mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
92 lines
2.9 KiB
JSON
92 lines
2.9 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-1364",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple SQL injection vulnerabilities in MetaBid Auctions allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password fields in logIn.asp, or (3) intAuctionID parameter to item.asp."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "15869",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/15869"
|
|
},
|
|
{
|
|
"name": "13395",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/13395"
|
|
},
|
|
{
|
|
"name": "15136",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/15136"
|
|
},
|
|
{
|
|
"name": "15868",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/15868"
|
|
},
|
|
{
|
|
"name": "metabid-item-login-sql-injection(20286)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20286"
|
|
},
|
|
{
|
|
"name": "20050426 Multiple SQL Injections in MetaBid Auctions",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=111454192928364&w=2"
|
|
},
|
|
{
|
|
"name": "http://digitalparadox.org/advisories/metabid.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://digitalparadox.org/advisories/metabid.txt"
|
|
}
|
|
]
|
|
}
|
|
} |