2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2005-4366" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2018-04-05 09:33:01 -04:00
"value" : "Multiple SQL injection vulnerabilities in DRZES HMS 3.2 allow remote attackers to execute arbitrary SQL commands via the (1) plan_id parameter to (a) domains.php, (b) viewusage.php, (c) pop_accounts.php, (d) databases.php, (e) ftp_users.php, (f) crons.php, (g) pass_dirs.php, (h) zone_files.php, (i) htaccess.php, and (j) software.php; (2) the customerPlanID parameter to viewplan.php; (3) the ref_id parameter to referred_plans.php; (4) customerPlanID parameter to listcharges.php; and (5) the domain parameter to (k) pop_accounts.php, (d) databases.php, (e) ftp_users.php, (f) crons.php, (g) pass_dirs.php, (h) zone_files.php, (i) htaccess.php, and (j) software.php. NOTE: the viewinvoice.php invoiceID vector is already covered by CVE-2005-4137."
2017-10-16 12:31:07 -04:00
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "http://pridels0.blogspot.com/2005/11/drzes-hms-32-multiple-vuln.html" ,
"refsource" : "MISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://pridels0.blogspot.com/2005/11/drzes-hms-32-multiple-vuln.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "15644" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/15644"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21179" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21179"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21180" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21180"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21181" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21181"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21182" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21182"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21183" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21183"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21184" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21184"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21185" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21185"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21186" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21186"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21187" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21187"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21188" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21188"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21189" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21189"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21190" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21190"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21191" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21191"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "21192" ,
"refsource" : "OSVDB" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.osvdb.org/21192"
}
]
}
}