cvelist/2006/1xxx/CVE-2006-1541.json
2019-03-18 06:07:33 +00:00

102 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1541",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in Default.asp in EzASPSite 2.0 RC3 and earlier allows remote attackers to execute arbitrary SQL commands and obtain the SHA1 hash of the admin password via the Scheme parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1623",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/1623"
},
{
"name": "19441",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19441"
},
{
"name": "ADV-2006-1164",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1164"
},
{
"name": "17309",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17309"
},
{
"name": "24256",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24256"
},
{
"name": "ezaspsite-default-sql-injection(25544)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25544"
},
{
"name": "20060329 EzASPSite <= 2.0 RC3 Remote SQL Injection Exploit Vulnerability.",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/429487/100/0/threaded"
},
{
"name": "20060329 EzASPSite <= 2.0 RC3 Remote SQL Injection Exploit Vulnerability.",
"refsource": "FULLDISC",
"url": "http://marc.info/?l=full-disclosure&m=114367573519326&w=2"
},
{
"name": "http://www.nukedx.com/?viewdoc=22",
"refsource": "MISC",
"url": "http://www.nukedx.com/?viewdoc=22"
}
]
}
}