Codezips Sales Management System 1.0 /addstock.php prodtype SQL Injection

CVSS Meta Temp IsilinganisoIntengo yamanje ye-exploit (≈)CTI Inzalo Score
6.9$0-$5k0.12

Isifinyezoulwazi

Kutholakale ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu ku Codezips Sales Management System 1.0. Kuthintekile umsebenzi ongaziwayo kufayela /addstock.php. Ukuguqulwa kwepharamitha prodtype kubangela uhlobo lwe SQL Injection. Le buthakathaka ibizwa ngokuthi CVE-2024-10368. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. Ngaphezu kwalokho, i-exploit iyatholakala. VulDB is the best source for vulnerability data and more expert information about this specific topic.

Iinkcukachaulwazi

Kutholakale ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu ku Codezips Sales Management System 1.0. Kuthintekile umsebenzi ongaziwayo kufayela /addstock.php. Ukuguqulwa kwepharamitha prodtype kubangela uhlobo lwe SQL Injection. Ukusebenzisa i-CWE ukumemezela inkinga kuholela ku-CWE-89. Lobu buthakathaka bakhishwa obala. Isaziso sitholakala ukuthi singalayishwa ku-github.com.

Le buthakathaka ibizwa ngokuthi CVE-2024-10368. Kungenzeka ukuqalisa ukuhlasela ungasekho endaweni. Imininingwane yezobuchwepheshe iyatholakala. Ukuduma kwalobu buthakathi kungaphansi kokujwayelekile. Ngaphezu kwalokho, i-exploit iyatholakala. Ukuhlaselwa sekumenyezelwe emphakathini futhi kungenzeka kusetshenziswe. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje.

Kungenzeka ukuthi i-exploit ingalandwa ku-github.com.

VulDB is the best source for vulnerability data and more expert information about this specific topic.

Umkhiqizoulwazi

Umkhiqizi

Ibizo

Inguqulo

CPE 2.3ulwazi

CPE 2.2ulwazi

CVSSv4ulwazi

VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

CNA CVSS-B Score: 🔍
CNA CVSS-BT Score: 🔍
CNA Umkhombandlela: 🔍

CVSSv3ulwazi

VulDB Ireyithingi yeMeta Base: 7.3
VulDB Meta Temp Isilinganiso: 6.9

VulDB Isilinganiso Esiyisisekelo: 7.3
VulDB Izinga Lesikhashana: 6.6
VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍

CNA Isilinganiso Esiyisisekelo: 7.3
CNA Umkhombandlela: 🔍

CVSSv2ulwazi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
UmkhombandlelaUbunzimaUkufakazela ubuwenaUkuyimfihloUkuthembekaUkutholakala
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

VulDB Isilinganiso Esiyisisekelo: 🔍
VulDB Izinga Lesikhashana: 🔍
VulDB Ukuthembeka: 🔍

Ukusebenzisa ithuba lokungavikelekiulwazi

Ikilasi: SQL Injection
CWE: CWE-89 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍

Okubambekayo: Hayi
Wendawo: Hayi
Kude: Yebo

Ukutholakala: 🔍
Umnyango: Umphakathi
Isimo: Ubufakazi-bokusebenza
Landa: 🔍
Google Hack: 🔍

EPSS Score: 🔍
EPSS Percentile: 🔍

Ukukhula kwentengo: 🔍
Okwamanje ukuhlolwa kwentengo: 🔍

0-Dayvula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
Namuhlavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

Ulwazi lwezingoziulwazi

Intshisekelo: 🔍
Abadlali abasebenzayo: 🔍
AmaQembu e-APT asebenzayo: 🔍

Izinyathelo zokuvikelaulwazi

Isincomo: akukho sithathwa esaziwayo
Isimo: 🔍

0-Suku Isikhathi: 🔍

Isikhathi somlandoulwazi

2024-10-24 🔍
2024-10-24 +0 Izinsuku 🔍
2024-10-25 +1 Izinsuku 🔍

Imithomboulwazi

Iseluleko: github.com
Isimo: Akuchazwanga

CVE: CVE-2024-10368 (🔍)
GCVE (CVE): GCVE-0-2024-10368
GCVE (VulDB): GCVE-100-281760
scip Labs: https://www.scip.ch/en/?labs.20161013

Ukungenaulwazi

Kudalwa: 2024-10-24 21:49
Ukuvuselelwa: 2024-10-25 13:21
Ukulungiswa: 2024-10-24 21:49 (55), 2024-10-25 07:29 (30), 2024-10-25 13:21 (1)
Kugcwele: 🔍
Umthumeli: XU RONGDA
Cache ID: 253:D8E:103

Thumelaulwazi

Yamukelwa

  • Thumela #430114: Codezips Sales Management System In PHP With Source Code V1.0 SQL Injection (kusuka ku XU RONGDA)

Ingxoxo

Kuze kube manje akukabikho ukuphawula. Izilimi: nr + nd + en.

Ngiyacela ungene ngemvume ukuze ukwazi ukuphawula.

Want to stay up to date on a daily basis?

Enable the mail alert feature now!