cvelist/2010/1xxx/CVE-2010-1277.json
2019-03-17 22:43:16 +00:00

102 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1277",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2010-0799",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0799"
},
{
"name": "http://legalhackers.com/advisories/zabbix181api-sql.txt",
"refsource": "MISC",
"url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"
},
{
"name": "63456",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/63456"
},
{
"name": "http://www.zabbix.com/rn1.8.2.php",
"refsource": "MISC",
"url": "http://www.zabbix.com/rn1.8.2.php"
},
{
"name": "20100401 Zabbix <= 1.8.1 SQL Injection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"
},
{
"name": "39148",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39148"
},
{
"name": "20100401 Zabbix <= 1.8.1 SQL Injection",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"
},
{
"name": "http://legalhackers.com/poc/zabbix181api.pl-poc",
"refsource": "MISC",
"url": "http://legalhackers.com/poc/zabbix181api.pl-poc"
},
{
"name": "39119",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39119"
}
]
}
}