MINMAX /newsDia.php id sql injection

A vulnerability classified as critical has been found in MINMAX. This affects an unknown part of the file /newsDia.php. The manipulation of the argument id leads to sql injection. The CWE definition for the vulnerability is CWE-89. The weakness was disclosed 07/04/2020 by Mostafa Farzaneh. This vulnerability is uniquely identified as CVE-2020-36535. It is possible to initiate the attack remotely. Technical details are available. There is no exploit available. The price for an exploit might be around USD $0-$5k at the moment. MITRE ATT&CK project uses the attack technique T1505 for this issue. It is declared as not defined. We expect the 0-day to have been worth approximately $0-$5k. A possible mitigation has been published before and not just after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

122

Field

exploit_price_0day2
cna_responsible1
source_cve1
vulnerability_cwe1
vulnerability_cvss3_vuldb_pr1

Commit Conf

100%21
90%8
96%4
60%2
95%2

Approve Conf

100%21
90%8
96%4
60%2
95%2
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1257982106/03/2022VulD...price_0day$0-$5ksee exploit price documentation06/03/2022accepted
90
1257982006/03/2022VulD...responsibleVulDB06/03/2022accepted
100
1257981906/03/2022VulD...cveCVE-2020-36535cve.org06/03/2022accepted
100
1035342808/17/2020VulD...cwe89 (sql injection)08/17/2020accepted
90
1035343608/17/2020VulD...cvss3_vuldb_prLsee CVSS documentation08/17/2020accepted
60
1035343508/17/2020VulD...cvss2_vuldb_auSsee CVSS documentation08/17/2020accepted
60
1035343408/17/2020VulD...cvss3_vuldb_rcUsee CVSS documentation08/17/2020accepted
90
1035343308/17/2020VulD...cvss3_vuldb_rlXsee CVSS documentation08/17/2020accepted
90
1035343208/17/2020VulD...cvss3_vuldb_eXsee CVSS documentation08/17/2020accepted
90
1035343108/17/2020VulD...cvss2_vuldb_rcUCsee CVSS documentation08/17/2020accepted
90
1035343008/17/2020VulD...cvss2_vuldb_rlNDsee CVSS documentation08/17/2020accepted
90
1035342908/17/2020VulD...cvss2_vuldb_eNDsee CVSS documentation08/17/2020accepted
90
1035342708/17/2020VulD...price_0day$0-$5ksee exploit price documentation08/17/2020accepted
100
1035342608/17/2020VulD...person_nameMostafa Farzaneh08/17/2020accepted
100
1035342508/17/2020VulD...date1593820800 (07/04/2020)08/17/2020accepted
100
1035342408/17/2020VulD...cvss3_vuldb_aLsee CVSS documentation08/17/2020accepted
100
1035342308/17/2020VulD...cvss3_vuldb_iLsee CVSS documentation08/17/2020accepted
100
1035342208/17/2020VulD...cvss3_vuldb_cLsee CVSS documentation08/17/2020accepted
100
1035342108/17/2020VulD...cvss3_vuldb_sUsee CVSS documentation08/17/2020accepted
100
1035342008/17/2020VulD...cvss3_vuldb_uiNsee CVSS documentation08/17/2020accepted
100

17 more entries are not shown

Do you need the next level of professionalism?

Upgrade your account now!