A vulnerability has been found in SourceCodester Phone Contact Manager System 1.0 and classified as problematic. Affected by this vulnerability is the function ContactBook::adding of the file ContactBook.cpp. The manipulation leads to improper input validation. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
History

Thu, 12 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sourcecodester:phone_shop_sales_managements_system_using_php_with_source_code:1.0:*:*:*:*:*:*:*
Vendors & Products Sourcecodester
Sourcecodester phone Shop Sales Managements System Using Php With Source Code

Wed, 11 Dec 2024 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Razormist
Razormist phone Contact Manager System
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*
Vendors & Products Razormist
Razormist phone Contact Manager System

Mon, 09 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester phone Shop Sales Managements System Using Php With Source Code
CPEs cpe:2.3:a:sourcecodester:phone_shop_sales_managements_system_using_php_with_source_code:1.0:*:*:*:*:*:*:*
Vendors & Products Sourcecodester
Sourcecodester phone Shop Sales Managements System Using Php With Source Code
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Dec 2024 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in SourceCodester Phone Contact Manager System 1.0 and classified as problematic. Affected by this vulnerability is the function ContactBook::adding of the file ContactBook.cpp. The manipulation leads to improper input validation. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
Title SourceCodester Phone Contact Manager System ContactBook.cpp adding input validation
Weaknesses CWE-20
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-12-09T01:31:07.752Z

Updated: 2024-12-12T13:45:10.433Z

Reserved: 2024-12-08T17:08:44.848Z

Link: CVE-2024-12355

cve-icon Vulnrichment

Updated: 2024-12-09T19:59:51.081Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-09T02:15:19.300

Modified: 2024-12-10T23:36:03.883

Link: CVE-2024-12355

cve-icon Redhat

No data.