mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
79 lines
2.1 KiB
JSON
79 lines
2.1 KiB
JSON
![]() |
{
|
||
|
"CVE_data_meta" : {
|
||
|
"ASSIGNER" : "cve@mitre.org",
|
||
|
"ID" : "CVE-2008-5652",
|
||
|
"STATE" : "PUBLIC"
|
||
|
},
|
||
|
"affects" : {
|
||
|
"vendor" : {
|
||
|
"vendor_data" : [
|
||
|
{
|
||
|
"product" : {
|
||
|
"product_data" : [
|
||
|
{
|
||
|
"product_name" : "n/a",
|
||
|
"version" : {
|
||
|
"version_data" : [
|
||
|
{
|
||
|
"version_value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"vendor_name" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
"data_format" : "MITRE",
|
||
|
"data_type" : "CVE",
|
||
|
"data_version" : "4.0",
|
||
|
"description" : {
|
||
|
"description_data" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "SQL injection vulnerability in the loginADP function in ajaxp.php in MyioSoft EasyBookMarker 4.0 allows remote attackers to execute arbitrary SQL commands via the rsargs parameter, as reachable through the username parameter. NOTE: some of these details are obtained from third party information."
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"problemtype" : {
|
||
|
"problemtype_data" : [
|
||
|
{
|
||
|
"description" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references" : {
|
||
|
"reference_data" : [
|
||
|
{
|
||
|
"url" : "https://www.exploit-db.com/exploits/7045"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/bid/32199"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.vupen.com/english/advisories/2008/3075"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://osvdb.org/49701"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://secunia.com/advisories/32673"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://securityreason.com/securityalert/4770"
|
||
|
},
|
||
|
{
|
||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46447"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|