Show plain JSON{"id": "CVE-2014-1945", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-03-09T13:16:57.083", "references": [{"url": "http://secunia.com/advisories/56189", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.opendocman.com/opendocman-v1-2-7-1-release", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.opendocman.com/opendocman-v1-2-7-2-released", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/65775", "source": "cve@mitre.org"}, {"url": "https://www.htbridge.com/advisory/HTB23202", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/56189", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.opendocman.com/opendocman-v1-2-7-1-release", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.opendocman.com/opendocman-v1-2-7-2-released", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/65775", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.htbridge.com/advisory/HTB23202", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in ajax_udf.php in OpenDocMan before 1.2.7.2 allows remote attackers to execute arbitrary SQL commands via the add_value parameter."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en ajax_udf.php en OpenDocMan anterior a 1.2.7.2 permite a atacantes remotos ejecuar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro add_value."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:opendocman:opendocman:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95E5497B-E681-41EC-A960-72F3523A8339", "versionEndIncluding": "1.2.7.1"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4D3F02F-3FE2-4D7A-97A5-7CFB53BFEBC1"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.2:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC21AE07-0BE2-470A-9A9D-9B0A0E1BB50F"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.2:b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A4674E7-CDAE-46E0-BB50-89982B13EA3F"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.3:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEC5FABB-8752-4CFD-BED7-29DD2CE51B80"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.3:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE2D011C-A93E-46D0-93CE-3670B92C84A6"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4EA4AA2-95AD-4BD2-83E5-C4AE32317216"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5DAD56F-53B1-4D49-9A58-CC60AE2CF5CB"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.7:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7691977-FF85-4A33-8F38-2F35E975B1AB"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.7:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6356D416-603D-4CC2-B788-F66AA5C183EA"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E47E7FB-D37A-4194-A57C-C40E2F3B5743"}, {"criteria": "cpe:2.3:a:opendocman:opendocman:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBA22C31-F0BB-47FF-95B5-6C00FCEBF763"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}