Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49102 | A vulnerability classified as critical has been found in OpenRapid RapidCMS up to 1.3.1. Affected is an unknown function of the file /resource/runlogon.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Thu, 19 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openrapid
Openrapid rapidcms |
|
| CPEs | cpe:2.3:a:openrapid:rapidcms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openrapid
Openrapid rapidcms |
Fri, 30 Aug 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yuque
Yuque rapidcms |
|
| CPEs | cpe:2.3:a:yuque:rapidcms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Yuque
Yuque rapidcms |
|
| Metrics |
ssvc
|
Fri, 30 Aug 2024 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical has been found in OpenRapid RapidCMS up to 1.3.1. Affected is an unknown function of the file /resource/runlogon.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Title | OpenRapid RapidCMS runlogon.php sql injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-30T13:09:47.680Z
Reserved: 2024-08-30T05:39:13.837Z
Link: CVE-2024-8335
Updated: 2024-08-30T13:09:39.404Z
Status : Analyzed
Published: 2024-08-30T13:15:13.103
Modified: 2024-09-19T15:31:21.613
Link: CVE-2024-8335
No data.
OpenCVE Enrichment
No data.
EUVD