mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2007-4111",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SQL injection vulnerability in the login script in Real Estate listing website application template, when logging in as user or manager, allows remote attackers to execute arbitrary SQL commands via the Password parameter."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "realestate-logging-sql-injection(35667)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35667"
|
|
},
|
|
{
|
|
"name": "20070728 Real Estate listing website application template SQL Injection",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/474934/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "2949",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/2949"
|
|
},
|
|
{
|
|
"name": "http://outlaw.aria-security.info/?p=10",
|
|
"refsource": "MISC",
|
|
"url": "http://outlaw.aria-security.info/?p=10"
|
|
},
|
|
{
|
|
"name": "26268",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/26268"
|
|
},
|
|
{
|
|
"name": "25115",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/25115"
|
|
}
|
|
]
|
|
}
|
|
} |