mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-0919",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SQL injection vulnerability in index.php (aka the login page) in Oi! Email Marketing System 3.0 (aka Oi! 3) allows remote attackers to execute arbitrary SQL commands via the (1) Username and (2) Password fields."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "23462",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/23462"
|
|
},
|
|
{
|
|
"name": "http://www.h4cky0u.org/advisories/HYSA-2006-003-oi-email.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://www.h4cky0u.org/advisories/HYSA-2006-003-oi-email.txt"
|
|
},
|
|
{
|
|
"name": "20060223 HYSA-2006-003 Oi! Email Marketing 3.0 SQL Injection",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/425924/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "18993",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/18993"
|
|
},
|
|
{
|
|
"name": "ADV-2006-0718",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/0718"
|
|
}
|
|
]
|
|
}
|
|
} |