Show plain JSON{"id": "CVE-2010-4780", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-04-07T14:23:53.310", "references": [{"url": "http://enanocms.org/News:Article/2010/11/16/Enano_1.1.8.2c_1.0.6pl3.2c_and_1.1.7pl2_released", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/69537", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.org/files/view/96229/enanocms-sqldisclose.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/42375", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8183", "source": "cve@mitre.org"}, {"url": "http://www.exploit-db.com/exploits/15645", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.htbridge.ch/advisory/sql_injection_in_enano_cms.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/45120", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://enanocms.org/News:Article/2010/11/16/Enano_1.1.8.2c_1.0.6pl3.2c_and_1.1.7pl2_released", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/69537", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.org/files/view/96229/enanocms-sqldisclose.txt", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/42375", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8183", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.exploit-db.com/exploits/15645", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.htbridge.ch/advisory/sql_injection_in_enano_cms.html", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/45120", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in the check_banlist function in includes/sessions.php in Enano CMS 1.1.7pl1; 1.0.6pl2; and possibly other versions before 1.1.8, 1.0.6pl3, and 1.1.7pl2 allows remote attackers to execute arbitrary SQL commands via the email parameter to index.php. NOTE: some of these details are obtained from third party information."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n check_banlist en include/sessions.php en Enano CMS v1.1.7pl1; v1.0.6pl2, y posiblemente otras versiones anteriores a v1.1.8, v1.0.6pl3 y v1.1.7pl2 permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s de el par\u00e1metro email sobre index.php. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:enanocms:enano_cms:*:pl2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87232E70-4CA8-45B8-9080-70EA2994E5B9", "versionEndIncluding": "1.1.7"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A43E52E-03B5-40B9-9E3A-5B3353644B22"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8941C96B-66D2-4698-8F4F-1BCA7CFCF2DB"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:0.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A58771D-47B7-4F25-976B-BA7C5183EDC9"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FD6E68E-84F1-4122-862E-89799A7E0586"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A913B90-0B53-487D-AAB5-44F779C0E571"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36763963-23E9-41E4-AFCC-8FF18B538200"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1D358C3-B308-4160-A4E9-D0CE3A4BA9BE"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB19E3D4-494B-4B69-8A11-2AFD11459F1D"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92CC2F62-EC91-4FE1-B9D2-613FBCAB59C3"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4666B807-8D49-4D37-8CCD-AF269F8ADEC1"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.2b1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "133B45F2-0050-416C-AE41-F9F1CAA6B29E"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A975A4E-8D89-4675-B8DA-5A73E9A56230"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7C54293-C7AE-4980-8E3D-ABD760B7D1EF"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A27167E0-9C0D-4178-96E9-BDE9ED3BE0BE"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83C931C8-143E-4C9A-9569-3F3C85E32AE9"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.6:pl1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D0658C-4250-4611-8661-8A94D9B5946C"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.6:pl2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A0C14A8-F929-4C13-9531-CF8A9CF83D74"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.0.6:pl3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5F7F562-B4FA-4B31-801C-30A440BB4941"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB91BB14-0F5E-43EB-9F97-29EF92C3B6CE"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "774A4E29-ABAE-44FE-8B8A-BA4B83C94998"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C070984-CC4F-4372-95DD-A2D353FC0D15"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91E8277D-DA0D-431C-BD90-C4FDCCB2F547"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F715029A-6D07-4BCC-B520-CE39EC5C4550"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97BF0303-B693-4D84-8E39-B367FDE28BF1"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8098C7BB-C113-401B-ADBA-58E7FE6972AE"}, {"criteria": "cpe:2.3:a:enanocms:enano_cms:1.1.7:pl1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC538FEC-B4C3-4984-8ABB-486F04F1D66D"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}