Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w8pg-8crf-7p67

Опубликовано: 16 июл. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

A vulnerability was found in Bylancer QuickAI OpenAI 3.8.1. It has been declared as critical. This vulnerability affects unknown code of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-234232. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was found in Bylancer QuickAI OpenAI 3.8.1. It has been declared as critical. This vulnerability affects unknown code of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-234232. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 14%
0.00045
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 6.3
nvd
больше 2 лет назад

A vulnerability was found in Bylancer QuickAI OpenAI 3.8.1. It has been declared as critical. This vulnerability affects unknown code of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-234232. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 14%
0.00045
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-89