"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-08-25 07:00:41 +00:00
parent 073703b9ae
commit a8d0354068
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98

View File

@ -22,7 +22,7 @@
"version": {
"version_data": [
{
"version_value": "n\/a"
"version_value": "n/a"
}
]
}
@ -49,7 +49,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability classified as critical was found in SourceCodester Simple and Nice Shopping Cart Script. Affected by this vulnerability is an unknown functionality of the file \/mkshop\/Men\/profile.php. The manipulation of the argument mem_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207001 was assigned to this vulnerability."
"value": "A vulnerability classified as critical was found in SourceCodester Simple and Nice Shopping Cart Script. Affected by this vulnerability is an unknown functionality of the file /mkshop/Men/profile.php. The manipulation of the argument mem_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207001 was assigned to this vulnerability."
}
]
},
@ -57,16 +57,20 @@
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L"
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https:\/\/s1.ax1x.com\/2022\/08\/14\/vUSruD.png"
"url": "https://s1.ax1x.com/2022/08/14/vUSruD.png",
"refsource": "MISC",
"name": "https://s1.ax1x.com/2022/08/14/vUSruD.png"
},
{
"url": "https:\/\/vuldb.com\/?id.207001"
"url": "https://vuldb.com/?id.207001",
"refsource": "MISC",
"name": "https://vuldb.com/?id.207001"
}
]
}