Show plain JSON{"id": "CVE-2010-4738", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-02-16T03:00:03.273", "references": [{"url": "http://osvdb.org/69627", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/69628", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.org/files/view/96389/raemediaincresmas-sql.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/42515", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8080", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8082", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8088", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/45211", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/45212", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/69627", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/69628", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.org/files/view/96389/raemediaincresmas-sql.txt", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/42515", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8080", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8082", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8088", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/45211", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/45212", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in Rae Media INC Real Estate Single and Multi Agent System 3.0 allow remote attackers to execute arbitrary SQL commands via the probe parameter to (1) multi/city.asp in the Multi Agent System and (2) resulttype.asp in the Single Agent System."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Rae Media INC Real Estate Single y Multi Agent System v3.0 permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s del par\u00e1metro probe a (1) multi/city.asp en Multi Agent System y (2) resulttype.asp en Single Agent System."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:raemedia:real_estate_single_and_multi_agent_system:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51DCF3ED-A413-4FA4-A537-4025C199542E"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}