Description
SQL injection vulnerability in ajax.php in evalSMSI 2.1.03 allows remote attackers to execute arbitrary SQL commands via the query parameter in the (1) question action, and possibly the (2) sub_par or (3) num_quest actions.
Exploits (1)
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/62177
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38478
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/38116
Exploit x_refsource_misc
http://packetstormsecurity.org/1002-exploits/corelan-10-008-evalmsi.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/56152
Various Sources x_refsource_misc
http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-008-evalmsi-2-1-03-multiple-vulnerabilities/
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/509370/100/0/threaded
Scores
EPSS
0.0103
EPSS Percentile
77.4%
Details
CWE
CWE-89
Status
published
Products (1)
myshell/evalsmsi
2.1.03
Published
Feb 11, 2010
Tracked Since
Feb 18, 2026