- Description
- SQL injection vulnerability in Default.asp in EzASPSite 2.0 RC3 and earlier allows remote attackers to execute arbitrary SQL commands and obtain the SHA1 hash of the admin password via the Scheme parameter.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:N/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ezaspsite:ezaspsite:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1A88D784-6700-49BD-B4AD-3887EAB385C8",
"versionEndIncluding": "2.0_rc3"
}
],
"operator": "OR"
}
]
}
]