8.8
CVE-2023-49332
- EPSS 0.21%
- Published 20.05.2024 18:15:09
- Last modified 09.05.2025 13:28:17
- Source 0fc0942c-577d-436f-ae8e-945763
- Teams watchlist Login
- Open Login
Zoho ManageEngine ADAudit Plus versions below 7271 allows SQL injection while adding file shares.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Zohocorp ≫ Manageengine Adaudit Plus Version < 7.2
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7200
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7201
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7202
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7203
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7210
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7211
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7212
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7213
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7215
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7220
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7250
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7251
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7260
Zohocorp ≫ Manageengine Adaudit Plus Version7.2 Update7270
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.436 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
0fc0942c-577d-436f-ae8e-945763c79b02 | 8.3 | 2.8 | 5.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.