Описание
An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 6.5.8-1 |
| esm-apps/noble | needs-triage | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| jammy | DNE | |
| mantic | ignored | end of life, was needs-triage |
| noble | needs-triage | |
| oracular | not-affected | 6.5.8-1 |
| plucky | not-affected | 6.5.8-1 |
| questing | not-affected | 6.5.8-1 |
Показывать по
EPSS
8.8 High
CVSS3
Связанные уязвимости
An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request.
An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0 ...
An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request.
EPSS
8.8 High
CVSS3