SQL injection vulnerability in Enterprise Architect 16.0.1605 32-bit allows attackers to run arbitrary SQL commands via the Find parameter in the Select Classifier dialog box..
References
Link | Resource |
---|---|
https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection | Exploit Third Party Advisory |
Configurations
History
09 Feb 2024, 17:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sparxsystems:enterprise_architect:16.0.1605:*:*:*:*:*:x86:* | |
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection - Exploit, Third Party Advisory | |
First Time |
Sparxsystems
Sparxsystems enterprise Architect |
31 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-31 21:15
Updated : 2024-02-28 20:54
NVD link : CVE-2022-47072
Mitre link : CVE-2022-47072
CVE.ORG link : CVE-2022-47072
JSON object : View
Products Affected
sparxsystems
- enterprise_architect
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')