From 43591cabf08f33dbabadc3b83322742cab97c500 Mon Sep 17 00:00:00 2001 From: Shubham Pandey <56669789+shubham-s-pandey@users.noreply.github.com> Date: Sun, 28 Dec 2025 19:34:53 +0530 Subject: [PATCH] Improve GHSA-qcc3-2x2p-6v35 --- .../GHSA-qcc3-2x2p-6v35.json | 22 +++++++++++++++++-- 1 file changed, 20 insertions(+), 2 deletions(-) diff --git a/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json b/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json index 99b672c14fc58..137ae8277d700 100644 --- a/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json +++ b/advisories/unreviewed/2024/03/GHSA-qcc3-2x2p-6v35/GHSA-qcc3-2x2p-6v35.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-qcc3-2x2p-6v35", - "modified": "2024-08-02T18:31:08Z", + "modified": "2024-08-02T18:31:09Z", "published": "2024-03-20T15:32:21Z", "aliases": [ "CVE-2024-28595" ], + "summary": "CVE-2024-28595", "details": "SQL Injection vulnerability in Employee Management System v1.0 allows attackers to run arbitrary SQL commands via the admin_id parameter in update-admin.php.", "severity": [ { @@ -13,7 +14,24 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",