{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T01:52:51.913","vulnerabilities":[{"cve":{"id":"CVE-2009-3961","sourceIdentifier":"cve@mitre.org","published":"2009-11-17T18:30:00.420","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in user.php in Super Serious Stats (aka superseriousstats) before 1.1.2p1 allows remote attackers to execute arbitrary SQL commands via the uid parameter, related to an \"incorrect regexp.\" NOTE: some of these details are obtained from third party information."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en user.php en Super Serious Stats (también conocido como superseriousstats) anteriores a v1.1.2p1  permite a atacantes remotos ejecutar comandos SQL de forma arbitraria a través del parámetro \"uid\", relacionado con \"incorrect regexp.\". NOTA: Algunos de los detalles fueron obtenidos de terceras partes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jos_de_ruijter:superseriousstats:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.2","matchCriteriaId":"E67DC620-75B6-4432-871D-312885277899"},{"vulnerable":true,"criteria":"cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.13:*:*:*:*:*:*:*","matchCriteriaId":"32A6FFBE-936F-497E-A057-964937F0A8BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.14:*:*:*:*:*:*:*","matchCriteriaId":"D1FB0BA3-7D35-430B-AC9C-82A6770C7AAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.15:*:*:*:*:*:*:*","matchCriteriaId":"0BADEA01-DA2C-4E6F-81BF-0C5D861AE6E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:jos_de_ruijter:superseriousstats:1.0.16:*:*:*:*:*:*:*","matchCriteriaId":"8718D0DA-9803-4265-8848-54A00055E671"},{"vulnerable":true,"criteria":"cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"1D07DAB5-39E0-4758-BD42-7DB4C71D8DC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:jos_de_ruijter:superseriousstats:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E23D3D44-6423-4C3E-8E96-932786D4A610"}]}]}],"references":[{"url":"http://code.google.com/p/superseriousstats/","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/37316","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2009/3175","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://code.google.com/p/superseriousstats/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://secunia.com/advisories/37316","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2009/3175","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}