cvelist/2006/0xxx/CVE-2006-0444.json
2019-03-18 06:30:37 +00:00

97 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0444",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SQL injection vulnerability in index.php in Phpclanwebsite (aka PCW) 1.23.1 allows remote attackers to execute arbitrary SQL commands via the (1) par parameter in the post function on the forum page and possibly the (2) poll_id parameter on the poll page. NOTE: the poll_id vector can also allow resultant cross-site scripting (XSS) from an unquoted error message for invalid SQL syntax."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20060125 HYSA-2006-002 Phpclanwebsite 1.23.1 Multiple Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/423145/100/0/threaded"
},
{
"name": "16391",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16391"
},
{
"name": "http://www.h4cky0u.org/advisories/HYSA-2006-002-phpclan.txt",
"refsource": "MISC",
"url": "http://www.h4cky0u.org/advisories/HYSA-2006-002-phpclan.txt"
},
{
"name": "22722",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22722"
},
{
"name": "22720",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22720"
},
{
"name": "ADV-2006-0342",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0342"
},
{
"name": "18597",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18597"
},
{
"name": "phpclanwebsite-index-sql-injection(24355)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24355"
}
]
}
}