A loop hole in the payment logic of Sparkshop v1.16 allows attackers to arbitrarily modify the number of products.
References
Link | Resource |
---|---|
http://sparkshop.com | Not Applicable |
https://gitee.com/sparkshop/sparkshop | Product |
https://github.com/Yllxx03/CVE/tree/main/CVE-2024-46307 | Exploit Third Party Advisory |
Configurations
History
15 Oct 2024, 14:57
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () http://sparkshop.com - Not Applicable | |
References | () https://gitee.com/sparkshop/sparkshop - Product | |
References | () https://github.com/Yllxx03/CVE/tree/main/CVE-2024-46307 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:* | |
First Time |
Sparkshop
Sparkshop sparkshop |
11 Oct 2024, 21:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-841 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 17:15
Updated : 2024-10-15 14:57
NVD link : CVE-2024-46307
Mitre link : CVE-2024-46307
CVE.ORG link : CVE-2024-46307
JSON object : View
Products Affected
sparkshop
- sparkshop
CWE