CVE-2010-2338

Vunet VU Web Visitor Analyst - SQL Injection

Title source: rule
STIX 2.1

Description

Multiple SQL injection vulnerabilities in redir.asp in VU Web Visitor Analyst allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password parameter. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WRITEUP VERIFIED
by L0rd CrusAd3r · textwebappsasp
https://www.exploit-db.com/exploits/13842

References (6)

Core 6
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/40176
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/59396
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/13842
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/1460
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/65483

Scores

EPSS 0.0174
EPSS Percentile 82.6%

Details

CWE
CWE-89
Status published
Products (1)
vunet/vu_web_visitor_analyst
Published Jun 18, 2010
Tracked Since Feb 18, 2026