Loading HuntDB...

GHSA-vmcm-jg37-m6m9

GitHub Security Advisory

⚠ Unreviewed CRITICAL Has CVE

Advisory Details

In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.

Related CVEs

Key Information

GHSA ID
GHSA-vmcm-jg37-m6m9
Published
May 24, 2022 5:37 PM
Last Modified
May 24, 2022 5:37 PM
CVSS Score
9.0 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: June 27, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.