{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T16:04:16.996","vulnerabilities":[{"cve":{"id":"CVE-2024-3816","sourceIdentifier":"cvd@cert.pl","published":"2024-06-28T13:15:03.283","lastModified":"2024-11-21T09:30:27.513","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sites managed in S@M CMS (Concept Intermedia) might be vulnerable to a blind SQL Injection executed using the search bar. \nOnly a part of observed services is vulnerable, but since vendor has not investigated the root problem, it is hard to determine when the issue appears."},{"lang":"es","value":"Los sitios administrados en S@M CMS (Concept Intermedia) pueden ser vulnerables a una inyección SQL ciega ejecutada mediante la barra de búsqueda. Sólo una parte de los servicios observados es vulnerable, pero como el proveedor no ha investigado la raíz del problema, es difícil determinar cuándo aparece el problema."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"cvd@cert.pl","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:conceptintermedia:s\\@m_cms:*:*:*:*:*:*:*:*","versionEndIncluding":"3.3","matchCriteriaId":"00A1AF5A-47FF-4080-A506-DB634A54CD6C"}]}]}],"references":[{"url":"https://cert.pl/en/posts/2024/06/CVE-2024-3800","source":"cvd@cert.pl","tags":["Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/06/CVE-2024-3800","source":"cvd@cert.pl","tags":["Third Party Advisory"]},{"url":"https://cert.pl/en/posts/2024/06/CVE-2024-3800","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://cert.pl/posts/2024/06/CVE-2024-3800","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}