Vulnerability Description
A vulnerability classified as critical has been found in Kashipara Food Management System up to 1.0. This affects an unknown part of the file rawstock_used_damaged_smt.php. The manipulation of the argument product_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249831.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kashipara | Food Management System | <= 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20ManExploitThird Party Advisory
- https://vuldb.com/?ctiid.249831Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.249831Third Party Advisory
- https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20ManExploitThird Party Advisory
- https://vuldb.com/?ctiid.249831Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.249831Third Party Advisory
FAQ
What is CVE-2024-0276?
CVE-2024-0276 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability classified as critical has been found in Kashipara Food Management System up to 1.0. This affects an unknown part of the file rawstock_used_damaged_smt.php. The manipulation of the arg...
How severe is CVE-2024-0276?
CVE-2024-0276 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-0276?
Check the references section above for vendor advisories and patch information. Affected products include: Kashipara Food Management System.