Vulnerabilites related to kolja_schleich - leaguemanager
CVE-2013-1852 (GCVE-0-2013-1852)
Vulnerability from cvelistv5
Published
2014-02-05 15:00
Modified
2024-08-06 15:13
Severity ?
CWE
  • n/a
Summary
SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:13:33.197Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "24789",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/24789"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/plugins/leaguemanager/changelog"
          },
          {
            "name": "91442",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/91442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-05T14:57:02",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "24789",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/24789"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/plugins/leaguemanager/changelog"
        },
        {
          "name": "91442",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/91442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-1852",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "24789",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/24789"
            },
            {
              "name": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html"
            },
            {
              "name": "http://wordpress.org/plugins/leaguemanager/changelog",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/plugins/leaguemanager/changelog"
            },
            {
              "name": "91442",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/91442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-1852",
    "datePublished": "2014-02-05T15:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:13:33.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2912 (GCVE-0-2012-2912)
Vulnerability from cvelistv5
Published
2012-05-21 18:00
Modified
2024-08-06 19:50
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:50:05.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html"
          },
          {
            "name": "53525",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53525"
          },
          {
            "name": "leaguemanager-admin-xss(75629)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html"
        },
        {
          "name": "53525",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53525"
        },
        {
          "name": "leaguemanager-admin-xss(75629)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-2912",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html"
            },
            {
              "name": "53525",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53525"
            },
            {
              "name": "leaguemanager-admin-xss(75629)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-2912",
    "datePublished": "2012-05-21T18:00:00",
    "dateReserved": "2012-05-21T00:00:00",
    "dateUpdated": "2024-08-06T19:50:05.216Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-05-21 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php.
Impacted products
Vendor Product Version
kolja_schleich leaguemanager 3.7
wordpress wordpress *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0E65B6-46E0-4742-843E-52BD9E676835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en el plugin LeagueManager v3.7 para Wordpress que permite a atacantes remotos inyectar c\u00f3digo web o html de su elecci\u00f3n a trav\u00e9s de (1) el par\u00e1metro group en la p\u00e1gina show-league o (2) par\u00e1metro de sesi\u00f3n en la p\u00e1gina team para wp-admin/admin.php."
    }
  ],
  "id": "CVE-2012-2912",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-05-21T18:55:07.430",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/53525"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.org/files/112698/WordPress-LeagueManager-3.7-Cross-Site-Scripting.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/53525"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75629"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-05 15:10
Modified
2025-04-11 00:51
Severity ?
Summary
SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php.
Impacted products
Vendor Product Version
kolja_schleich leaguemanager *
kolja_schleich leaguemanager 1.0
kolja_schleich leaguemanager 1.1
kolja_schleich leaguemanager 1.2
kolja_schleich leaguemanager 1.2.1
kolja_schleich leaguemanager 1.2.2
kolja_schleich leaguemanager 1.3
kolja_schleich leaguemanager 1.4
kolja_schleich leaguemanager 1.4.1
kolja_schleich leaguemanager 1.4.2
kolja_schleich leaguemanager 1.5
kolja_schleich leaguemanager 2.0
kolja_schleich leaguemanager 2.1
kolja_schleich leaguemanager 2.2
kolja_schleich leaguemanager 2.3
kolja_schleich leaguemanager 2.3.1
kolja_schleich leaguemanager 2.4
kolja_schleich leaguemanager 2.4.1
kolja_schleich leaguemanager 2.5
kolja_schleich leaguemanager 2.5.1
kolja_schleich leaguemanager 2.5.2
kolja_schleich leaguemanager 2.6
kolja_schleich leaguemanager 2.6.1
kolja_schleich leaguemanager 2.6.2
kolja_schleich leaguemanager 2.6.3
kolja_schleich leaguemanager 2.7
kolja_schleich leaguemanager 2.7.1
kolja_schleich leaguemanager 2.8
kolja_schleich leaguemanager 2.9
kolja_schleich leaguemanager 2.9
kolja_schleich leaguemanager 2.9
kolja_schleich leaguemanager 2.9.1
kolja_schleich leaguemanager 2.9.2
kolja_schleich leaguemanager 2.9.3
kolja_schleich leaguemanager 3.0
kolja_schleich leaguemanager 3.0.1
kolja_schleich leaguemanager 3.0.2
kolja_schleich leaguemanager 3.0.3
kolja_schleich leaguemanager 3.0.4
kolja_schleich leaguemanager 3.1
kolja_schleich leaguemanager 3.1.1
kolja_schleich leaguemanager 3.1.2
kolja_schleich leaguemanager 3.1.3
kolja_schleich leaguemanager 3.1.4
kolja_schleich leaguemanager 3.1.5
kolja_schleich leaguemanager 3.1.6
kolja_schleich leaguemanager 3.1.7
kolja_schleich leaguemanager 3.1.8
