A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. This issue affects the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation of the argument name leads to improper input validation. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
History

Thu, 12 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sourcecodester:phone_shop_sales_managements_system_using_php_with_source_code:1.0:*:*:*:*:*:*:*
Vendors & Products Sourcecodester
Sourcecodester phone Shop Sales Managements System Using Php With Source Code

Wed, 11 Dec 2024 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Razormist
Razormist phone Contact Manager System
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*
Vendors & Products Razormist
Razormist phone Contact Manager System

Mon, 09 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester phone Shop Sales Managements System Using Php With Source Code
CPEs cpe:2.3:a:sourcecodester:phone_shop_sales_managements_system_using_php_with_source_code:1.0:*:*:*:*:*:*:*
Vendors & Products Sourcecodester
Sourcecodester phone Shop Sales Managements System Using Php With Source Code
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Dec 2024 01:30:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. This issue affects the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation of the argument name leads to improper input validation. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Title SourceCodester Phone Contact Manager System User Menu MenuDisplayStart input validation
Weaknesses CWE-20
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-12-09T01:00:19.368Z

Updated: 2024-12-12T13:45:05.477Z

Reserved: 2024-12-08T17:08:38.369Z

Link: CVE-2024-12353

cve-icon Vulnrichment

Updated: 2024-12-09T20:13:50.885Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-09T02:15:18.920

Modified: 2024-12-10T23:37:06.613

Link: CVE-2024-12353

cve-icon Redhat

No data.