SQL Injection vulnerability in Yonyou space-time enterprise information integration platform v.9.0 and before allows an attacker to obtain sensitive information via the gwbhAIM parameter in the saveMove.jsp in the hr_position directory.
                
            Metrics
Affected Vendors & Products
Advisories
    No advisories yet.
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| https://github.com/l8l1/killl.github.io/blob/main/3.md | 
                     | 
            
History
                    Thu, 18 Sep 2025 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Yonyou
         Yonyou yonyou  | 
|
| CPEs | cpe:2.3:a:yonyou:yonyou:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Yonyou
         Yonyou yonyou  | 
Mon, 25 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics | 
        
        cvssV3_1
         
 
  | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-25T17:42:08.217Z
Reserved: 2024-01-25T00:00:00
Link: CVE-2024-24256
Updated: 2024-08-01T23:19:51.923Z
Status : Analyzed
Published: 2024-02-15T08:15:46.410
Modified: 2025-09-18T16:21:39.230
Link: CVE-2024-24256
No data.
                        OpenCVE Enrichment
                    No data.