Vulnerabilites related to kolja_schleich - leaguemanager
CVE-2013-1852 (GCVE-0-2013-1852)
Vulnerability from cvelistv5
Published
2014-02-05 15:00
Modified
2024-08-06 15:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php.
References
▼ | URL | Tags |
---|---|---|
http://www.exploit-db.com/exploits/24789 | exploit, x_refsource_EXPLOIT-DB | |
http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html | x_refsource_MISC | |
http://wordpress.org/plugins/leaguemanager/changelog | x_refsource_CONFIRM | |
http://osvdb.org/91442 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24789", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/24789" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wordpress.org/plugins/leaguemanager/changelog" }, { "name": "91442", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/91442" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-05T14:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "24789", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/24789" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wordpress.org/plugins/leaguemanager/changelog" }, { "name": "91442", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/91442" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1852", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "24789", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/24789" }, { "name": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html" }, { "name": "http://wordpress.org/plugins/leaguemanager/changelog", "refsource": "CONFIRM", "url": "http://wordpress.org/plugins/leaguemanager/changelog" }, { "name": "91442", "refsource": "OSVDB", "url": "http://osvdb.org/91442" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1852", "datePublished": "2014-02-05T15:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2912 (GCVE-0-2012-2912)
Vulnerability from cvelistv5
Published
2012-05-21 18:00
Modified
2024-08-06 19:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/53525 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75629 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html" }, { "name": "53525", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53525" }, { "name": "leaguemanager-admin-xss(75629)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html" }, { "name": "53525", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53525" }, { "name": "leaguemanager-admin-xss(75629)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2912", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html" }, { "name": "53525", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53525" }, { "name": "leaguemanager-admin-xss(75629)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2912", "datePublished": "2012-05-21T18:00:00", "dateReserved": "2012-05-21T00:00:00", "dateUpdated": "2024-08-06T19:50:05.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-05-21 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kolja_schleich | leaguemanager | 3.7 | |
wordpress | wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E65B6-46E0-4742-843E-52BD9E676835", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en el plugin LeagueManager v3.7 para Wordpress que permite a atacantes remotos inyectar c\u00f3digo web o html de su elecci\u00f3n a trav\u00e9s de (1) el par\u00e1metro group en la p\u00e1gina show-league o (2) par\u00e1metro de sesi\u00f3n en la p\u00e1gina team para wp-admin/admin.php." } ], "id": "CVE-2012-2912", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-05-21T18:55:07.430", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/53525" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/53525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-05 15:10
Modified
2025-04-11 00:51
Severity ?
Summary
SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "34211A6A-6BAD-4210-871A-403B84CD8392", "versionEndIncluding": "3.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "BFA1FAF9-E8B0-473A-B767-5823856B9D57", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "AFA9CCC9-81A9-49C9-BBEB-6F2737D36064", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "14DAAC6B-24BF-4CAF-80C2-79C580FA9F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.2.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "12C49B55-FC05-41E1-9596-93EB8697FF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.2.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "50A6955E-8886-4859-A182-8C3C0BB75F43", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "8BD965BD-D0E9-4D41-985E-B643FAF71295", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "5ACF04D6-1DED-452A-A6E1-4CF541314720", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.4.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "70E16342-CF17-4CBA-B937-4492C0BE4884", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.4.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "27D61287-A871-42BC-BA5E-A367D63152E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "0163FF55-233C-4CE9-AD40-E2A27295E383", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E07E2D07-4084-4FA5-863B-CAA838D52B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "93E46591-12A1-45E3-930F-C37CEEE5C272", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "05C9407C-49E1-4685-B63F-93DB1091F5E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "3B3428F6-091A-46A5-B83B-D67BE05F869C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.3.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "40AFCA26-E82D-4476-AD9D-ACD638931E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7A064410-4FE2-42F3-9CC6-882FE6DCDC70", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.4.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "CDA4DF3E-CDDD-453C-87E2-55E117399B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "08FB4A71-B2B7-4328-950E-2C44E07CBE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.5.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "DEA1A7BF-5F65-406C-9FEC-B338C4C9ADC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.5.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4EECE903-8E38-4F95-8274-1137868DCB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6:*:*:*:*:wordpress:*:*", "matchCriteriaId": "46832E72-0A28-41AF-883F-9657DFCDCDDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D5E3250D-5B0B-4824-9933-B42779099F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "52A00D59-DEE2-476C-B73B-5B7EA46112B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C8A3A8CD-02F8-4EE8-979B-D3D03772FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.7:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7EF70C7E-F4CE-48B9-BA5F-491C5C94E7A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.7.