Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqg4-3q52-9x7c

Опубликовано: 16 июл. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 14%
0.00045
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 6.3
nvd
больше 2 лет назад

A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 14%
0.00045
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-89