cvelist/2020/14xxx/CVE-2020-14295.json

87 lines
2.9 KiB
JSON
Raw Normal View History

2020-06-17 14:01:34 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-14295",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/Cacti/cacti/issues/3622",
"refsource": "MISC",
"name": "https://github.com/Cacti/cacti/issues/3622"
2020-07-23 03:01:24 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-8a15713da2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKM5G3YNSZDHDZMPCMAHG5B5M2V4XYSE/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-7dddce530c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W64CIB6L4HZRVQSWKPDDKXJO4J2XTOXD/"
2020-07-26 00:01:27 +00:00
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1060",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html"
2020-07-27 01:01:21 +00:00
},
{
"refsource": "GENTOO",
"name": "GLSA-202007-03",
"url": "https://security.gentoo.org/glsa/202007-03"
2020-07-28 03:01:19 +00:00
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1106",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html"
2020-06-17 14:01:34 +00:00
}
]
}
}