[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

1000 Projects Portfolio Management System MCA 1.0 /update_pd_process.php Perfil escalada de privilegios

Una vulnerabilidad clasificada como crítica ha sido encontrada en 1000 Projects Portfolio Management System MCA 1.0. Una función desconocida del archivo /update_pd_process.php es afectada por esta vulnerabilidad. Por la manipulación del parámetro Perfil de un input desconocido se causa una vulnerabilidad de clase escalada de privilegios. El advisory puede ser descargado de github.com. La vulnerabilidad es identificada como CVE-2024-12953. El ataque puede ser iniciado desde la red. Los detalles técnicos son conocidos. Fue declarado como prueba de concepto. El exploit puede ser descargado de github.com.

2 Cambios · 86 Puntos de datos

CampoFecha de creación
2024-12-25 19:25
Update 1/1
2024-12-26 15:21
software_vendor1000 Projects1000 Projects
software_namePortfolio Management System MCAPortfolio Management System MCA
software_version1.01.0
software_file/update_pd_process.php/update_pd_process.php
software_argumentprofileprofile
vulnerability_cweCWE-434 (escalada de privilegios)CWE-434 (escalada de privilegios)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.mdhttps://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.mdhttps://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md
source_cveCVE-2024-12953CVE-2024-12953
cna_responsibleVulDBVulDB
software_typeProject Management SoftwareProject Management Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_auSS
cvss2_vuldb_rlNDND
cvss3_vuldb_prLL
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_prLL
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore6.56.5
cvss2_vuldb_tempscore5.65.6
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore5.75.7
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore5.76.0
cvss4_vuldb_bscore5.35.3
cvss4_vuldb_btscore2.12.1
advisory_date1735081200 (2024-12-25)1735081200 (2024-12-25)
price_0day$0-$5k$0-$5k
cve_nvd_summaryA vulnerability, which was classified as critical, has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected by this issue is some unknown functionality of the file /update_pd_process.php. The manipulation of the argument profile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viL
cvss4_cna_vaL
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore6.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore6.5

Do you need the next level of professionalism?

Upgrade your account now!