CVE-2010-1918
Published May 12, 2010
Last updated 15 years ago
Overview
- Description
- SQL injection vulnerability in ask_chat.php in eFront 3.6.2 and earlier allows remote attackers to execute arbitrary SQL commands via the chatrooms_ID parameter.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:efrontlearning:efront:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F066887-2FFE-4B33-BAC2-0E72A148D292", "versionEndIncluding": "3.6.2" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC4945EB-C2DC-41FB-8B49-8F27D1EBF19E" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9648CD63-D34E-4298-8D54-2FF72C257477" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E993440A-7730-4540-B6BC-5CFC1636FE0C" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9A7A13D-A022-49A0-BED7-701D333724B5" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8802C5D3-64CD-4199-ABBC-F5AEE5AFDE46" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD62DC8C-619B-4B61-AFAC-B7F6AFCBEB79" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A230995D-9925-4774-9CFC-4329F756EE36" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "395AFAEC-9811-4CB8-A105-AB9B9C85DA68" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7699ABE-E6AB-490F-9D1E-34F1EE2467B6" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "964B61AA-BB5B-4B19-8077-0AD5415D4788" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD265DFA-0072-48E5-86EE-079060723C10" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23A6A4AB-1DB7-44D2-8775-0018C926277E" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FCA0E12-672C-45B0-87A2-CE76A97F182F" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25674C08-9CD4-4B79-AC21-11107B71D4C0" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26E22BEE-F7BA-4795-BD8F-EF3FD66F6338" }, { "criteria": "cpe:2.3:a:efrontlearning:efront:3.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "188BA3F0-FDB5-4928-9A0A-6188A77446CB" } ], "operator": "OR" } ] } ]