Show plain JSON{"containers": {"cna": {"affected": [{"product": "SAMwin Contact Center Suite", "vendor": "Telecommunication Software", "versions": [{"status": "affected", "version": "5.1"}]}], "credits": [{"lang": "en", "value": "Tobias Ospelt/Max Moser"}], "descriptions": [{"lang": "en", "value": "A vulnerability classified as critical has been found in Telecommunication Software SAMwin Contact Center Suite 5.1. This affects the function getCurrentDBVersion in the library SAMwinLIBVB.dll of the database handler. The manipulation leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 6.2 is able to address this issue. It is recommended to upgrade the affected component."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-05-24T15:30:29.000Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB"}, "references": [{"tags": ["x_refsource_MISC"], "url": "http://www.modzero.ch/advisories/MZ-13-06_SAMwin_Architectural_Issues.txt"}, {"tags": ["x_refsource_MISC"], "url": "https://vuldb.com/?id.12789"}], "title": "Telecommunication Software SAMwin Contact Center Suite Database SAMwinLIBVB.dll getCurrentDBVersion sql injection", "x_generator": "vuldb.com", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cna@vuldb.com", "ID": "CVE-2013-10003", "REQUESTER": "cna@vuldb.com", "STATE": "PUBLIC", "TITLE": "Telecommunication Software SAMwin Contact Center Suite Database SAMwinLIBVB.dll getCurrentDBVersion sql injection"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SAMwin Contact Center Suite", "version": {"version_data": [{"version_value": "5.1"}]}}]}, "vendor_name": "Telecommunication Software"}]}}, "credit": "Tobias Ospelt/Max Moser", "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A vulnerability classified as critical has been found in Telecommunication Software SAMwin Contact Center Suite 5.1. This affects the function getCurrentDBVersion in the library SAMwinLIBVB.dll of the database handler. The manipulation leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 6.2 is able to address this issue. It is recommended to upgrade the affected component."}]}, "generator": "vuldb.com", "impact": {"cvss": {"baseScore": "6.5", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-89 SQL Injection"}]}]}, "references": {"reference_data": [{"name": "http://www.modzero.ch/advisories/MZ-13-06_SAMwin_Architectural_Issues.txt", "refsource": "MISC", "url": "http://www.modzero.ch/advisories/MZ-13-06_SAMwin_Architectural_Issues.txt"}, {"name": "https://vuldb.com/?id.12789", "refsource": "MISC", "url": "https://vuldb.com/?id.12789"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T18:09:17.213Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.modzero.ch/advisories/MZ-13-06_SAMwin_Architectural_Issues.txt"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://vuldb.com/?id.12789"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-14T16:58:45.846967Z", "id": "CVE-2013-10003", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-15T14:38:59.503Z"}}]}, "cveMetadata": {"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2013-10003", "datePublished": "2022-05-24T15:30:29.000Z", "dateReserved": "2022-05-24T00:00:00.000Z", "dateUpdated": "2025-04-15T14:38:59.503Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}