Логотип exploitDog
bind:CVE-2024-28145
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-28145

Количество 2

Количество 2

nvd логотип

CVE-2024-28145

около 1 года назад

An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-pc69-2jfc-f577

около 1 года назад

An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-28145

An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.

CVSS3: 5.9
0%
Низкий
около 1 года назад
github логотип
GHSA-pc69-2jfc-f577

An unauthenticated attacker can perform an SQL injection by accessing the /class/dbconnect.php file and supplying malicious GET parameters. The HTTP GET parameters search, table, field, and value are vulnerable. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword.

CVSS3: 5.9
0%
Низкий
около 1 года назад

Уязвимостей на страницу