Description
SQL injection vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to obtain product information via a crafted HTTP request parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Andrew Fasano · pythonremotelinux
https://www.exploit-db.com/exploits/40911
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/94823
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1037433
Vendor Advisory x_refsource_confirm
https://kc.mcafee.com/corporate/index?page=content&id=SB10181
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/40911/
Scores
CVSS v3
6.2
EPSS
0.0185
EPSS Percentile
83.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L
Details
CWE
CWE-89
Status
published
Products (2)
Intel/VirusScan Enterprise Linux (VSEL)
2.0.3 (and earlier)
mcafee/virusscan_enterprise
< 2.0.3
Published
Mar 14, 2017
Tracked Since
Feb 18, 2026