Количество 5
Количество 5
CVE-2025-3818
A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-3818
A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-3818
A vulnerability, which was classified as critical, was found in webpy ...
GHSA-9g47-36rw-gjh2
A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
BDU:2025-05028
Уязвимость функции PostgresDB._process_insert_query() (file web/db.py) веб-фреймворка создания веб-приложений web.py, позволяющая нарушителю выполнить произвольные SQL-команды
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-3818 A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 6.3 | 0% Низкий | 10 месяцев назад | |
CVE-2025-3818 A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 6.3 | 0% Низкий | 10 месяцев назад | |
CVE-2025-3818 A vulnerability, which was classified as critical, was found in webpy ... | CVSS3: 6.3 | 0% Низкий | 10 месяцев назад | |
GHSA-9g47-36rw-gjh2 A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 6.3 | 0% Низкий | 10 месяцев назад | |
BDU:2025-05028 Уязвимость функции PostgresDB._process_insert_query() (file web/db.py) веб-фреймворка создания веб-приложений web.py, позволяющая нарушителю выполнить произвольные SQL-команды | CVSS3: 6.3 | 0% Низкий | 10 месяцев назад |
Уязвимостей на страницу