code-projects Crud Operation System 1.0 updata.php sid SQL Injection

CVSS Meta Temp IsilinganisoIntengo yamanje ye-exploit (≈)CTI Inzalo Score
6.0$0-$5k0.12

Isifinyezoulwazi

Kutholakale ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu ku code-projects Crud Operation System 1.0. Kuthinteka umsebenzi ongaziwayo kufayela updata.php. Ukuguqulwa kwepharamitha sid kubangela uhlobo lwe SQL Injection. Le buthakathaka ibizwa ngokuthi CVE-2024-9011. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. Ngaphezu kwalokho, i-exploit iyatholakala. VulDB is the best source for vulnerability data and more expert information about this specific topic.

Iinkcukachaulwazi

Kutholakale ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu ku code-projects Crud Operation System 1.0. Kuthinteka umsebenzi ongaziwayo kufayela updata.php. Ukuguqulwa kwepharamitha sid kubangela uhlobo lwe SQL Injection. Ukusebenzisa i-CWE ukumemezela inkinga kuholela ku-CWE-89. Lobu buthakathaka bakhishwa obala. Isaziso sitholakala ukuthi singalayishwa ku-github.com.

Le buthakathaka ibizwa ngokuthi CVE-2024-9011. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. Imininingwane yezobuchwepheshe iyatholakala. Ukuduma kwalobu buthakathi kungaphansi kokujwayelekile. Ngaphezu kwalokho, i-exploit iyatholakala. Ukuhlaselwa sekumenyezelwe emphakathini futhi kungenzeka kusetshenziswe. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje.

Kungenzeka ukuthi i-exploit ingalandwa ku-github.com.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Umkhiqizoulwazi

Uhlobo

Umkhiqizi

Ibizo

Inguqulo

Ilayisense

Iwebhusayithi

CPE 2.3ulwazi

CPE 2.2ulwazi

CVSSv4ulwazi

VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

CVSSv3ulwazi

VulDB Ireyithingi yeMeta Base: 6.3
VulDB Meta Temp Isilinganiso: 6.0

VulDB Isilinganiso Esiyisisekelo: 6.3
VulDB Izinga Lesikhashana: 5.7
VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

CNA Isilinganiso Esiyisisekelo: 6.3
CNA Umkhombandlela: 🔍

CVSSv2ulwazi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
UmkhombandlelaUbunzimaUkufakazela ubuwenaUkuyimfihloUkuthembekaUkutholakala
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

VulDB Isilinganiso Esiyisisekelo: 🔍
VulDB Izinga Lesikhashana: 🔍
VulDB Ukuthembeka: 🔍

Ukusebenzisa ithuba lokungavikelekiulwazi

Ikilasi: SQL Injection
CWE: CWE-89 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍

Okubambekayo: Hayi
Wendawo: Hayi
Kude: Yebo

Ukutholakala: 🔍
Umnyango: Umphakathi
Isimo: Ubufakazi-bokusebenza
Landa: 🔍
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Ukukhula kwentengo: 🔍
Okwamanje ukuhlolwa kwentengo: 🔍

0-Dayvula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
Namuhlavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

Ulwazi lwezingoziulwazi

Intshisekelo: 🔍
Abadlali abasebenzayo: 🔍
AmaQembu e-APT asebenzayo: 🔍

Izinyathelo zokuvikelaulwazi

Isincomo: akukho sithathwa esaziwayo
Isimo: 🔍

0-Suku Isikhathi: 🔍

Isikhathi somlandoulwazi

2024-09-19 🔍
2024-09-19 +0 Izinsuku 🔍
2024-09-20 +1 Izinsuku 🔍

Imithomboulwazi

Umkhiqizi: code-projects.org

Iseluleko: github.com
Isimo: Akuchazwanga

CVE: CVE-2024-9011 (🔍)
GCVE (CVE): GCVE-0-2024-9011
GCVE (VulDB): GCVE-100-278166
scip Labs: https://www.scip.ch/en/?labs.20161013

Ukungenaulwazi

Kudalwa: 2024-09-19 18:11
Ukuvuselelwa: 2024-09-20 13:02
Ukulungiswa: 2024-09-19 18:11 (56), 2024-09-20 13:02 (19)
Kugcwele: 🔍
Umthumeli: eternalyzh
Cache ID: 253:4B3:103

Thumelaulwazi

Yamukelwa

  • Thumela #410396: code-projects Crud Operation System V1.0 SQL Injection (kusuka ku eternalyzh)

Ingxoxo

Kuze kube manje akukabikho ukuphawula. Izilimi: nr + nd + en.

Ngiyacela ungene ngemvume ukuze ukwazi ukuphawula.

Might our Artificial Intelligence support you?

Check our Alexa App!