SQL injection vulnerability in Enterprise Architect 16.0.1605 32-bit allows attackers to run arbitrary SQL commands via the Find parameter in the Select Classifier dialog box..
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection | Exploit Third Party Advisory | 
| https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:31
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection - Exploit, Third Party Advisory | 
09 Feb 2024, 17:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection - Exploit, Third Party Advisory | |
| CWE | CWE-89 | |
| First Time | 
        
        Sparxsystems
         Sparxsystems enterprise Architect  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.8  | 
| CPE | cpe:2.3:a:sparxsystems:enterprise_architect:16.0.1605:*:*:*:*:*:x86:* | 
31 Jan 2024, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-01-31 21:15
Updated : 2025-06-17 15:15
NVD link : CVE-2022-47072
Mitre link : CVE-2022-47072
CVE.ORG link : CVE-2022-47072
JSON object : View
Products Affected
                sparxsystems
- enterprise_architect
 
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
