cvelist/2016/10xxx/CVE-2016-10114.json

77 lines
2.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 03:03:38 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-10114",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 03:03:38 +00:00
"lang": "eng",
"value": "SQL injection vulnerability in the \"aWeb Cart Watching System for Virtuemart\" extension before 2.6.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via vectors involving categorysearch and smartSearch."
2017-10-16 12:31:07 -04:00
}
2019-03-18 03:03:38 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "95293",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95293"
},
{
"name": "40973",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40973/"
},
{
"name": "https://github.com/qemm/joomlasqli",
"refsource": "MISC",
"url": "https://github.com/qemm/joomlasqli"
},
{
"name": "https://vel.joomla.org/resolved/1897-aweb-cart-watching-system-2-6-0",
"refsource": "MISC",
"url": "https://vel.joomla.org/resolved/1897-aweb-cart-watching-system-2-6-0"
}
]
}
}