CVE-2024-35359

A vulnerability has been discovered in Diño Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /classes/Master.php?f=view_item. Manipulating the argument id can result in SQL injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dino_physics_school_assistant_project:dino_physics_school_assistant:2.3:*:*:*:*:*:*:*

History

21 Nov 2024, 09:20

Type Values Removed Values Added
References () https://vuln.pentester.stream/pentester-vulnerability-research/post/2298737/vuln15-blind-sql-injection-time-based - Exploit, Third Party Advisory () https://vuln.pentester.stream/pentester-vulnerability-research/post/2298737/vuln15-blind-sql-injection-time-based - Exploit, Third Party Advisory

18 Jul 2024, 16:49

Type Values Removed Values Added
Summary
  • (es) Se ha descubierto una vulnerabilidad en la versión 2.3 de Diño Physics School Assistant. La vulnerabilidad afecta a un código no identificado dentro del archivo /classes/Master.php?f=view_item. La manipulación del argumento id puede provocar una inyección de SQL.
First Time Dino Physics School Assistant Project
Dino Physics School Assistant Project dino Physics School Assistant
CPE cpe:2.3:a:dino_physics_school_assistant_project:dino_physics_school_assistant:2.3:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://vuln.pentester.stream/pentester-vulnerability-research/post/2298737/vuln15-blind-sql-injection-time-based - () https://vuln.pentester.stream/pentester-vulnerability-research/post/2298737/vuln15-blind-sql-injection-time-based - Exploit, Third Party Advisory
CWE CWE-89

30 May 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-30 17:15

Updated : 2024-11-21 09:20


NVD link : CVE-2024-35359

Mitre link : CVE-2024-35359

CVE.ORG link : CVE-2024-35359


JSON object : View

Products Affected

dino_physics_school_assistant_project

  • dino_physics_school_assistant
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')