Логотип exploitDog
bind:CVE-2010-1583
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2010-1583

Количество 2

Количество 2

nvd логотип

CVE-2010-1583

почти 16 лет назад

SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-w9fg-44qv-fpwf

больше 3 лет назад

SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2010-1583

SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.

CVSS2: 7.5
1%
Низкий
почти 16 лет назад
github логотип
GHSA-w9fg-44qv-fpwf

SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу