mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
97 lines
3.0 KiB
JSON
97 lines
3.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-3236",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple SQL injection vulnerabilities in thinkWMS 1.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in (a) index.php or (b) printarticle.php, and the (2) catid parameter in index.php."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "26743",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/26743"
|
|
},
|
|
{
|
|
"name": "18567",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/18567"
|
|
},
|
|
{
|
|
"name": "thinkwms-printarticle-sql-injection(27270)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27270"
|
|
},
|
|
{
|
|
"name": "26742",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/26742"
|
|
},
|
|
{
|
|
"name": "1016355",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1016355"
|
|
},
|
|
{
|
|
"name": "20747",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/20747"
|
|
},
|
|
{
|
|
"name": "ADV-2006-2470",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/2470"
|
|
},
|
|
{
|
|
"name": "http://pridels0.blogspot.com/2006/06/thinkwms-sql-injection-vuln.html",
|
|
"refsource": "MISC",
|
|
"url": "http://pridels0.blogspot.com/2006/06/thinkwms-sql-injection-vuln.html"
|
|
}
|
|
]
|
|
}
|
|
} |