{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T04:04:18.958","vulnerabilities":[{"cve":{"id":"CVE-2011-4801","sourceIdentifier":"cve@mitre.org","published":"2011-12-14T00:55:02.620","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in akeyActivationLogin.do in Authenex Web Management Control in Authenex Strong Authentication System (ASAS) Server 3.1.0.2 and 3.1.0.3 allows remote attackers to execute arbitrary SQL commands via the username parameter."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en akeyActivationLogin.do en Authenex Web Management Control in Authenex Strong Authentication System (ASAS) Server v3.1.0.2 y v3.1.0.3 permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro username"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:authenex:authenex_strong_authentication_system_server:3.1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"83ADC61E-8408-4977-B56E-451ED1A970D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:authenex:authenex_strong_authentication_system_server:3.1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"2952CD6C-D3A0-4E13-9C5E-3EF268D5AFDA"}]}]}],"references":[{"url":"http://www.exploit-db.com/exploits/18117","source":"cve@mitre.org"},{"url":"http://www.foregroundsecurity.com/security-advisories/101-authenex-a-keyasas-web-management-control-3102-time-based-sql-injection","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://support.authenex.com/index.php?/Knowledgebase/Article/View/124/0/asas3103update2","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.exploit-db.com/exploits/18117","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.foregroundsecurity.com/security-advisories/101-authenex-a-keyasas-web-management-control-3102-time-based-sql-injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://support.authenex.com/index.php?/Knowledgebase/Article/View/124/0/asas3103update2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}