kolja_schleich leaguemanager 3.1.9
kolja_schleich leaguemanager 3.2
kolja_schleich leaguemanager 3.2
kolja_schleich leaguemanager 3.2.1
kolja_schleich leaguemanager 3.2.2
kolja_schleich leaguemanager 3.3
kolja_schleich leaguemanager 3.3.1
kolja_schleich leaguemanager 3.4
kolja_schleich leaguemanager 3.4
kolja_schleich leaguemanager 3.4
kolja_schleich leaguemanager 3.4.1
kolja_schleich leaguemanager 3.4.2
kolja_schleich leaguemanager 3.5
kolja_schleich leaguemanager 3.5.1
kolja_schleich leaguemanager 3.5.2
kolja_schleich leaguemanager 3.5.3
kolja_schleich leaguemanager 3.5.4
kolja_schleich leaguemanager 3.5.5
kolja_schleich leaguemanager 3.5.6
kolja_schleich leaguemanager 3.6
kolja_schleich leaguemanager 3.6.1
kolja_schleich leaguemanager 3.6.2
kolja_schleich leaguemanager 3.6.3
kolja_schleich leaguemanager 3.6.4
kolja_schleich leaguemanager 3.6.5
kolja_schleich leaguemanager 3.6.6
kolja_schleich leaguemanager 3.6.7
kolja_schleich leaguemanager 3.6.8
kolja_schleich leaguemanager 3.6.9
kolja_schleich leaguemanager 3.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "34211A6A-6BAD-4210-871A-403B84CD8392",
              "versionEndIncluding": "3.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.0:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "BFA1FAF9-E8B0-473A-B767-5823856B9D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "AFA9CCC9-81A9-49C9-BBEB-6F2737D36064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "14DAAC6B-24BF-4CAF-80C2-79C580FA9F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.2.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "12C49B55-FC05-41E1-9596-93EB8697FF55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.2.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "50A6955E-8886-4859-A182-8C3C0BB75F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "8BD965BD-D0E9-4D41-985E-B643FAF71295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.4:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "5ACF04D6-1DED-452A-A6E1-4CF541314720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.4.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "70E16342-CF17-4CBA-B937-4492C0BE4884",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.4.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "27D61287-A871-42BC-BA5E-A367D63152E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:1.5:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "0163FF55-233C-4CE9-AD40-E2A27295E383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.0:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "E07E2D07-4084-4FA5-863B-CAA838D52B92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "93E46591-12A1-45E3-930F-C37CEEE5C272",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "05C9407C-49E1-4685-B63F-93DB1091F5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "3B3428F6-091A-46A5-B83B-D67BE05F869C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.3.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "40AFCA26-E82D-4476-AD9D-ACD638931E9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.4:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "7A064410-4FE2-42F3-9CC6-882FE6DCDC70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.4.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "CDA4DF3E-CDDD-453C-87E2-55E117399B16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.5:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "08FB4A71-B2B7-4328-950E-2C44E07CBE7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.5.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "DEA1A7BF-5F65-406C-9FEC-B338C4C9ADC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.5.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "4EECE903-8E38-4F95-8274-1137868DCB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "46832E72-0A28-41AF-883F-9657DFCDCDDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "D5E3250D-5B0B-4824-9933-B42779099F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "52A00D59-DEE2-476C-B73B-5B7EA46112B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.6.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "C8A3A8CD-02F8-4EE8-979B-D3D03772FF66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.7:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "7EF70C7E-F4CE-48B9-BA5F-491C5C94E7A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.7.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "61EF4ACA-15C0-4AD5-84CF-0479500AAC65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.8:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "BF0A946E-D384-4F33-B8D7-EEA67A305536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "0854EFB5-1DB1-468A-BFAA-2D553DB97F79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9:rc1:*:*:*:wordpress:*:*",
              "matchCriteriaId": "E2214986-43DC-4E0E-ADE6-4BBEDC715E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9:rc2:*:*:*:wordpress:*:*",
              "matchCriteriaId": "F68E8E5C-782C-44F9-9003-3BB312D92234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "01479FDF-7EA5-4ACE-955E-667D09BA2F2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "AAB629D1-97EA-4C50-B202-E7044339CA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:2.9.