cvelist/2012/0xxx/CVE-2012-0811.json
2019-03-18 04:36:46 +00:00

82 lines
2.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-0811",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files generated by backup.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "51680",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/51680"
},
{
"name": "[oss-security] 20120126 CVE request: PostfixAdmin SQL injections and XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/01/26/5"
},
{
"name": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin",
"refsource": "MISC",
"url": "http://www.codseq.it/advisories/multiple_vulnerabilities_in_postfixadmin"
},
{
"name": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT",
"refsource": "CONFIRM",
"url": "https://svn.code.sf.net/p/postfixadmin/code/branches/postfixadmin-2.3/CHANGELOG.TXT"
},
{
"name": "[oss-security] 20120127 Re: CVE request: PostfixAdmin SQL injections and XSS",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/01/27/5"
}
]
}
}