2017-10-16 12:31:07 -04:00
{
2019-03-17 23:16:41 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2005-1701" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:16:41 +00:00
"lang" : "eng" ,
"value" : "SQL injection vulnerability in PortailPHP 1.3 allows remote attackers to execute arbitrary SQL commands via the id parameter to the (1) News, (2) File, (3) Liens, or (4) Faq modules."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:16:41 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "13708" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/13708"
} ,
{
"name" : "1014036" ,
"refsource" : "SECTRACK" ,
"url" : "http://securitytracker.com/id?1014036"
} ,
{
"name" : "20050521 SQL injections in PortailPHP" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://marc.info/?l=bugtraq&m=111686643823025&w=2"
}
]
}
}