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "427156C3-94B1-4A07-B1F2-BBE3A58BEBB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "07CEAD30-9747-43D9-A4B9-3BD4E7B2DE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "3067E74E-E73E-4CB6-AE80-2B1CD827E1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "3021BA81-3A81-4877-9478-1F3BA51ECE8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "F696915F-8C6B-41F3-967D-D26E9277B92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.0.4:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "64DEDA68-0BBC-4C27-9431-6BC05519AA10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "C58EA5DF-43D7-4AC7-BB8C-75BBE4C9F5E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "33C41BF4-FCE6-43DC-9A65-866C779EAE6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "2EC6435B-8EA4-44D2-A37D-BDE6AC497F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "51EACF08-D53E-43EF-97E3-0CCF28F89269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.4:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "1034B538-DBAA-4057-95E2-25022F3C3C8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.5:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "5BB22794-8B65-40C9-B959-2FCEF5D2D519",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.6:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "F3ACCA57-972D-48FF-A39C-7E8217F6D089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.7:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "56538E78-22EE-4519-AEC3-952B59099097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.8:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "B749E329-744C-4E59-A1D0-FBE9B8C62220",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.1.9:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "FB08E995-4CA1-4DC8-986C-65259799D38C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "7AB99A67-1257-4BD5-898D-126804D39275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2:rc1:*:*:*:wordpress:*:*",
              "matchCriteriaId": "FC151041-162E-400C-97D3-F4CB3D9D68E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "D177DA4F-935C-4A77-9621-14B993AEB2FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.2.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "E51F144C-466F-4066-8B08-A29F9EC90913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "1B0BEC18-AD16-47FB-A2C4-C039A678DB97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.3.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "805354BE-9520-40B2-9F41-0F49A282B9CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "912B6F89-6CD6-41BC-813E-8A8F48F2F524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4:rc2:*:*:*:wordpress:*:*",
              "matchCriteriaId": "CE5990FB-1636-45B1-89DD-50FC93E05FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4:rc3:*:*:*:wordpress:*:*",
              "matchCriteriaId": "6250EC67-1008-4B35-8809-268592E0EB1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "9E3C0322-CA62-4B6C-8C60-DD16B540DC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.4.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "6DE0D01E-0A90-4C30-91FA-16978B72E60F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "2832ACAF-0E4A-4D20-80B8-37D9A7339DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "51EF8EC5-4D02-4263-B62A-047E70C38173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "79BDA77C-14A0-4D36-9B52-48878862B87A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "B38B3361-C6D2-4E69-B94A-5996BF2EE34E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.4:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "4E5D2030-03C2-4CED-97DE-B35F988CE2CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.5:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "0DB4B947-642E-4206-B32F-99F0028535F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.5.6:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "017CA012-691B-480F-9A30-463788F59C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "16C7F18F-E924-4F82-A7A7-1E00F9E4CC8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.1:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "9BE38C00-D5C6-45E8-B95D-B0FE5265B498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.2:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "F1C0DB93-EEF6-4E95-A12C-40E46EF7C285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.3:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "16F20310-D255-40EB-9D55-A73AA051FE2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.4:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "CB40C09A-69D1-4045-8B45-B37BAE5E8943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.5:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "E47DBA42-E284-4B8C-A68A-F61FE5ACBD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.6:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "CDFC7EC4-C213-4F3F-A03D-9C17D23D0C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.7:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "3B16478B-42F4-466C-BD4E-F17DB92D60F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.8:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "037E6C1B-4D30-47FA-864E-ADCCE3795BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.6.9:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "D17474C9-143B-4C2F-9D5C-ED4F7B76776B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolja_schleich:leaguemanager:3.7:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "53A65BA7-1AA2-4892-A250-876FD7BDC796",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en leaguemanager.php en el plugin LeagueManager anterior a 3.8.1 para WordPress permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro leage_id en la p\u00e1gina leaguemanager-export hacia wp-admin/admin.php."
    }
  ],
  "id": "CVE-2013-1852",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-05T15:10:04.707",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/91442"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wordpress.org/plugins/leaguemanager/changelog"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/24789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/91442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.com/files/120817/WordPress-LeagueManager-3.8-SQL-Injection.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wordpress.org/plugins/leaguemanager/changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/24789"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}