Description
No description provided by source.
{"type": "seebug", "viewCount": 6, "enchantments": {"score": {"value": 0.7, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.7}, "reporter": "Root", "title": "OnePlug CMS /press/details.asp Press_Release_ID Parameter SQL Injection", "cvelist": [], "bulletinFamily": "exploit", "sourceHref": "https://www.seebug.org/vuldb/ssvid-80655", "cvss": {"score": 0.0, "vector": "NONE"}, "references": [], "enchantments_done": [], "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "href": "https://www.seebug.org/vuldb/ssvid-80655", "id": "SSV:80655", "status": "cve,poc", "lastseen": "2017-11-19T13:33:24", "sourceData": "\n source: http://www.securityfocus.com/bid/16155/info\r\n\r\nOnePlug CMS is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.\r\n\r\nSuccessful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. \r\n\r\nhttp://www.example.com/press/details.asp?Press_Release_ID=[SQL] \n ", "published": "2014-07-01T00:00:00", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645346317}}
{}