A vulnerability, which was classified as critical, was found in pouetnet pouet 2.0. This affects an unknown part. The manipulation of the argument howmany leads to sql injection. The name of the patch is 11d615931352066fb2f6dcb07428277c2cd99baf. It is recommended to apply a patch to fix this issue. The identifier VDB-217641 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.217641 | Third Party Advisory |
https://vuldb.com/?id.217641 | Third Party Advisory |
https://github.com/pouetnet/pouet2.0/commit/11d615931352066fb2f6dcb07428277c2cd99baf | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-08 02:15
Updated : 2023-01-12 08:47
NVD link : CVE-2020-36648
Mitre link : CVE-2020-36648
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
pouet
- pouet2.0