cvelist/2020/36xxx/CVE-2020-36537.json

73 lines
2.1 KiB
JSON
Raw Normal View History

2022-06-03 19:01:32 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-36537",
2022-06-07 18:01:41 +00:00
"TITLE": "Everywhere CMS sql injection",
"REQUESTER": "cna@vuldb.com",
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"generator": "vuldb.com",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Everywhere",
"product": {
"product_data": [
{
"product_name": "CMS",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection"
}
]
}
]
2022-06-03 19:01:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-06-07 18:01:41 +00:00
"value": "A vulnerability was found in Everywhere CMS. It has been classified as critical. Affected is an unknown function. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely."
}
]
},
"credit": "Mostafa Farzaneh",
"impact": {
"cvss": {
"version": "3.1",
"baseScore": "6.3",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.159954",
"refsource": "MISC",
"name": "https://vuldb.com/?id.159954"
2022-06-03 19:01:32 +00:00
}
]
}
}