Metrics
Affected Vendors & Products
Thu, 12 Sep 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:continew:admin:3.2.0:*:*:*:*:*:*:* |
Mon, 26 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Continew
Continew admin |
|
CPEs | cpe:2.3:a:continew:admin:*:*:*:*:*:*:*:* | |
Vendors & Products |
Continew
Continew admin |
|
Metrics |
ssvc
|
Sun, 25 Aug 2024 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability classified as critical was found in ContiNew Admin 3.2.0. Affected by this vulnerability is the function top.continew.starter.extension.crud.controller.BaseController#tree of the file /api/system/dept/tree?sort=parentId%2Casc&sort=sort%2Casc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | ContiNew Admin tree sql injection | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2024-08-25T23:00:08.640Z
Updated: 2024-08-26T13:51:27.637Z
Reserved: 2024-08-25T06:11:57.395Z
Link: CVE-2024-8155
Updated: 2024-08-26T13:51:23.056Z
Status : Analyzed
Published: 2024-08-25T23:15:04.123
Modified: 2024-09-12T13:53:23.827
Link: CVE-2024-8155
No data.