cpe:/a:taskfreak:taskfreak%21:0.1 cpe:/a:taskfreak:taskfreak%21:0.1.2 cpe:/a:taskfreak:taskfreak%21:0.1.3 cpe:/a:taskfreak:taskfreak%21:0.1.4 cpe:/a:taskfreak:taskfreak%21:0.4.0 cpe:/a:taskfreak:taskfreak%21:0.4.1 cpe:/a:taskfreak:taskfreak%21:0.4.2 cpe:/a:taskfreak:taskfreak%21:0.5.0 cpe:/a:taskfreak:taskfreak%21:0.5.1 cpe:/a:taskfreak:taskfreak%21:0.5.2 cpe:/a:taskfreak:taskfreak%21:0.5.3 cpe:/a:taskfreak:taskfreak%21:0.5.4 cpe:/a:taskfreak:taskfreak%21:0.5.5 cpe:/a:taskfreak:taskfreak%21:0.5.6 cpe:/a:taskfreak:taskfreak%21:0.5.7 cpe:/a:taskfreak:taskfreak%21:0.6.0 cpe:/a:taskfreak:taskfreak%21:0.6.1 cpe:/a:taskfreak:taskfreak%21:0.6.2 cpe:/a:tirzen:tirzen_framework:1.5 CVE-2010-1583 2010-05-06T08:47:23.707-04:00 2017-08-16T21:32:24.790-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2010-05-06T11:34:00.000-04:00 EXPLOIT-DB 12452 BID 39793 MISC http://www.madirish.net/?article=456 MISC http://www.taskfreak.com/versions.html XF taskfreak-loadbykey-sql-injection(58241) SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.