Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rmg2-m3gq-mwp8

Опубликовано: 15 июн. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

A vulnerability was found in Guangdong Baolun Electronics IP Network Broadcasting Service Platform 2.0. It has been classified as critical. Affected is an unknown function of the file /api/v2/maps. The manipulation of the argument orderColumn leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268692. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was found in Guangdong Baolun Electronics IP Network Broadcasting Service Platform 2.0. It has been classified as critical. Affected is an unknown function of the file /api/v2/maps. The manipulation of the argument orderColumn leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268692. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 15%
0.00048
Низкий

7.3 High

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 7.3
nvd
больше 1 года назад

A vulnerability was found in Guangdong Baolun Electronics IP Network Broadcasting Service Platform 2.0. It has been classified as critical. Affected is an unknown function of the file /api/v2/maps. The manipulation of the argument orderColumn leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268692. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 15%
0.00048
Низкий

7.3 High

CVSS3

Дефекты

CWE-89