mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
88 lines
2.5 KiB
JSON
88 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2004-2067",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "SQL injection vulnerability in controlpanel.php in Jaws Framework and Content Management System 0.4 allows remote attackers to execute arbitrary SQL and bypass authentication via the (1) user, (2) password, or (3) crypted_password parameters."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20040729 Jaws 0.4: authentication bypass",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://marc.info/?l=bugtraq&m=109116345930380&w=2"
|
|
},
|
|
{
|
|
"name" : "http://www.jaws.com.mx/index.php?gadget=blog&action=single_view&id=10",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.jaws.com.mx/index.php?gadget=blog&action=single_view&id=10"
|
|
},
|
|
{
|
|
"name" : "10826",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/10826"
|
|
},
|
|
{
|
|
"name" : "8320",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/8320"
|
|
},
|
|
{
|
|
"name" : "1010815",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1010815"
|
|
},
|
|
{
|
|
"name" : "jaws-controlpanel-sql-injection(16847)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/16847"
|
|
}
|
|
]
|
|
}
|
|
}
|