cvelist/2006/6xxx/CVE-2006-6090.json

97 lines
3.2 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 06:48:10 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6090",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 06:48:10 +00:00
"lang": "eng",
"value": "Multiple SQL injection vulnerabilities in BaalAsp forum allow remote attackers to execute arbitrary SQL commands via the (1) password parameter to (a) adminlogin.asp, the (2) name or (3) password parameter to (b) userlogin.asp, or the (3) search parameter to search.asp."
2017-10-16 12:31:07 -04:00
}
2019-03-18 06:48:10 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "21111",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21111"
},
{
"name": "20061115 BaalAsp forum [login bypass ,injections sql(post), xss(post)]",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/451846/100/100/threaded"
},
{
"name": "22943",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22943"
},
{
"name": "baalasp-search-sql-injection(30343)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30343"
},
{
"name": "http://s-a-p.ca/index.php?page=OurAdvisories&id=35",
"refsource": "MISC",
"url": "http://s-a-p.ca/index.php?page=OurAdvisories&id=35"
},
{
"name": "1913",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1913"
},
{
"name": "baalasp-login-security-bypass(30342)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30342"
},
{
"name": "ADV-2006-4579",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4579"
}
]
}
}