Show plain JSON{"id": "CVE-2008-5774", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2008-12-30T20:30:01.827", "references": [{"url": "http://secunia.com/advisories/33172", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/32812", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47319", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/7462", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/33172", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/32812", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47319", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/7462", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in ASPSiteWare HomeBuilder 1.0 and 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) iType parameter to (a) type.asp and (b) type2.asp and the (2) iPro parameter to (c) detail.asp."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en ASPSiteWare HomeBuilder v1.0 y v2.0 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante el par\u00e1metro (1) iType de (a) type.asp y (b) type2.asp y el (2) par\u00e1metro iPro de (c) detail.asp."}], "lastModified": "2024-11-21T00:54:51.950", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:aspsiteware:homebuilder:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75F36E40-898C-48FA-B339-25E27A221335"}, {"criteria": "cpe:2.3:a:aspsiteware:homebuilder:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5301BBEB-80BE-4D70-8E2E-F59DAB15D327"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}