{ "schema_version": "1.4.0", "id": "GHSA-qmxw-7v53-gvv4", "modified": "2022-05-17T02:03:11Z", "published": "2022-05-17T02:03:11Z", "aliases": [ "CVE-2010-4800" ], "details": "SQL injection vulnerability in doadd.php in BaconMap 1.0 allows remote attackers to execute arbitrary SQL commands via the type parameter.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4800" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62389" }, { "type": "WEB", "url": "http://packetstormsecurity.org/1010-exploits/baconmap10-sql.txt" }, { "type": "WEB", "url": "http://secunia.com/advisories/41749" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/8225" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/15233" }, { "type": "WEB", "url": "http://www.johnleitch.net/Vulnerabilities/BaconMap.1.0.SQL.Injection/51" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/43908" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-04-27T00:55:00Z" } }