cvelist/2016/0xxx/CVE-2016-0769.json
2019-03-18 00:17:56 +00:00

72 lines
2.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-0769",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple SQL injection vulnerabilities in eshop-orders.php in the eShop plugin 6.3.14 for WordPress allow (1) remote administrators to execute arbitrary SQL commands via the delid parameter or remote authenticated users to execute arbitrary SQL commands via the (2) view, (3) mark, or (4) change parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20160202 Reflected XSS & Blind SQLi in wordpress plugin eshop v6.3.14",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/02/02/3"
},
{
"name": "82347",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/82347"
},
{
"name": "http://www.vapid.dhs.org/advisory.php?v=160",
"refsource": "MISC",
"url": "http://www.vapid.dhs.org/advisory.php?v=160"
}
]
}
}