Логотип exploitDog
bind:CVE-2023-48645
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-48645

Количество 2

Количество 2

nvd логотип

CVE-2023-48645

около 2 лет назад

An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-5j36-2f99-3384

около 2 лет назад

An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-48645

An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.

CVSS3: 7.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-5j36-2f99-3384

An issue was discovered in the Archibus app 4.0.3 for iOS. It uses a local database that is synchronized with a Web central server instance every time the application is opened, or when the refresh button is used. There is a SQL injection in the search work request feature in the Maintenance module of the app. This allows performing queries on the local database.

CVSS3: 7.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу