mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
88 lines
2.4 KiB
JSON
88 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2007-6091",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Multiple SQL injection vulnerabilities in files/login.asp in JiRo's Banner System (JBS) 2.0, and possibly JiRo's Upload Manager (aka JiRo's Upload System or JUS), allow remote attackers to execute arbitrary SQL commands via the (1) Username (aka Login or Email) or (2) Password field."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20071117 JiRo´s Upload Manager SQL Injection",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/483859/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "26479",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/26479"
|
|
},
|
|
{
|
|
"name" : "38740",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://osvdb.org/38740"
|
|
},
|
|
{
|
|
"name" : "38741",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://osvdb.org/38741"
|
|
},
|
|
{
|
|
"name" : "27713",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/27713"
|
|
},
|
|
{
|
|
"name" : "3384",
|
|
"refsource" : "SREASON",
|
|
"url" : "http://securityreason.com/securityalert/3384"
|
|
}
|
|
]
|
|
}
|
|
}
|