6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
8 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
51.9%
Multiple SQL injection vulnerabilities in TorrentTrader Classic 1.09 allow remote authenticated users to execute arbitrary SQL commands via (1) the origmsg parameter to account-inbox.php; the categ parameter to (2) delreq.php and (3) admin-delreq.php; (4) the choice parameter to index.php; (5) the id parameter to modrules.php in an edited (aka edit) action; the (6) user, (7) torrent, (8) forumid, and (9) forumpost parameters to report.php; (10) the delmp parameter to take-deletepm.php; (11) the delreport parameter to takedelreport.php; (12) the delreq parameter to takedelreq.php; (13) the clases parameter to takestaffmess.php; and (14) the warndisable parameter to takewarndisable.php; and allow remote attackers to execute arbitrary SQL commands via (15) the wherecatin parameter to browse.php, (16) the limit parameter to today.php, and (17) the where parameter to torrents-details.php.
CPE | Name | Operator | Version |
---|---|---|---|
torrenttrader:torrenttrader_classic | torrenttrader torrenttrader classic | eq | 1.09 |
secunia.com/advisories/35456
www.securityfocus.com/archive/1/504294/100/0/threaded
www.securityfocus.com/bid/35369
www.waraxe.us/advisory-74.html
exchange.xforce.ibmcloud.com/vulnerabilities/51142
exchange.xforce.ibmcloud.com/vulnerabilities/51143
exchange.xforce.ibmcloud.com/vulnerabilities/51178
exchange.xforce.ibmcloud.com/vulnerabilities/51179
exchange.xforce.ibmcloud.com/vulnerabilities/51180
exchange.xforce.ibmcloud.com/vulnerabilities/51181
www.exploit-db.com/exploits/8958