Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-2684

Опубликовано: 19 сент. 2012
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to execute arbitrary SQL commands via the (1) agent or (2) object id.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise MRG 1cuminWill not fix
MRG for RHEL-5 v. 2condorFixedRHSA-2012:127819.09.2012
MRG for RHEL-5 v. 2condor-wallabyFixedRHSA-2012:127819.09.2012
MRG for RHEL-5 v. 2condor-wallaby-base-dbFixedRHSA-2012:127819.09.2012
MRG for RHEL-5 v. 2cuminFixedRHSA-2012:127819.09.2012
MRG for RHEL-5 v. 2sesameFixedRHSA-2012:127819.09.2012
MRG for RHEL-5 v. 2wallabyFixedRHSA-2012:127819.09.2012
Red Hat Enterprise MRG 2condorFixedRHSA-2012:128119.09.2012
Red Hat Enterprise MRG 2condor-wallabyFixedRHSA-2012:128119.09.2012
Red Hat Enterprise MRG 2condor-wallaby-base-dbFixedRHSA-2012:128119.09.2012

Показывать по

Дополнительная информация

Статус:

Moderate

EPSS

Процентиль: 69%
0.00605
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to execute arbitrary SQL commands via the (1) agent or (2) object id.

github
больше 3 лет назад

Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to execute arbitrary SQL commands via the (1) agent or (2) object id.

EPSS

Процентиль: 69%
0.00605
Низкий

4.3 Medium

CVSS2