12 Sep 2018
CVE-2018-3884 - CVE Vulnerability
An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The sort_by and start parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required. (CVSS:0.0) (Last Update:2018-09-12)
Vulnerability Details : An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The sort_by and start parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required. Publish Date : 2018-09-12 Last Update Date : 2018-09-12 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2018-3884
- References For CVE-2018-3884
| ||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2018-3884There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |