SQL injection vulnerability in ajax.php in evalSMSI 2.1.03 allows remote attackers to execute arbitrary SQL commands via the query parameter in the (1) question action, and possibly the (2) sub_par or (3) num_quest actions.
References
Configurations
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt - Exploit | |
References | () http://secunia.com/advisories/38478 - Vendor Advisory | |
References | () http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-008-evalmsi-2-1-03-multiple-vulnerabilities/ - | |
References | () http://www.osvdb.org/62177 - | |
References | () http://www.securityfocus.com/archive/1/509370/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/38116 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/56152 - |
Information
Published : 2010-02-11 17:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0614
Mitre link : CVE-2010-0614
CVE.ORG link : CVE-2010-0614
JSON object : View
Products Affected
myshell
- evalsmsi
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')