Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33702 | A vulnerability, which was classified as critical, has been found in code-projects Farmacia 1.0. This issue affects some unknown processing of the file /editar-produto.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
Wed, 20 Nov 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anisha
Anisha farmacia |
|
| CPEs | cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Anisha
Anisha farmacia |
Fri, 15 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, has been found in code-projects Farmacia 1.0. This issue affects some unknown processing of the file /editar-produto.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | code-projects Farmacia editar-produto.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-11-15T16:42:26.323Z
Reserved: 2024-11-15T07:30:43.751Z
Link: CVE-2024-11245
Updated: 2024-11-15T16:42:21.311Z
Status : Analyzed
Published: 2024-11-15T16:15:33.153
Modified: 2024-11-20T14:36:11.557
Link: CVE-2024-11245
No data.
OpenCVE Enrichment
No data.
EUVD