeroo 09/19/2024 maxxanfameera akka 74. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2024-9006 jedhamee waamama. Weerara fageenya irraa jalqabuu ni danda'ama. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. Idaantifayarii paachii f4a8c748ec436e5a79f91ccb6a6f73752b336aa5 dha. Sirreeffamni dogoggoraa github.com irraa buufachuuf jira. Rakkoo kana furuuf paachii fe'uun ni gorfama. If you want to get best quality of vulnerability data, you may have to visit VulDB.

2 ଆଡାପ୍ଟେସନ୍ · 79 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
09/19/2024 06:00 PM
ଅଦ୍ୟତନ 1/1
09/20/2024 12:46 PM
software_vendorjeanmarc77jeanmarc77
software_name123solar123solar
software_version1.8.4.51.8.4.5
software_fileconfig/config_invt1.phpconfig/config_invt1.php
software_argumentPASSOxPASSOx
vulnerability_cweCWE-94 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-94 (ବିସ୍ତାରିତ ଅଧିକାର)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rlOO
cvss3_vuldb_rcCC
advisory_identifier7474
advisory_urlhttps://github.com/jeanmarc77/123solar/issues/74https://github.com/jeanmarc77/123solar/issues/74
advisory_confirm_urlhttps://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441https://github.com/jeanmarc77/123solar/issues/74#issuecomment-2357653441
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/jeanmarc77/123solar/issues/74https://github.com/jeanmarc77/123solar/issues/74
countermeasure_nameପ୍ୟାଚ୍ପ୍ୟାଚ୍
patch_namef4a8c748ec436e5a79f91ccb6a6f73752b336aa5f4a8c748ec436e5a79f91ccb6a6f73752b336aa5
countermeasure_patch_urlhttps://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5https://github.com/jeanmarc77/123solar/commit/f4a8c748ec436e5a79f91ccb6a6f73752b336aa5
source_cveCVE-2024-9006CVE-2024-9006
cna_responsibleVulDBVulDB
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcCC
cvss2_vuldb_rlOFOF
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss3_vuldb_prLL
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.15.1
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore5.75.7
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore5.76.0
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1726696800 (09/19/2024)1726696800 (09/19/2024)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en jeanmarc77 123solar 1.8.4.5. Se ha calificado como crítica. Este problema afecta a algunas funciones desconocidas del archivo config/config_invt1.php. La manipulación del argumento PASSOx provoca la inyección de código. El ataque puede ejecutarse de forma remota. El exploit se ha hecho público y puede utilizarse. El parche se identifica como f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. Se recomienda aplicar un parche para solucionar este problema.
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore6.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore6.5

Do you want to use VulDB in your project?

Use the official API to access entries easily!