mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
97 lines
3.6 KiB
JSON
97 lines
3.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-1224",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple SQL injection vulnerabilities in DUware DUportal Pro 3.4 allow remote attackers to execute arbitrary SQL commands via the (1) nChannel parameter to default.asp, cat.asp, or detail.asp, (2) the iChannel parameter to search.asp, default.asp, result.asp, cat.asp, or detail.asp (3) the iCat parameter to cat.asp or detail.asp, (4) the iData parameter to detail.asp or result.asp, the (5) POL_ID, (6) POL_PARENT, (7) POL_CATEGORY, (8) CHA_NAME, or (9) CHA_ID parameters to inc_vote.asp, or the (10) tfm_order or (11) tfm_orderby parameters to toppages.asp, a different set of vulnerabilities than CVE-2005-1236."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "13285",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/13285"
|
|
},
|
|
{
|
|
"name": "http://www.securiteam.com/windowsntfocus/5TP0O0AFFQ.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.securiteam.com/windowsntfocus/5TP0O0AFFQ.html"
|
|
},
|
|
{
|
|
"name": "20061202 [Aria-Security Team] DuWare DuPortal SQL Injection Vuln",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/453316/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://www.digitalparadox.org/advisories/duppro.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://www.digitalparadox.org/advisories/duppro.txt"
|
|
},
|
|
{
|
|
"name": "20050420 DUportal Pro 3.4 has MANY Sql injection and Sql Errors.",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=111401172901705&w=2"
|
|
},
|
|
{
|
|
"name": "duportal-multiple-sql-injection(20197)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20197"
|
|
},
|
|
{
|
|
"name": "15031",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/15031"
|
|
},
|
|
{
|
|
"name": "duportal-default-cat-sql-injection(30671)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30671"
|
|
}
|
|
]
|
|
}
|
|
} |