mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 09:12:00 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cert@cert.org",
|
|
"ID": "CVE-2015-6004",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple SQL injection vulnerabilities in IPSwitch WhatsUp Gold before 16.4 allow remote attackers to execute arbitrary SQL commands via (1) the UniqueID (aka sUniqueID) parameter to WrFreeFormText.asp in the Reports component or (2) the Find Device parameter."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "VU#176160",
|
|
"refsource": "CERT-VN",
|
|
"url": "https://www.kb.cert.org/vuls/id/176160"
|
|
},
|
|
{
|
|
"name": "http://twitter.com/ipswitch/statuses/677558623229317121",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://twitter.com/ipswitch/statuses/677558623229317121"
|
|
},
|
|
{
|
|
"name": "1034833",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1034833"
|
|
},
|
|
{
|
|
"name": "https://community.rapid7.com/community/infosec/blog/2015/12/16/multiple-disclosures-for-multiple-network-management-systems",
|
|
"refsource": "MISC",
|
|
"url": "https://community.rapid7.com/community/infosec/blog/2015/12/16/multiple-disclosures-for-multiple-network-management-systems"
|
|
},
|
|
{
|
|
"name": "79506",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/79506"
|
|
}
|
|
]
|
|
}
|
|
} |