Логотип exploitDog
bind:CVE-2021-42258
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-42258

Количество 3

Количество 3

nvd логотип

CVE-2021-42258

больше 4 лет назад

BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-69qp-6hh5-mpjp

больше 3 лет назад

BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2021-05366

больше 4 лет назад

Уязвимость параметра txtID процедуры xp_cmdshell системы учета рабочего времени и выставления счетов BillQuick Web Suite, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-42258

BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell.

CVSS3: 9.8
94%
Критический
больше 4 лет назад
github логотип
GHSA-69qp-6hh5-mpjp

BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell.

CVSS3: 9.8
94%
Критический
больше 3 лет назад
fstec логотип
BDU:2021-05366

Уязвимость параметра txtID процедуры xp_cmdshell системы учета рабочего времени и выставления счетов BillQuick Web Suite, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
94%
Критический
больше 4 лет назад

Уязвимостей на страницу