Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2010-04-01T00:00:00", "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "ADV-2010-0799", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2010/0799"}, {"tags": ["x_refsource_MISC"], "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"}, {"name": "63456", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://www.osvdb.org/63456"}, {"tags": ["x_refsource_MISC"], "url": "http://www.zabbix.com/rn1.8.2.php"}, {"name": "20100401 Zabbix <= 1.8.1 SQL Injection", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"}, {"name": "39148", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/39148"}, {"name": "20100401 Zabbix <= 1.8.1 SQL Injection", "tags": ["mailing-list", "x_refsource_FULLDISC"], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"}, {"tags": ["x_refsource_MISC"], "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"}, {"name": "39119", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/39119"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1277", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "ADV-2010-0799", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0799"}, {"name": "http://legalhackers.com/advisories/zabbix181api-sql.txt", "refsource": "MISC", "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"}, {"name": "63456", "refsource": "OSVDB", "url": "http://www.osvdb.org/63456"}, {"name": "http://www.zabbix.com/rn1.8.2.php", "refsource": "MISC", "url": "http://www.zabbix.com/rn1.8.2.php"}, {"name": "20100401 Zabbix <= 1.8.1 SQL Injection", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"}, {"name": "39148", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39148"}, {"name": "20100401 Zabbix <= 1.8.1 SQL Injection", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"}, {"name": "http://legalhackers.com/poc/zabbix181api.pl-poc", "refsource": "MISC", "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"}, {"name": "39119", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39119"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T01:21:17.601Z"}, "title": "CVE Program Container", "references": [{"name": "ADV-2010-0799", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2010/0799"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"}, {"name": "63456", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://www.osvdb.org/63456"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.zabbix.com/rn1.8.2.php"}, {"name": "20100401 Zabbix <= 1.8.1 SQL Injection", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"}, {"name": "39148", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/39148"}, {"name": "20100401 Zabbix <= 1.8.1 SQL Injection", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"}, {"name": "39119", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/39119"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1277", "datePublished": "2010-04-06T16:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.601Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}