SQL Injection vulnerability in Yonyou space-time enterprise information integration platform v.9.0 and before allows an attacker to obtain sensitive information via the gwbhAIM parameter in the saveMove.jsp in the hr_position directory.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/l8l1/killl.github.io/blob/main/3.md |
![]() ![]() |
History
Mon, 25 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-89 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-25T17:42:08.217Z
Reserved: 2024-01-25T00:00:00
Link: CVE-2024-24256

Updated: 2024-08-01T23:19:51.923Z

Status : Awaiting Analysis
Published: 2024-02-15T08:15:46.410
Modified: 2024-11-25T18:15:10.727
Link: CVE-2024-24256

No data.