Description
A vulnerability was found in ttskch PaginationServiceProvider up to 0.x. It has been declared as critical. This vulnerability affects unknown code of the file demo/index.php of the component demo. The manipulation of the argument sort/id leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as 619de478efce17ece1a3b913ab16e40651e1ea7b. It is recommended to upgrade the affected component. VDB-217150 is the identifier assigned to this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0579 | A vulnerability was found in ttskch PaginationServiceProvider up to 0.x. It has been declared as critical. This vulnerability affects unknown code of the file demo/index.php of the component demo. The manipulation of the argument sort/id leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as 619de478efce17ece1a3b913ab16e40651e1ea7b. It is recommended to upgrade the affected component. VDB-217150 is the identifier assigned to this vulnerability. |
Github GHSA |
GHSA-ww43-mcvh-35p4 | PaginationServiceProvider SQL Injection vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-06T14:10:56.418Z
Reserved: 2022-12-31T19:26:05.517Z
Link: CVE-2014-125029
No data.
Status : Modified
Published: 2023-01-07T22:15:08.637
Modified: 2024-11-21T02:03:38.053
Link: CVE-2014-125029
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA