CVE-2010-0614

Myshell Evalsmsi - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in ajax.php in evalSMSI 2.1.03 allows remote attackers to execute arbitrary SQL commands via the query parameter in the (1) question action, and possibly the (2) sub_par or (3) num_quest actions.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ekse · textwebappsphp
https://www.exploit-db.com/exploits/33602

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/62177
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38478
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/38116
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/56152
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/509370/100/0/threaded

Scores

EPSS 0.0103
EPSS Percentile 77.4%

Details

CWE
CWE-89
Status published
Products (1)
myshell/evalsmsi 2.1.03
Published Feb 11, 2010
Tracked Since Feb 18, 2026