Логотип exploitDog
bind:CVE-2021-27950
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-27950

Количество 2

Количество 2

nvd логотип

CVE-2021-27950

больше 4 лет назад

A SQL injection vulnerability in azurWebEngine in Sita AzurCMS through 1.2.3.12 allows an authenticated attacker to execute arbitrary SQL commands via the id parameter to mesdocs.ajax.php in azurWebEngine/eShop. By default, the query is executed as DBA.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-cjhq-3474-22qf

больше 3 лет назад

A SQL injection vulnerability in azurWebEngine in Sita AzurCMS through 1.2.3.12 allows an authenticated attacker to execute arbitrary SQL commands via the id parameter to mesdocs.ajax.php in azurWebEngine/eShop. By default, the query is executed as DBA.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-27950

A SQL injection vulnerability in azurWebEngine in Sita AzurCMS through 1.2.3.12 allows an authenticated attacker to execute arbitrary SQL commands via the id parameter to mesdocs.ajax.php in azurWebEngine/eShop. By default, the query is executed as DBA.

CVSS3: 8.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-cjhq-3474-22qf

A SQL injection vulnerability in azurWebEngine in Sita AzurCMS through 1.2.3.12 allows an authenticated attacker to execute arbitrary SQL commands via the id parameter to mesdocs.ajax.php in azurWebEngine/eShop. By default, the query is executed as DBA.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу