Campo | 2022-08-05 20:52 | 2022-08-30 15:38 | 2022-08-30 15:44 |
---|
cvss3_vuldb_rc | R | R | R |
url | https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-SQL%20injections.md | https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-SQL%20injections.md | https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-SQL%20injections.md |
availability | 1 | 1 | 1 |
publicity | 1 | 1 | 1 |
url | https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-SQL%20injections.md | https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-SQL%20injections.md | https://github.com/anx0ing/CVE_demo/blob/main/2022/Interview%20Management%20System-SQL%20injections.md |
cve | CVE-2022-2679 | CVE-2022-2679 | CVE-2022-2679 |
responsible | VulDB | VulDB | VulDB |
vendor | SourceCodester | SourceCodester | SourceCodester |
name | Interview Management System | Interview Management System | Interview Management System |
version | 1.0 | 1.0 | 1.0 |
file | /viewReport.php | /viewReport.php | /viewReport.php |
argument | id | id | id |
cwe | 89 (sql injection) | 89 (sql injection) | 89 (sql injection) |
risk | 2 | 2 | 2 |
cvss3_vuldb_av | N | N | N |
cvss3_vuldb_ac | L | L | L |
cvss3_vuldb_ui | N | N | N |
cvss3_vuldb_s | U | U | U |
cvss3_vuldb_c | L | L | L |
cvss3_vuldb_i | L | L | L |
cvss3_vuldb_a | L | L | L |
cvss3_vuldb_e | P | P | P |
date | 1659650400 (2022-08-05) | 1659650400 (2022-08-05) | 1659650400 (2022-08-05) |
cvss2_vuldb_av | N | N | N |
cvss2_vuldb_ac | L | L | L |
cvss2_vuldb_ci | P | P | P |
cvss2_vuldb_ii | P | P | P |
cvss2_vuldb_ai | P | P | P |
cvss2_vuldb_e | POC | POC | POC |
cvss2_vuldb_rc | UR | UR | UR |
cvss2_vuldb_au | S | S | S |
cvss2_vuldb_rl | ND | ND | ND |
cvss3_vuldb_pr | L | L | L |
cvss3_vuldb_rl | X | X | X |
cvss2_vuldb_basescore | 6.5 | 6.5 | 6.5 |
cvss2_vuldb_tempscore | 5.6 | 5.6 | 5.6 |
cvss3_vuldb_basescore | 6.3 | 6.3 | 6.3 |
cvss3_vuldb_tempscore | 5.7 | 5.7 | 5.7 |
cvss3_meta_basescore | 6.3 | 6.3 | 7.5 |
cvss3_meta_tempscore | 5.7 | 5.7 | 7.3 |
price_0day | $0-$5k | $0-$5k | $0-$5k |
input_value | (UPDATEXML(9729,CONCAT(0x2e,0x716b707071,(SELECT (ELT(9729=9729,1))),0x7162766a71),7319)) | (UPDATEXML(9729,CONCAT(0x2e,0x716b707071,(SELECT (ELT(9729=9729,1))),0x7162766a71),7319)) | (UPDATEXML(9729,CONCAT(0x2e,0x716b707071,(SELECT (ELT(9729=9729,1))),0x7162766a71),7319)) |
cve_assigned | | 1659650400 (2022-08-05) | 1659650400 (2022-08-05) |
cve_nvd_summary | | A vulnerability was found in SourceCodester Interview Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /viewReport.php. The manipulation of the argument id with the input (UPDATEXML(9729,CONCAT(0x2e,0x716b707071,(SELECT (ELT(9729=9729,1))),0x7162766a71),7319)) leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205667. | A vulnerability was found in SourceCodester Interview Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /viewReport.php. The manipulation of the argument id with the input (UPDATEXML(9729,CONCAT(0x2e,0x716b707071,(SELECT (ELT(9729=9729,1))),0x7162766a71),7319)) leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205667. |
cvss3_nvd_av | | | N |
cvss3_nvd_ac | | | L |
cvss3_nvd_pr | | | N |
cvss3_nvd_ui | | | N |
cvss3_nvd_s | | | U |
cvss3_nvd_c | | | H |
cvss3_nvd_i | | | H |
cvss3_nvd_a | | | H |
cvss3_cna_av | | | N |
cvss3_cna_ac | | | L |
cvss3_cna_pr | | | L |
cvss3_cna_ui | | | N |
cvss3_cna_s | | | U |
cvss3_cna_c | | | L |
cvss3_cna_i | | | L |
cvss3_cna_a | | | L |
cve_cna | | | VulDB |
cvss3_nvd_basescore | | | 9.8 |
cvss3_cna_basescore | | | 6.3 |