diff --git a/advisories/unreviewed/2024/03/GHSA-8678-pm6w-2hg6/GHSA-8678-pm6w-2hg6.json b/advisories/unreviewed/2024/03/GHSA-8678-pm6w-2hg6/GHSA-8678-pm6w-2hg6.json index f4726f64f8b1f..bd23b67b78a3b 100644 --- a/advisories/unreviewed/2024/03/GHSA-8678-pm6w-2hg6/GHSA-8678-pm6w-2hg6.json +++ b/advisories/unreviewed/2024/03/GHSA-8678-pm6w-2hg6/GHSA-8678-pm6w-2hg6.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-8678-pm6w-2hg6", - "modified": "2024-08-28T18:31:53Z", + "modified": "2024-08-28T18:32:59Z", "published": "2024-03-02T00:31:31Z", "aliases": [ "CVE-2024-27746" ], + "summary": "CVE-2024-27746", "details": "SQL Injection vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the email address parameter in the index.php component.", "severity": [ { @@ -13,7 +14,24 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -26,10 +44,6 @@ { "type": "WEB", "url": "https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html" - }, - { - "type": "WEB", - "url": "http://mayurik.com" } ], "database_specific": {