Vulnerability Description
A vulnerability, which was classified as critical, has been found in code-projects Job Recruitment 1.0. This issue affects some unknown processing of the file /_parse/_call_main_search_ajax.php of the component Seeker Profile Handler. The manipulation of the argument s1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Code-Projects | Job Recruitment | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/UnrealdDei/cve/blob/main/sql10.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.289901Permissions RequiredVDB Entry
- https://vuldb.com/?id.289901Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.472442Third Party AdvisoryVDB Entry
- https://github.com/UnrealdDei/cve/blob/main/sql10.mdExploitThird Party Advisory
FAQ
What is CVE-2024-13093?
CVE-2024-13093 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability, which was classified as critical, has been found in code-projects Job Recruitment 1.0. This issue affects some unknown processing of the file /_parse/_call_main_search_ajax.php of the...
How severe is CVE-2024-13093?
CVE-2024-13093 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-13093?
Check the references section above for vendor advisories and patch information. Affected products include: Code-Projects Job Recruitment.