CVE-2012-3953
Published Aug 12, 2012
Last updated 7 years ago
Overview
- Description
- SQL injection vulnerability in admin/index.php in phpList before 2.10.19 allows remote administrators to execute arbitrary SQL commands via the delete parameter to the editattributes page.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B68EDC00-D515-4707-AE6F-1D767B550A2E", "versionEndIncluding": "2.10.18" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B397B2A-72B7-47CB-8C6E-2316FAFB88CC" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "692FCE84-9520-48D0-8E5F-9B993C39FF0A" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40839A8B-4D5F-480C-8B38-A50DEBF9DB72" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0453EF7B-81B5-426C-B858-81B31F878A2A" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6523FE2E-A186-47E8-BB14-AA7EDCD14FBE" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.8.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1ED97CCA-E672-408D-8B1D-1D8E4424AF9C" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD0770F6-4C09-4D77-A25A-2D9C59B73795" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AB6728E-74D6-4939-AA0F-6560678201CA" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7212A91B-F75D-43CB-90E3-7420C0EA861A" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFECF781-0084-4FBD-BD88-E55C85D9480C" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5492C3F-8833-4F66-B98F-C2B33AD1F14B" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDCD31A1-884A-4381-A31C-211FB0F5AA52" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "411A8211-874A-4861-A7BE-F5106E324DBD" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2AEB89F-A8F3-41A2-8EFF-DF1F121A087A" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6245464-B7CC-4C38-A317-25864A8F4F4C" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A54E43F-4EB6-40DD-A18D-8A063C9CE4D8" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "249CAF32-29C8-4371-B4D6-72207C41BA8F" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BA31A08-C74F-4CDC-A644-68EAC4BA39E8" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31A5082D-90A9-42A2-A08C-CCE8F7F53262" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "531E8F27-4B50-4A8B-A6C4-0B617DAA6224" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B4496FE-646D-48BF-A1F4-F43CE623BE06" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D46171B6-6125-453B-9838-40BA5093B3C1" } ], "operator": "OR" } ] } ]