A vulnerability was found in seccome Ehoney and classified as critical. Affected by this issue is some unknown functionality of the file /api/v1/bait/set. The manipulation of the argument Payload leads to sql injection. The attack may be launched remotely. VDB-212414 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://vuldb.com/?id.212414 | Third Party Advisory |
https://vuldb.com/?id.212414 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
References | () https://vuldb.com/?id.212414 - Third Party Advisory |
31 Oct 2022, 19:29
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
References | (N/A) https://vuldb.com/?id.212414 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:ehoney_project:ehoney:-:*:*:*:*:*:*:* |
28 Oct 2022, 08:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-28 08:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-3732
Mitre link : CVE-2022-3732
CVE.ORG link : CVE-2022-3732
JSON object : View
Products Affected
ehoney_project
- ehoney