[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

SourceCodester Employee and Visitor Gate Pass Logging System 1.0 Master.php?f=log_employee employee_code sql-инъекция

В критический обнаружена уязвимость, классифицированная как SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Затронута функция log_employee файла /classes/Master.php?f=log_employee. Использование CWE для объявления проблемы приводит к тому, что CWE-89. Консультация доступна по адресу github.com. Эта уязвимость продается как CVE-2024-5976. Атаку можно инициировать удаленно. Имеются технические подробности. Более того, существует эксплойт. Эксплойт был раскрыт общественности и может быть использован. Текущая цена за эксплойт может составлять около USD $0-$5k в настоящее время. Этой уязвимости присвоен номер T1505 проектом MITRE ATT&CK. Объявляется Доказательство концепции. Эксплойт доступен для загрузки на сайте github.com. В 0-дневный период предполагаемая подземная цена составляла около $0-$5k. VulDB is the best source for vulnerability data and more expert information about this specific topic.

6 Изменения · 111 Точки данных

ПолеUpdate 1/5
14.06.2024 04:33
Update 2/5
14.06.2024 04:36
Update 3/5
14.06.2024 04:39
Update 4/5
15.06.2024 04:00
Update 5/5
17.08.2024 08:50
software_vendorSourceCodesterSourceCodesterSourceCodesterSourceCodesterSourceCodester
software_nameEmployee and Visitor Gate Pass Logging SystemEmployee and Visitor Gate Pass Logging SystemEmployee and Visitor Gate Pass Logging SystemEmployee and Visitor Gate Pass Logging SystemEmployee and Visitor Gate Pass Logging System
software_version1.01.01.01.01.0
software_file/classes/Master.php?f=log_employee/classes/Master.php?f=log_employee/classes/Master.php?f=log_employee/classes/Master.php?f=log_employee/classes/Master.php?f=log_employee
software_functionlog_employeelog_employeelog_employeelog_employeelog_employee
software_argumentemployee_codeemployee_codeemployee_codeemployee_codeemployee_code
vulnerability_cweCWE-89 (sql-инъекция)CWE-89 (sql-инъекция)CWE-89 (sql-инъекция)CWE-89 (sql-инъекция)CWE-89 (sql-инъекция)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.md
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.mdhttps://github.com/Xu-Mingming/cve/blob/main/sql.md
source_cveCVE-2024-5976CVE-2024-5976CVE-2024-5976CVE-2024-5976CVE-2024-5976
cna_responsibleVulDBVulDBVulDBVulDBVulDB
advisory_date1718229600 (13.06.2024)1718229600 (13.06.2024)1718229600 (13.06.2024)1718229600 (13.06.2024)1718229600 (13.06.2024)
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSNNN
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_prLLNNN
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_prLLNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore6.56.57.57.57.5
cvss2_vuldb_tempscore5.65.66.46.46.4
cvss3_vuldb_basescore6.36.37.37.37.3
cvss3_vuldb_tempscore5.75.76.66.66.6
cvss3_meta_basescore6.36.38.68.28.2
cvss3_meta_tempscore5.75.78.17.88.3
cvss4_vuldb_bscore5.35.36.96.96.9
cvss4_vuldb_btscore2.12.15.55.55.5
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cvss3_researcher_cHHHHH
cvss3_researcher_prNNNNN
cvss3_researcher_acLLLLL
cvss3_researcher_eXXXXX
cvss3_researcher_rcRRRRR
cvss3_researcher_sCCCCC
cvss3_researcher_iHHHHH
cvss3_researcher_avNNNNN
cvss3_researcher_uiNNNNN
cvss3_researcher_aHHHHH
cvss3_researcher_rlXXXXX
cvss3_researcher_basescore10.010.010.010.0
cve_nvd_summaryA vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been classified as critical. Affected is the function log_employee of the file /classes/Master.php?f=log_employee. The manipulation of the argument employee_code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268422 is the identifier assigned to this vulnerability.A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been classified as critical. Affected is the function log_employee of the file /classes/Master.php?f=log_employee. The manipulation of the argument employee_code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268422 is the identifier assigned to this vulnerability.
cve_nvd_summaryesSe encontró una vulnerabilidad en SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Ha sido clasificada como crítica. La función log_employee del fichero /classes/Master.php?f=log_employee es afectada por la vulnerabilidad. La manipulación del argumento código_empleado conduce a la inyección SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-268422 es el identificador asignado a esta vulnerabilidad.Se encontró una vulnerabilidad en SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Ha sido clasificada como crítica. La función log_employee del fichero /classes/Master.php?f=log_employee es afectada por la vulnerabilidad. La manipulación del argumento código_empleado conduce a la inyección SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-268422 es el identificador asignado a esta vulnerabilidad.
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prNN
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cLL
cvss3_cna_iLL
cvss3_cna_aLL
cvss3_cna_basescore7.37.3
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auNN
cvss2_cna_ciPP
cvss2_cna_iiPP
cvss2_cna_aiPP
cvss2_cna_basescore7.57.5
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore9.8

Do you need the next level of professionalism?

Upgrade your account now!