Количество 6
Количество 6
CVE-2020-25638
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
CVE-2020-25638
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
CVE-2020-25638
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
CVE-2020-25638
A flaw was found in hibernate-core in versions prior to and including ...
GHSA-j8jw-g6fq-mp7h
SQL injection in hibernate-core
BDU:2022-00307
Уязвимость интерфейса API JPA Criteria службы запросов Hibernate ORM, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-25638 A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. | CVSS3: 7.4 | 1% Низкий | около 5 лет назад | |
CVE-2020-25638 A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. | CVSS3: 7.4 | 1% Низкий | больше 5 лет назад | |
CVE-2020-25638 A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. | CVSS3: 7.4 | 1% Низкий | около 5 лет назад | |
CVE-2020-25638 A flaw was found in hibernate-core in versions prior to and including ... | CVSS3: 7.4 | 1% Низкий | около 5 лет назад | |
GHSA-j8jw-g6fq-mp7h SQL injection in hibernate-core | CVSS3: 7.4 | 1% Низкий | почти 4 года назад | |
BDU:2022-00307 Уязвимость интерфейса API JPA Criteria службы запросов Hibernate ORM, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность | CVSS3: 7.4 | 1% Низкий | больше 5 лет назад |
Уязвимостей на страницу