SQL injection vulnerability in Enterprise Architect 16.0.1605 32-bit allows attackers to run arbitrary SQL commands via the Find parameter in the Select Classifier dialog box..
References
Link | Resource |
---|---|
https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection | Exploit Third Party Advisory |
https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection - Exploit, Third Party Advisory |
09 Feb 2024, 17:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Sparxsystems enterprise Architect
Sparxsystems |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection - Exploit, Third Party Advisory | |
CWE | CWE-89 | |
CPE | cpe:2.3:a:sparxsystems:enterprise_architect:16.0.1605:*:*:*:*:*:x86:* |
31 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-31 21:15
Updated : 2024-11-21 07:31
NVD link : CVE-2022-47072
Mitre link : CVE-2022-47072
CVE.ORG link : CVE-2022-47072
JSON object : View
Products Affected
sparxsystems
- enterprise_architect
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')