Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
ummmmm nflpick-em.com LoadUsers.php _Load_Users sql injection
Vulnerability Description
A vulnerability classified as problematic was found in ummmmm nflpick-em.com up to 2.2.x. This vulnerability affects the function _Load_Users of the file html/includes/runtime/admin/JSON/LoadUsers.php. The manipulation of the argument sort leads to sql injection. The attack can be initiated remotely. The patch is identified as dd77a35942f527ea0beef5e0ec62b92e8b93211e. It is recommended to apply a patch to fix this issue. VDB-217270 is the identifier assigned to this vulnerability. NOTE: JSON entrypoint is only accessible via an admin account
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Vulnerability Title
NFLPick-Em.com SQL注入漏洞
Vulnerability Description
NFLPick-Em.com是ummmmm个人开发者的一个掷骰游戏。 NFLPick-Em.com 2.2.x 之前版本存在SQL注入漏洞,该漏洞源于文件 html/includes/runtime/admin/JSON/LoadUsers.php 的函数 _Load_Users,对参数排序的操作会导致SQL注入。
CVSS Information
N/A
Vulnerability Type
N/A