cvelist/2007/5xxx/CVE-2007-5056.json
2019-03-17 23:20:45 +00:00

172 lines
5.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5056",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Eval injection vulnerability in adodb-perf-module.inc.php in ADOdb Lite 1.42 and earlier, as used in products including CMS Made Simple, SAPID CMF, Journalness, PacerCMS, and Open-Realty, allows remote attackers to execute arbitrary code via PHP sequences in the last_module parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "openrealty-lastmodule-code-execution(40395)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40395"
},
{
"name": "25768",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25768"
},
{
"name": "sapidcmf-lastmodule-code-execution(40396)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40396"
},
{
"name": "40596",
"refsource": "OSVDB",
"url": "http://osvdb.org/40596"
},
{
"name": "5098",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5098"
},
{
"name": "pacercms-lastmodule-code-execution(40389)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40389"
},
{
"name": "28886",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28886"
},
{
"name": "ADV-2007-3261",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/3261"
},
{
"name": "26928",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26928"
},
{
"name": "41422",
"refsource": "OSVDB",
"url": "http://osvdb.org/41422"
},
{
"name": "journalness-lastmodule-code-execution(40393)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40393"
},
{
"name": "41426",
"refsource": "OSVDB",
"url": "http://osvdb.org/41426"
},
{
"name": "28874",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28874"
},
{
"name": "cmsmadesimple-adodbperfmod-code-execution(36733)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36733"
},
{
"name": "5090",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5090"
},
{
"name": "41428",
"refsource": "OSVDB",
"url": "http://osvdb.org/41428"
},
{
"name": "5097",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5097"
},
{
"name": "20070924 CMS Made Simple eval injection is really an ADOdb Lite problem",
"refsource": "VIM",
"url": "http://www.attrition.org/pipermail/vim/2007-September/001800.html"
},
{
"name": "28873",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28873"
},
{
"name": "4442",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4442"
},
{
"name": "5091",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5091"
},
{
"name": "28859",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28859"
},
{
"name": "41427",
"refsource": "OSVDB",
"url": "http://osvdb.org/41427"
}
]
}
}