A vulnerability classified as critical was found in code-projects Job Recruitment 1.0. This vulnerability affects unknown code of the file /_parse/_call_job/search_ajax.php of the component Job Post Handler. The manipulation of the argument n leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/UnrealdDei/cve/blob/main/sql9.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.289900 | Permissions Required VDB Entry |
https://vuldb.com/?id.289900 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.472441 | Third Party Advisory VDB Entry |
https://github.com/UnrealdDei/cve/blob/main/sql9.md | Exploit Third Party Advisory |
Configurations
History
03 Apr 2025, 14:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:* | |
First Time |
Code-projects
Code-projects job Recruitment |
|
References | () https://code-projects.org/ - Product | |
References | () https://github.com/UnrealdDei/cve/blob/main/sql9.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.289900 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.289900 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.472441 - Third Party Advisory, VDB Entry |
06 Jan 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/UnrealdDei/cve/blob/main/sql9.md - | |
Summary |
|
02 Jan 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-02 09:15
Updated : 2025-04-03 14:45
NVD link : CVE-2024-13092
Mitre link : CVE-2024-13092
CVE.ORG link : CVE-2024-13092
JSON object : View
Products Affected
code-projects
- job_recruitment