cvelist/2019/15xxx/CVE-2019-15016.json
Chandan 926e737e32
Update URLs to new Palo Alto Networks advisory website.
We recently updated our security advisory website. This commit replaces links to our old website with new simplified URls.
2020-02-14 13:30:31 -08:00

62 lines
1.9 KiB
JSON

{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-15016",
"ASSIGNER": "psirt@paloaltonetworks.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Palo Alto Networks Zingbox Inspector",
"version": {
"version_data": [
{
"version_value": "Zingbox Inspector, versions 1.288 and earlier."
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://security.paloaltonetworks.com/CVE-2019-15016",
"url": "https://security.paloaltonetworks.com/CVE-2019-15016"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "An SQL injection vulnerability exists in the management interface of Zingbox Inspector versions 1.288 and earlier, that allows for unsanitized data provided by an authenticated user to be passed from the web UI into the database."
}
]
}
}