Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2022-38488
logrocket-oauth2-example through 2020-05-27 allows SQL injection via the /auth/register username parameter.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.068
EPSS Ranking
90.9%
CVSS Severity
CVSS v3 Score
9.8
References
https://archive.ph/PecmD
https://archive.ph/VlGDa
https://blog.logrocket.com/implement-oauth-2-0-node-js/
https://github.com/diogosouza/logrocket-oauth2-example
https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example
https://archive.ph/PecmD
https://archive.ph/VlGDa
https://blog.logrocket.com/implement-oauth-2-0-node-js/
https://github.com/diogosouza/logrocket-oauth2-example
https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example
Products affected by CVE-2022-38488
Logrocket-Oauth2-Example Project
»
Logrocket-Oauth2-Example
»
Version:
N/A
cpe:2.3:a:logrocket-oauth2-example_project:logrocket-oauth2-example:-
Logrocket-Oauth2-Example Project
»
Logrocket-Oauth2-Example
»
Version:
2020-05-27
cpe:2.3:a:logrocket-oauth2-example_project:logrocket-oauth2-example:2020-05-27
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved