{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0663","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-03T20:39:14.904Z","datePublished":"2023-02-03T20:40:32.253Z","dateUpdated":"2024-08-02T05:17:50.335Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T20:43:28.351Z"},"title":"Calendar Event Management System Login Page sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"Calendar Event Management System","versions":[{"version":"2.3.0","status":"affected"}],"modules":["Login Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Calendar Event Management System 2.3.0. It has been rated as critical. This issue affects some unknown processing of the component Login Page. The manipulation of the argument name/pwd leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-220175."},{"lang":"de","value":"Eine Schwachstelle wurde in Calendar Event Management System 2.3.0 ausgemacht. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Komponente Login Page. Durch Beeinflussen des Arguments name/pwd mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-03T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-03T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-04T19:11:27.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Gab3 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.220175","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.220175","tags":["signature","permissions-required"]},{"url":"https://www.youtube.com/watch?v=UsSZU6EWB1E","tags":["media-coverage"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:17:50.335Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.220175","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.220175","tags":["signature","permissions-required","x_transferred"]},{"url":"https://www.youtube.com/watch?v=UsSZU6EWB1E","tags":["media-coverage","x_transferred"]}]}]}}