CVE-2015-10061

A vulnerability was found in evandro-machado Trabalho-Web2. It has been classified as critical. This affects an unknown part of the file src/java/br/com/magazine/dao/ClienteDAO.java. The manipulation leads to sql injection. The patch is named f59ac954625d0a4f6d34f069a2e26686a7a20aeb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218427.
References
Link Resource
https://github.com/evandro-machado/Trabalho-Web2/commit/f59ac954625d0a4f6d34f069a2e26686a7a20aeb Patch Third Party Advisory
https://vuldb.com/?ctiid.218427 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.218427 Third Party Advisory VDB Entry
https://github.com/evandro-machado/Trabalho-Web2/commit/f59ac954625d0a4f6d34f069a2e26686a7a20aeb Patch Third Party Advisory
https://vuldb.com/?ctiid.218427 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.218427 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:trabalho-web2_project:trabalho-web2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:24

Type Values Removed Values Added
CVSS v2 : 5.2
v3 : 9.8
v2 : 5.2
v3 : 5.5
References () https://github.com/evandro-machado/Trabalho-Web2/commit/f59ac954625d0a4f6d34f069a2e26686a7a20aeb - Patch, Third Party Advisory () https://github.com/evandro-machado/Trabalho-Web2/commit/f59ac954625d0a4f6d34f069a2e26686a7a20aeb - Patch, Third Party Advisory
References () https://vuldb.com/?ctiid.218427 - Permissions Required, Third Party Advisory, VDB Entry () https://vuldb.com/?ctiid.218427 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.218427 - Third Party Advisory, VDB Entry () https://vuldb.com/?id.218427 - Third Party Advisory, VDB Entry

07 Nov 2023, 02:23

Type Values Removed Values Added
CWE CWE-89

20 Oct 2023, 09:15

Type Values Removed Values Added
Summary A vulnerability was found in evandro-machado Trabalho-Web2. It has been classified as critical. This affects an unknown part of the file src/java/br/com/magazine/dao/ClienteDAO.java. The manipulation leads to sql injection. The name of the patch is f59ac954625d0a4f6d34f069a2e26686a7a20aeb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218427. A vulnerability was found in evandro-machado Trabalho-Web2. It has been classified as critical. This affects an unknown part of the file src/java/br/com/magazine/dao/ClienteDAO.java. The manipulation leads to sql injection. The patch is named f59ac954625d0a4f6d34f069a2e26686a7a20aeb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218427.
CWE CWE-89

Information

Published : 2023-01-17 16:15

Updated : 2024-11-21 02:24


NVD link : CVE-2015-10061

Mitre link : CVE-2015-10061

CVE.ORG link : CVE-2015-10061


JSON object : View

Products Affected

trabalho-web2_project

  • trabalho-web2
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')