code-projects Job Recruitment 1.0 /login.php email SQL ଇଞ୍ଜେକ୍ସନ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu code-projects Job Recruitment 1.0 keessatti argameera. Miidhamni argame is hojii hin beekamne faayilii /login.php keessa. Wanti jijjiirame irratti email gara SQL ଇଞ୍ଜେକ୍ସନ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-89 si geessa. Odeeffannoon kun yeroo 11/11/2024 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2024-11099 jedhamee waamama. Weerara fageenya irraa jalqabuu ni danda'ama. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

5 ଆଡାପ୍ଟେସନ୍ · 111 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
11/11/2024 09:33 PM
ଅଦ୍ୟତନ 1/4
11/12/2024 04:32 AM
ଅଦ୍ୟତନ 2/4
11/12/2024 07:26 AM
ଅଦ୍ୟତନ 3/4
11/12/2024 07:29 AM
ଅଦ୍ୟତନ 4/4
11/12/2024 11:41 AM
software_vendorcode-projectscode-projectscode-projectscode-projectscode-projects
software_nameJob RecruitmentJob RecruitmentJob RecruitmentJob RecruitmentJob Recruitment
software_version1.01.01.01.01.0
software_file/login.php/login.php/login.php/login.php/login.php
software_argumentemailemailemailemailemail
vulnerability_cweCWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prNNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.md
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.mdhttps://github.com/Kenton868/CVE/blob/main/sqlInjection1.md
source_cveCVE-2024-11099CVE-2024-11099CVE-2024-11099CVE-2024-11099CVE-2024-11099
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProject Management SoftwareProject Management SoftwareProject Management SoftwareProject Management SoftwareProject Management Software
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_auNNNNN
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prNNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore7.57.57.57.57.5
cvss2_vuldb_tempscore6.46.46.46.46.4
cvss3_vuldb_basescore7.37.37.37.37.3
cvss3_vuldb_tempscore6.66.66.66.66.6
cvss3_meta_basescore7.37.37.38.28.2
cvss3_meta_tempscore6.66.96.97.87.8
cvss4_vuldb_bscore6.96.96.96.96.9
cvss4_vuldb_btscore5.55.55.55.55.5
advisory_date1731279600 (11/11/2024)1731279600 (11/11/2024)1731279600 (11/11/2024)1731279600 (11/11/2024)1731279600 (11/11/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. This issue affects some unknown processing of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avNNNN
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prNNNN
cvss4_cna_uiNNNN
cvss4_cna_vcLLLL
cvss4_cna_viLLLL
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore6.96.96.96.9
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prNNNN
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cLLLL
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cvss3_cna_basescore7.37.37.37.3
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auNNNN
cvss2_cna_ciPPPP
cvss2_cna_iiPPPP
cvss2_cna_aiPPPP
cvss2_cna_basescore7.57.57.57.5
cvss3_researcher_avNNN
cvss3_researcher_iHHH
cvss2_researcher_avNNN
cvss2_researcher_rcCCC
cvss3_researcher_uiNNN
cvss3_researcher_cHHH
cvss3_researcher_prNNN
cvss2_researcher_iiCCC
cvss2_researcher_rlWWW
cvss3_researcher_aHHH
cvss2_researcher_acLLL
cvss2_researcher_auNNN
cvss3_researcher_eFFF
cvss2_researcher_eFFF
cvss3_researcher_rcCCC
cvss2_researcher_aiCCC
cvss3_researcher_acLLL
cvss3_researcher_sCCC
cvss3_researcher_rlWWW
cvss2_researcher_ciCCC
cvss2_researcher_basescore10.010.0
cvss3_researcher_basescore10.010.0
cve_nvd_summaryesSe ha encontrado una vulnerabilidad en code-projects Job Recruitment 1.0 y se ha clasificado como crítica. Este problema afecta a algunos procesos desconocidos del archivo /login.php. La manipulación del argumento email provoca una inyección SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse.

Might our Artificial Intelligence support you?

Check our Alexa App!