cvelist/2008/4xxx/CVE-2008-4175.json
2019-03-18 06:57:43 +00:00

87 lines
2.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-4175",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple SQL injection vulnerabilities in Link Bid Script 1.5 allow remote attackers to execute arbitrary SQL commands via the (1) ucat parameter to upgrade.php and the (2) id parameter to linkadmin/edit.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "linkbidscript-upgrade-sql-injection(45153)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45153"
},
{
"name": "linkbidscript-edit-sql-injection(45155)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45155"
},
{
"name": "6466",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6466"
},
{
"name": "31853",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31853"
},
{
"name": "31191",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31191"
},
{
"name": "4299",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4299"
}
]
}
}