Логотип exploitDog
bind:CVE-2020-37163
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-37163

Количество 2

Количество 2

nvd логотип

CVE-2020-37163

2 дня назад

QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate database queries through the '_located' parameter in the find_matches endpoint. Attackers can inject UNION-based SQL statements to extract database information including user credentials, database name, and system version.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-2whv-fqw2-pp6p

2 дня назад

QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate database queries through the '_located' parameter in the find_matches endpoint. Attackers can inject UNION-based SQL statements to extract database information including user credentials, database name, and system version.

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-37163

QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate database queries through the '_located' parameter in the find_matches endpoint. Attackers can inject UNION-based SQL statements to extract database information including user credentials, database name, and system version.

CVSS3: 8.2
0%
Низкий
2 дня назад
github логотип
GHSA-2whv-fqw2-pp6p

QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate database queries through the '_located' parameter in the find_matches endpoint. Attackers can inject UNION-based SQL statements to extract database information including user credentials, database name, and system version.

CVSS3: 8.2
0%
Низкий
2 дня назад

Уязвимостей на страницу