{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T23:16:20.263","vulnerabilities":[{"cve":{"id":"CVE-2010-3212","sourceIdentifier":"cve@mitre.org","published":"2010-09-03T18:00:04.623","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in index.php in Seagull 0.6.7 and earlier allows remote attackers to execute arbitrary SQL commands via the frmQuestion parameter in a retrieve action, in conjunction with a user/password PATH_INFO."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en index.php en Seagull v0.6.7 y anteriores permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro frmQuestion en una acción de recuperación, en conjunción con user/password PATH_INFO."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:*:*:*:*:*:*:*:*","versionEndIncluding":"0.6.7","matchCriteriaId":"602F0728-F961-4E75-88A8-40A31971F971"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.4.6:*:*:*:*:*:*:*","matchCriteriaId":"57055AA8-8937-4F3D-94C4-A71006F446ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.4.7:*:*:*:*:*:*:*","matchCriteriaId":"1D47F05A-68BD-4392-A1F2-7AAB94495BE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.0:*:*:*:*:*:*:*","matchCriteriaId":"BC2548CF-1DFF-4889-AA02-214CC165328B"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.0:rc1:*:*:*:*:*:*","matchCriteriaId":"7FEFA7E9-5380-4E68-866E-A9246A09A741"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.0:rc2:*:*:*:*:*:*","matchCriteriaId":"A388222E-445F-4C64-BDD6-42450DAD36DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.0:rc3:*:*:*:*:*:*","matchCriteriaId":"E1A2F16D-22DE-435F-BFDE-B8086D078381"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.1:*:*:*:*:*:*:*","matchCriteriaId":"1F46650A-915A-4094-9189-AACC681A3FFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.2:*:*:*:*:*:*:*","matchCriteriaId":"63D07A47-35FF-46DD-B00E-CD8E9C558C3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.3:*:*:*:*:*:*:*","matchCriteriaId":"36CE1627-C7CB-4EF4-B1AD-E88CA153375E"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.4:*:*:*:*:*:*:*","matchCriteriaId":"56E57B12-0614-45D9-9315-47124EEC74B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.5:*:*:*:*:*:*:*","matchCriteriaId":"2B429C44-8AF8-4B07-89F6-D06F981D317B"},{"vulnerable":true,"criteria":"cpe:2.3:a:seagullproject.org:seagull:0.6.6:*:*:*:*:*:*:*","matchCriteriaId":"1A917727-24C6-4E80-BF8C-CA4465B75E18"}]}]}],"references":[{"url":"http://osvdb.org/67689","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/1008-exploits/seagull-sql.txt","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://secunia.com/advisories/41169","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.exploit-db.com/exploits/14838","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/61469","source":"cve@mitre.org"},{"url":"http://osvdb.org/67689","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://packetstormsecurity.org/1008-exploits/seagull-sql.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://secunia.com/advisories/41169","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.exploit-db.com/exploits/14838","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/61469","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}