LaikeTui 3.5.0 Background Administrator List sql injection

A vulnerability classified as critical was found in LaikeTui 3.5.0. This vulnerability affects an unknown functionality of the component Background Administrator List. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

020
118

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%26
50%12

Approve Conf

90%26
80%12
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1264364206/23/2022VulD...price_0day$0-$5ksee exploit price documentation06/23/2022accepted
90
1264364106/23/2022VulD...cvss3_meta_tempscore6.3see CVSS documentation06/23/2022accepted
90
1264364006/23/2022VulD...cvss3_meta_basescore6.3see CVSS documentation06/23/2022accepted
90
1264363906/23/2022VulD...cvss3_vuldb_tempscore6.3see CVSS documentation06/23/2022accepted
90
1264363806/23/2022VulD...cvss3_vuldb_basescore6.3see CVSS documentation06/23/2022accepted
90
1264363706/23/2022VulD...cvss2_vuldb_tempscore6.5see CVSS documentation06/23/2022accepted
90
1264363606/23/2022VulD...cvss2_vuldb_basescore6.5see CVSS documentation06/23/2022accepted
90
1264363506/23/2022VulD...cvss3_vuldb_rlXderived from historical data06/23/2022accepted
80
1264363406/23/2022VulD...cvss3_vuldb_eXderived from historical data06/23/2022accepted
80
1264363306/23/2022VulD...cvss3_vuldb_prLderived from historical data06/23/2022accepted
80
1264363206/23/2022VulD...cvss2_vuldb_rlNDderived from historical data06/23/2022accepted
80
1264363106/23/2022VulD...cvss2_vuldb_eNDderived from historical data06/23/2022accepted
80
1264363006/23/2022VulD...cvss2_vuldb_auSderived from historical data06/23/2022accepted
80
1264362906/23/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector06/23/2022accepted
80
1264362806/23/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector06/23/2022accepted
80
1264362706/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector06/23/2022accepted
80
1264362606/23/2022VulD...cvss2_vuldb_ciPderived from vuldb v3 vector06/23/2022accepted
80
1264362506/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector06/23/2022accepted
80
1264362406/23/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector06/23/2022accepted
80
1264362306/23/2022VulD...date1655935200 (06/23/2022)06/23/2022accepted
90

18 more entries are not shown

Do you know our Splunk app?

Download it now for free!