Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-chgc-xwgh-x2f3

Опубликовано: 12 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.5
CVSS3: 7.3

Описание

A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.

A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.

EPSS

Процентиль: 11%
0.00037
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74
CWE-89

Связанные уязвимости

CVSS3: 7.3
nvd
около 2 месяцев назад

A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.

EPSS

Процентиль: 11%
0.00037
Низкий

5.5 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-74
CWE-89