Vulnerability Description
Multiple SQL injection vulnerabilities in TopicsViewer 3.0 Beta 1 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) edit_block.php, (2) edit_cat.php, (3) edit_note.php, or (4) rmv_topic.php in admincp/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Topicsviewer | Topicsviewer | 3.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/102834
- http://osvdb.org/102835
- http://osvdb.org/102836
- http://osvdb.org/102837
- http://packetstormsecurity.com/files/125007Exploit
- http://www.exploit-db.com/exploits/31419Exploit
- http://www.securityfocus.com/bid/65283Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90918
- http://osvdb.org/102834
- http://osvdb.org/102835
- http://osvdb.org/102836
- http://osvdb.org/102837
- http://packetstormsecurity.com/files/125007Exploit
- http://www.exploit-db.com/exploits/31419Exploit
- http://www.securityfocus.com/bid/65283Exploit
FAQ
What is CVE-2014-10023?
CVE-2014-10023 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple SQL injection vulnerabilities in TopicsViewer 3.0 Beta 1 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) edit_block.php, (2) edit_cat.php, (3) edit_note.p...
How severe is CVE-2014-10023?
CVE-2014-10023 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-10023?
Check the references section above for vendor advisories and patch information. Affected products include: Topicsviewer Topicsviewer.