code-projects Restaurant Reservation System 1.0 index.php तारीख एसक्यूएल इंजेक्शन

एक कमकुवतपणा जो गंभीर म्हणून वर्गीकृत केला आहे, तो code-projects Restaurant Reservation System 1.0 मध्ये आढळून आला आहे. या ठिकाणी परिणाम झाला आहे अज्ञात फंक्शन फाइल index.php च्या. सॉफ्टवेअरमध्ये तारीख या आर्ग्युमेंटचे केलेली छेडछाड एसक्यूएल इंजेक्शन निर्माण करते. समस्या जाहीर करण्यासाठी CWE वापरल्यास CWE-89 येथे नेले जाते. ही कमतरता प्रसिद्ध करण्यात आली होती 22/09/2024. डाउनलोडसाठी सल्ला github.com वर शेअर केला आहे. ही असुरक्षा CVE-2024-9085 म्हणून नोंदवली गेली आहे. दूरवरून हा हल्ला घडवून आणता येतो. तांत्रिक तपशील दिलेले आहेत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषण सार्वजनिकपणे जाहीर झाले आहे आणि त्याचा वापर होऊ शकतो. सध्या USD $0-$5k इतका असू शकतो. MITRE ATT&CK प्रकल्प T1505 हल्ला तंत्रज्ञान म्हणून घोषित करतो. प्रूफ-ऑफ-कॉन्सेप्ट म्हणून हे घोषित केले गेले आहे. डाउनलोडसाठी शोषण github.com वर उपलब्ध आहे. 0-डे म्हणून त्याची अंदाजे भूमिगत किंमत $0-$5k होती. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

4 बदल · 87 डेटा पॉइंट्स

शेततयार केली
22/09/2024 09:50 AM
अद्ययावत 1/3
22/09/2024 10:35 AM
अद्ययावत 2/3
27/09/2024 10:05 AM
अद्ययावत 3/3
28/09/2024 01:21 PM
software_vendorcode-projectscode-projectscode-projectscode-projects
software_nameRestaurant Reservation SystemRestaurant Reservation SystemRestaurant Reservation SystemRestaurant Reservation System
software_version1.01.01.01.0
software_fileindex.phpindex.phpindex.phpindex.php
software_argumentdatedatedatedate
vulnerability_cweCWE-89 (एसक्यूएल इंजेक्शन)CWE-89 (एसक्यूएल इंजेक्शन)CWE-89 (एसक्यूएल इंजेक्शन)CWE-89 (एसक्यूएल इंजेक्शन)
vulnerability_risk2222
cvss3_vuldb_avNNNN
cvss3_vuldb_acLLLL
cvss3_vuldb_prNNNN
cvss3_vuldb_uiNNNN
cvss3_vuldb_sUUUU
cvss3_vuldb_cLLLL
cvss3_vuldb_iLLLL
cvss3_vuldb_aLLLL
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://github.com/ppp-src/a/issues/18https://github.com/ppp-src/a/issues/18https://github.com/ppp-src/a/issues/18https://github.com/ppp-src/a/issues/18
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/ppp-src/a/issues/18https://github.com/ppp-src/a/issues/18https://github.com/ppp-src/a/issues/18https://github.com/ppp-src/a/issues/18
source_cveCVE-2024-9085CVE-2024-9085CVE-2024-9085CVE-2024-9085
cna_responsibleVulDBVulDBVulDBVulDB
decision_summaryThe initial researcher advisory mentions sid as affected paramater which is incorrect.The initial researcher advisory mentions sid as affected paramater which is incorrect.The initial researcher advisory mentions sid as affected paramater which is incorrect.The initial researcher advisory mentions sid as affected paramater which is incorrect.
software_typeHospitality SoftwareHospitality SoftwareHospitality SoftwareHospitality Software
cvss2_vuldb_avNNNN
cvss2_vuldb_acLLLL
cvss2_vuldb_auNNNN
cvss2_vuldb_ciPPPP
cvss2_vuldb_iiPPPP
cvss2_vuldb_aiPPPP
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss4_vuldb_avNNNN
cvss4_vuldb_acLLLL
cvss4_vuldb_prNNNN
cvss4_vuldb_uiNNNN
cvss4_vuldb_vcLLLL
cvss4_vuldb_viLLLL
cvss4_vuldb_vaLLLL
cvss4_vuldb_ePPPP
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_rlXXXX
cvss4_vuldb_atNNNN
cvss4_vuldb_scNNNN
cvss4_vuldb_siNNNN
cvss4_vuldb_saNNNN
cvss2_vuldb_basescore7.57.57.57.5
cvss2_vuldb_tempscore6.46.46.46.4
cvss3_vuldb_basescore7.37.37.37.3
cvss3_vuldb_tempscore6.66.66.66.6
cvss3_meta_basescore7.37.37.38.1
cvss3_meta_tempscore6.66.96.97.9
cvss4_vuldb_bscore6.96.96.96.9
cvss4_vuldb_btscore5.55.55.55.5
advisory_date1726956000 (22/09/2024)1726956000 (22/09/2024)1726956000 (22/09/2024)1726956000 (22/09/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions sid as affected paramater which is incorrect.A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions sid as affected paramater which is incorrect.A vulnerability was found in code-projects Restaurant Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions sid as affected paramater which is incorrect.
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prNNN
cvss3_cna_uiNNN
cvss3_cna_sUUU
cvss3_cna_cLLL
cvss3_cna_iLLL
cvss3_cna_aLLL
cvss3_cna_basescore7.37.37.3
cvss2_cna_avNNN
cvss2_cna_acLLL
cvss2_cna_auNNN
cvss2_cna_ciPPP
cvss2_cna_iiPPP
cvss2_cna_aiPPP
cvss2_cna_basescore7.57.57.5
cve_nvd_summaryesSe encontró una vulnerabilidad en code-projects Restaurant Reservation System 1.0. Se la ha calificado como crítica. Este problema afecta a algunos procesos desconocidos del archivo index.php. La manipulación del argumento date conduce a una inyección SQL. El ataque puede iniciarse de forma remota. El exploit se ha revelado al público y puede utilizarse. El aviso inicial para investigadores menciona a sid como el parámetro afectado, lo cual es incorrecto.Se encontró una vulnerabilidad en code-projects Restaurant Reservation System 1.0. Se la ha calificado como crítica. Este problema afecta a algunos procesos desconocidos del archivo index.php. La manipulación del argumento date conduce a una inyección SQL. El ataque puede iniciarse de forma remota. El exploit se ha revelado al público y puede utilizarse. El aviso inicial para investigadores menciona a sid como el parámetro afectado, lo cual es incorrecto.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore9.8

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!