- Description
- SQL injection vulnerability in Grayscale Blog 0.8.0, and possibly earlier versions, might allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to (a) userdetail.php, id and (2) url parameter to (b) jump.php, and id variable to (c) detail.php.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:grayscale:grayscale_blog:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6676C066-8E09-4107-A360-D6DB8CB7AA07",
"versionEndIncluding": "0.8.0"
}
],
"operator": "OR"
}
]
}
]