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "61EF4ACA-15C0-4AD5-84CF-0479500AAC65", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.8:*:*:*:*:wordpress:*:*", "matchCriteriaId": "BF0A946E-D384-4F33-B8D7-EEA67A305536", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9:*:*:*:*:wordpress:*:*", "matchCriteriaId": "0854EFB5-1DB1-468A-BFAA-2D553DB97F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9:rc1:*:*:*:wordpress:*:*", "matchCriteriaId": "E2214986-43DC-4E0E-ADE6-4BBEDC715E0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9:rc2:*:*:*:wordpress:*:*", "matchCriteriaId": "F68E8E5C-782C-44F9-9003-3BB312D92234", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "01479FDF-7EA5-4ACE-955E-667D09BA2F2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "AAB629D1-97EA-4C50-B202-E7044339CA6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "427156C3-94B1-4A07-B1F2-BBE3A58BEBB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "07CEAD30-9747-43D9-A4B9-3BD4E7B2DE75", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "3067E74E-E73E-4CB6-AE80-2B1CD827E1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "3021BA81-3A81-4877-9478-1F3BA51ECE8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F696915F-8C6B-41F3-967D-D26E9277B92E", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "64DEDA68-0BBC-4C27-9431-6BC05519AA10", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C58EA5DF-43D7-4AC7-BB8C-75BBE4C9F5E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "33C41BF4-FCE6-43DC-9A65-866C779EAE6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2EC6435B-8EA4-44D2-A37D-BDE6AC497F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "51EACF08-D53E-43EF-97E3-0CCF28F89269", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1034B538-DBAA-4057-95E2-25022F3C3C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "5BB22794-8B65-40C9-B959-2FCEF5D2D519", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.6:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F3ACCA57-972D-48FF-A39C-7E8217F6D089", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.7:*:*:*:*:wordpress:*:*", "matchCriteriaId": "56538E78-22EE-4519-AEC3-952B59099097", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.8:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B749E329-744C-4E59-A1D0-FBE9B8C62220", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.9:*:*:*:*:wordpress:*:*", "matchCriteriaId": "FB08E995-4CA1-4DC8-986C-65259799D38C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7AB99A67-1257-4BD5-898D-126804D39275", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2:rc1:*:*:*:wordpress:*:*", "matchCriteriaId": "FC151041-162E-400C-97D3-F4CB3D9D68E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D177DA4F-935C-4A77-9621-14B993AEB2FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E51F144C-466F-4066-8B08-A29F9EC90913", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1B0BEC18-AD16-47FB-A2C4-C039A678DB97", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.3.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "805354BE-9520-40B2-9F41-0F49A282B9CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "912B6F89-6CD6-41BC-813E-8A8F48F2F524", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4:rc2:*:*:*:wordpress:*:*", "matchCriteriaId": "CE5990FB-1636-45B1-89DD-50FC93E05FF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4:rc3:*:*:*:wordpress:*:*", "matchCriteriaId": "6250EC67-1008-4B35-8809-268592E0EB1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9E3C0322-CA62-4B6C-8C60-DD16B540DC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "6DE0D01E-0A90-4C30-91FA-16978B72E60F", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2832ACAF-0E4A-4D20-80B8-37D9A7339DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "51EF8EC5-4D02-4263-B62A-047E70C38173", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "79BDA77C-14A0-4D36-9B52-48878862B87A", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "B38B3361-C6D2-4E69-B94A-5996BF2EE34E", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4E5D2030-03C2-4CED-97DE-B35F988CE2CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "0DB4B947-642E-4206-B32F-99F0028535F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.6:*:*:*:*:wordpress:*:*", "matchCriteriaId": "017CA012-691B-480F-9A30-463788F59C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6:*:*:*:*:wordpress:*:*", "matchCriteriaId": "16C7F18F-E924-4F82-A7A7-1E00F9E4CC8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9BE38C00-D5C6-45E8-B95D-B0FE5265B498", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F1C0DB93-EEF6-4E95-A12C-40E46EF7C285", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "16F20310-D255-40EB-9D55-A73AA051FE2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "CB40C09A-69D1-4045-8B45-B37BAE5E8943", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E47DBA42-E284-4B8C-A68A-F61FE5ACBD38", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.6:*:*:*:*:wordpress:*:*", "matchCriteriaId": "CDFC7EC4-C213-4F3F-A03D-9C17D23D0C67", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.7:*:*:*:*:wordpress:*:*", "matchCriteriaId": "3B16478B-42F4-466C-BD4E-F17DB92D60F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.8:*:*:*:*:wordpress:*:*", "matchCriteriaId": "037E6C1B-4D30-47FA-864E-ADCCE3795BA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.9:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D17474C9-143B-4C2F-9D5C-ED4F7B76776B", "vulnerable": true }, { "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.7:*:*:*:*:wordpress:*:*", "matchCriteriaId": "53A65BA7-1AA2-4892-A250-876FD7BDC796", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en leaguemanager.php en el plugin LeagueManager anterior a 3.8.1 para WordPress permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro leage_id en la p\u00e1gina leaguemanager-export hacia wp-admin/admin.php." } ], "id": "CVE-2013-1852", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-05T15:10:04.707", "references": [ { "source": "secalert@redhat.com", "url": "http://osvdb.org/91442" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html" }, { "source": "secalert@redhat.com", "url": "http://wordpress.org/plugins/leaguemanager/changelog" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/91442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wordpress.org/plugins/leaguemanager/changelog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24789" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }