SQL Injection Vulnerabilities in GoAutoDial GoAdmin CE by GoAutoDial
CVE-2015-2843

Currently unrated

Key Information:

Vendor

Goautodial

Vendor
CVE Published:
12 May 2015

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 80%

What is CVE-2015-2843?

GoAutoDial GoAdmin CE versions prior to 3.3-1421902800 are susceptible to multiple SQL injection vulnerabilities that can be exploited by remote attackers. These vulnerabilities allow attackers to inject and execute arbitrary SQL commands through the user_name and user_pass parameters in go_login.php, as well as via specific paths in go_login/validate_credentials/admin/ and index.php/go_site/go_get_user_info/. If successfully exploited, these vulnerabilities can lead to unauthorized access to sensitive user data and potentially allow attackers to manipulate the underlying database.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

80% chance of being exploited in the next 30 days.

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.