CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
37.7%
SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the followingΒ βcodeβ in β/admin/mod_reservation/controller.phpβ parameter.
Vendor | Product | Version | CPE |
---|---|---|---|
janobe | debit_card_payment | 1.0 | cpe:/a:janobe:debit_card_payment:1.0::: |
janobe | school_event_management_system | 1.0 | cpe:/a:janobe:school_event_management_system:1.0::: |
janobe | credit_card | 1.0 | cpe:/a:janobe:credit_card:1.0::: |
janobe | paypal | 1.0 | cpe:/a:janobe:paypal:1.0::: |
janobe | school_attendence_monitoring_system | 1.0 | cpe:/a:janobe:school_attendence_monitoring_system:1.0::: |
[
{
"defaultStatus": "unaffected",
"product": "Janobe PayPal",
"vendor": "Janobe",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Janobe Credit Card",
"vendor": "Janobe",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Janobe Debit Card Payment",
"vendor": "Janobe",
"versions": [
{
"status": "affected",
"version": "1.0"
}
]
}
]