{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2010-4257", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/", "refsource" : "MISC", "url" : "http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/" }, { "name" : "http://www.xakep.ru/magazine/xa/124/052/1.asp", "refsource" : "MISC", "url" : "http://www.xakep.ru/magazine/xa/124/052/1.asp" }, { "name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603", "refsource" : "CONFIRM", "url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603" }, { "name" : "http://codex.wordpress.org/Version_3.0.2", "refsource" : "CONFIRM", "url" : "http://codex.wordpress.org/Version_3.0.2" }, { "name" : "http://core.trac.wordpress.org/changeset/16625", "refsource" : "CONFIRM", "url" : "http://core.trac.wordpress.org/changeset/16625" }, { "name" : "http://wordpress.org/news/2010/11/wordpress-3-0-2/", "refsource" : "CONFIRM", "url" : "http://wordpress.org/news/2010/11/wordpress-3-0-2/" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=659265", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=659265" }, { "name" : "DSA-2138", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2010/dsa-2138" }, { "name" : "FEDORA-2010-19290", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052892.html" }, { "name" : "FEDORA-2010-19296", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052879.html" }, { "name" : "FEDORA-2010-19329", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html" }, { "name" : "FEDORA-2010-19330", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html" }, { "name" : "45131", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/45131" }, { "name" : "42431", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42431" }, { "name" : "42753", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42753" }, { "name" : "42844", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42844" }, { "name" : "42871", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/42871" }, { "name" : "ADV-2010-3337", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2010/3337" }, { "name" : "ADV-2011-0042", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2011/0042" }, { "name" : "ADV-2011-0057", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2011/0057" } ] } }