Vulnerability Description
A vulnerability was found in itsourcecode Online Discussion Forum 1.0. It has been rated as critical. This issue affects some unknown processing of the file register_me.php. The manipulation of the argument eaddress leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-267407.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Online Discussion Forum Project | Online Discussion Forum | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/kingshao0312/cve/issues/1ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.267407Permissions RequiredVDB Entry
- https://vuldb.com/?id.267407Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?submit.351115Third Party AdvisoryVDB Entry
- https://github.com/kingshao0312/cve/issues/1ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.267407Permissions RequiredVDB Entry
- https://vuldb.com/?id.267407Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?submit.351115Third Party AdvisoryVDB Entry
FAQ
What is CVE-2024-5733?
CVE-2024-5733 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in itsourcecode Online Discussion Forum 1.0. It has been rated as critical. This issue affects some unknown processing of the file register_me.php. The manipulation of the ar...
How severe is CVE-2024-5733?
CVE-2024-5733 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5733?
Check the references section above for vendor advisories and patch information. Affected products include: Online Discussion Forum Project Online Discussion Forum.