René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

79 lines
2.4 KiB
JSON

{
"id": "CVE-2006-6398",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-12-08T01:28:00.000",
"lastModified": "2018-10-17T21:48:01.753",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Superfreaker Studios UPublisher 1.0 allow remote attackers to execute arbitrary SQL commands via unspecified vectors in (a) sendarticle.asp and (b) printarticle.asp, and the ID parameter to (c) index.asp and (d) preferences.asp, different vectors than CVE-2006-5888."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Superfreaker Studios UPublisher 1.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante vectores no especificados en (a) sendarticle.asp y (b) printarticle.asp, y el par\u00e1metro ID a (c) index.asp y (d) preferences.asp, vectores diferentes que CVE-2006-5888."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:superfreaker_studios:upublisher:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6167E743-52F4-43ED-AE07-7DE9502C03C1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/archive/1/453462/100/0/threaded",
"source": "cve@mitre.org"
}
]
}