CVE-2005-3022
Published Sep 21, 2005
Last updated 8 years ago
Overview
- Description
- Multiple SQL injection vulnerabilities in vBulletin 3.0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, (2) userid parameter to user.php, (3) calendar parameter to admincalendar.php, (4) cronid parameter to cronlog.php, (5) usergroupid parameter to email.php, (6) help parameter to help.php, (7) rvt parameter to language.php, (8) keep parameter to phrase.php, or (9) updateprofilepic parameter to usertools.php.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70BC7FDF-AEAD-4BCA-AB0B-36F62D3D92A1" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAC28EB5-343A-4B55-8ECE-8C46D304A1BC" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C3499B6-7DC8-4DE5-80EB-1EEA3307ABA8" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B53F61D2-5FD2-4625-A9FB-8E0258924BAC" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEA26ED0-6DF8-4730-AE19-E8F4AB9AC906" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "306C6BDF-C687-4B63-998B-B520DF1D1B1B" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF18ED7C-80BB-4A78-8809-9AAE817876A4" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA385E01-7FA0-4CC3-ADFE-0B3184A9093D" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D731A35-E0DB-4F40-A981-C38229A2EB1E" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4053C8E5-5510-4814-A46E-89B81266C29D" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E6753AB-DFCF-4D40-8267-645810F7967E" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B2B3772-A566-4A51-8B51-68E78C86CB08" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAFBBAA9-BD46-44E3-9618-D87384E959A2" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31E594B0-05D5-46C2-8F06-F58E3F8BBD1F" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04E0702A-9235-45BE-82A8-BFD57A0DCC9E" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "799F983E-908D-4B9F-9C99-6422863E7807" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD0914B4-24A9-438F-9B44-A6809D755168" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D29DB4E2-C87F-4D45-BA8A-B38835FCAD44" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA1A0EF6-1267-463E-B4F7-83D2ACB64E43" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90BE006A-0F2D-4F3A-A335-176C5A5978E9" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "151876D4-B72E-4D5F-A151-5A3DCAE51299" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "984E8E57-57E5-4FEC-9210-4083AD400F94" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1760CC7E-5297-4F8A-8A28-3689F6075CAE" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74013F50-0677-454E-8E6C-101CF210E989" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29DC951B-860E-4AF1-8908-71C7099FB19A" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87198098-906E-4C39-B293-34BBB1779011" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD10C2CD-DEDA-4CC7-B5E9-B9218E1A5851" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C43639D6-C4FE-486B-9822-9DDDD922CB53" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A4E9C82-64CF-4487-8947-ED745C41945A" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D099410F-AD78-4EF1-879E-BEED838B90E0" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B411D271-87B5-4A82-8E05-5277E8E205E2" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09FD2B80-AEB5-444D-AEC3-F59E6727BCF3" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CA6003D-1E93-472E-B037-8D0922C4247C" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B366723-3598-4B4A-AFB9-E4A9616D033B" }, { "criteria": "cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EFD7266-0E3B-44B3-AC8E-DE0BFC5E2939" } ], "operator": "OR" } ] } ]