Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-51417 | A vulnerability was found in donglight bookstore电商书城系统说明 1.0.0. It has been classified as critical. This affects the function getHtml of the file src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
Fri, 22 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Donglight
Donglight bookstore |
|
| CPEs | cpe:2.3:a:donglight:bookstore:1.0.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Donglight
Donglight bookstore |
Thu, 09 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Jan 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in donglight bookstore电商书城系统说明 1.0.0. It has been classified as critical. This affects the function getHtml of the file src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | donglight bookstore电商书城系统说明 HttpUtil.java getHtml server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-01-09T16:19:46.795Z
Reserved: 2025-01-08T14:30:36.803Z
Link: CVE-2024-13195
Updated: 2025-01-09T16:19:27.399Z
Status : Analyzed
Published: 2025-01-09T00:15:25.570
Modified: 2025-08-22T21:41:28.860
Link: CVE-2024-13195
No data.
OpenCVE Enrichment
No data.
EUVD