Vulnerability Description
SQL injection vulnerability in sources/search.php in A-Blog 2.0 allows remote attackers to execute arbitrary SQL commands via the words parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| A-Blog | A-Blog | 2.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/1009-exploits/ablog-sql.txt
- http://securityreason.com/securityalert/8450
- http://www.exploit-db.com/exploits/14894Exploit
- http://www.securityfocus.com/bid/42988Exploit
- http://www.vupen.com/english/advisories/2010/2297Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61600
- http://packetstormsecurity.org/1009-exploits/ablog-sql.txt
- http://securityreason.com/securityalert/8450
- http://www.exploit-db.com/exploits/14894Exploit
- http://www.securityfocus.com/bid/42988Exploit
- http://www.vupen.com/english/advisories/2010/2297Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61600
FAQ
What is CVE-2010-4917?
CVE-2010-4917 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in sources/search.php in A-Blog 2.0 allows remote attackers to execute arbitrary SQL commands via the words parameter.
How severe is CVE-2010-4917?
CVE-2010-4917 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4917?
Check the references section above for vendor advisories and patch information. Affected products include: A-Blog A-Blog.