Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-30163

EPSS 46.37% · P98

Public Exploits 1

Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-30163

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Invision Community before 4.7.16 allow SQL injection via the applications/nexus/modules/front/store/store.php IPS\nexus\modules\front\store\_store::_categoryView() method, where user input passed through the filter request parameter is not properly sanitized before being used to execute SQL queries. This can be exploited by unauthenticated attackers to carry out Blind SQL Injection attacks.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Invision Community 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Invision Community是美国Invision公司的一个用于设计、开发移动应用UI的软件。 Invision Community 4.7.16之前版本存在安全漏洞,该漏洞源于应用程序未能正确地对请求参数进行清理,未经身份验证的攻击者可以利用这个漏洞执行盲SQL注入攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-30163

#POC DescriptionSource LinkShenlong Link
1IPS Community Suite is vulnerable to unauthenticated SQL injection via the filter[] parameter in the /index.php?/store/ endpoint, allowing attackers to extract sensitive information from the database. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-30163.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-30163

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-06-07 · 23 CVEs total

CVE-2024-325038.4 HIGHSamsung Mobile Processor 安全漏洞
CVE-2024-325028.4 HIGHSamsung Mobile Processor 安全漏洞
CVE-2024-319598.4 HIGHSamsung Mobile Processor 安全漏洞
CVE-2024-57327.3 HIGHClash Proxy Port improper authentication
CVE-2024-319586.8 MEDIUMSamsung Mobile Processor 安全漏洞
CVE-2023-49224Precor Touchscreen Console 安全漏洞
CVE-2024-36773Monstra CMS 安全漏洞
CVE-2024-36788Netgear WNR614 安全漏洞
CVE-2024-36790Netgear WNR614 安全漏洞
CVE-2024-36789Netgear WNR614 安全漏洞
CVE-2024-36787Netgear WNR614 安全漏洞
CVE-2024-36792Netgear WNR614 安全漏洞
CVE-2024-36673Pharmacy/Medical Store Point of Sale System SQL注入漏洞
CVE-2024-37385Roundcube Webmail 安全漏洞
CVE-2024-37384Roundcube Webmail 安全漏洞
CVE-2023-49222Precor Touchscreen Console 安全漏洞
CVE-2023-49223Precor Touchscreen Console 安全漏洞
CVE-2023-49221Precor Touchscreen Console 安全漏洞
CVE-2024-36827ebookmeta 安全漏洞
CVE-2024-37388ebookmeta 安全漏洞

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-30163

No comments yet


Leave a comment