Description
A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44329 | A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
References
| Link | Providers |
|---|---|
| https://vuldb.com/?ctiid.234236 |
|
| https://vuldb.com/?id.234236 |
|
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-02T07:01:57.517Z
Reserved: 2023-07-15T16:27:32.856Z
Link: CVE-2023-3690
No data.
Status : Modified
Published: 2023-07-16T16:15:09.437
Modified: 2024-11-21T08:17:50.927
Link: CVE-2023-3690
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD