A vulnerability was found in Benner ModernaNet up to 1.1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Home/JS_CarregaCombo?formName=DADOS_PESSOAIS_PLANO&additionalCondition=&insideParameters=&elementToReturn=DADOS_PESSOAIS_PLANO&ordenarPelaDescricao=true&direcaoOrdenacao=asc&_=1739290047295. The manipulation leads to sql injection. The attack may be launched remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component.
References
| Link | Resource |
|---|---|
| https://github.com/yago3008/CVES | Third Party Advisory |
| https://vuldb.com/?ctiid.296690 | Permissions Required VDB Entry |
| https://vuldb.com/?id.296690 | Permissions Required VDB Entry |
| https://vuldb.com/?submit.499115 | Third Party Advisory VDB Entry Exploit |
Configurations
History
28 Feb 2025, 01:55
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Modernasistemas modernanet
Modernasistemas |
|
| CPE | cpe:2.3:a:modernasistemas:modernanet:*:*:*:*:*:*:*:* | |
| References | () https://vuldb.com/?ctiid.296690 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.296690 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?submit.499115 - Third Party Advisory, VDB Entry, Exploit | |
| References | () https://github.com/yago3008/CVES - Third Party Advisory |
25 Feb 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-25 00:15
Updated : 2025-02-28 01:55
NVD link : CVE-2025-1640
Mitre link : CVE-2025-1640
JSON object : View
Products Affected
modernasistemas
- modernanet
