diff --git a/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json b/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json index 99b672c14fc58..137ae8277d700 100644 --- a/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json +++ b/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-qcc3-2x2p-6v35", - "modified": "2024-08-02T18:31:08Z", + "modified": "2024-08-02T18:31:09Z", "published": "2024-03-20T15:32:21Z", "aliases": [ "CVE-2024-28595" ], + "summary": "CVE-2024-28595", "details": "SQL Injection vulnerability in Employee Management System v1.0 allows attackers to run arbitrary SQL commands via the admin_id parameter in update-admin.php.", "severity": [ { @@ -13,7 +14,24 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",