Логотип exploitDog
bind:CVE-2022-30619
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-30619

Количество 2

Количество 2

nvd логотип

CVE-2022-30619

больше 3 лет назад

Editable SQL Queries behind Base64 encoding sending from the Client-Side to The Server-Side for a particular API used in legacy Work Center module. He attack is available for any authenticated user, in any kind of rule. under the function : /AgilePointServer/Extension/FetchUsingEncodedData in the parameter: EncodedData

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-4mxr-78jp-x8jx

больше 3 лет назад

Editable SQL Queries behind Base64 encoding sending from the Client-Side to The Server-Side for a particular API used in legacy Work Center module. He attack is available for any authenticated user, in any kind of rule. under the function : /AgilePointServer/Extension/FetchUsingEncodedData in the parameter: EncodedData

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-30619

Editable SQL Queries behind Base64 encoding sending from the Client-Side to The Server-Side for a particular API used in legacy Work Center module. He attack is available for any authenticated user, in any kind of rule. under the function : /AgilePointServer/Extension/FetchUsingEncodedData in the parameter: EncodedData

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
github логотип
GHSA-4mxr-78jp-x8jx

Editable SQL Queries behind Base64 encoding sending from the Client-Side to The Server-Side for a particular API used in legacy Work Center module. He attack is available for any authenticated user, in any kind of rule. under the function : /AgilePointServer/Extension/FetchUsingEncodedData in the parameter: EncodedData

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу