Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2004-04-14T00:00:00", "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in PostNuke 7.2.6 and earlier allows remote attackers to execute arbitrary SQL via (1) the sif parameter to index.php in the Comments module or (2) timezoneoffset parameter to changeinfo.php in the Your_Account module."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "5369", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://www.osvdb.org/5369"}, {"name": "10146", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/10146"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://news.postnuke.com/Article2580.html"}, {"name": "postnuke-indexphp-sql-injection(15869)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15869"}, {"name": "20040420 [PNSA 2004-2] PostNuke Security Advisory PNSA 2004-2", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://marc.info/?l=bugtraq&m=108256503718978&w=2"}, {"name": "20040414 [SCAN Associates Sdn Bhd Security Advisory] Postnuke v 0.726 and below SQL injection", "tags": ["mailing-list", "x_refsource_FULLDISC"], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020154.html"}, {"name": "5368", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://www.osvdb.org/5368"}, {"name": "1009801", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://securitytracker.com/id?1009801"}, {"name": "postnuke-changeinfo-sql-injection(15875)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15875"}, {"name": "11386", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/11386"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1949", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "SQL injection vulnerability in PostNuke 7.2.6 and earlier allows remote attackers to execute arbitrary SQL via (1) the sif parameter to index.php in the Comments module or (2) timezoneoffset parameter to changeinfo.php in the Your_Account module."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "5369", "refsource": "OSVDB", "url": "http://www.osvdb.org/5369"}, {"name": "10146", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10146"}, {"name": "http://news.postnuke.com/Article2580.html", "refsource": "CONFIRM", "url": "http://news.postnuke.com/Article2580.html"}, {"name": "postnuke-indexphp-sql-injection(15869)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15869"}, {"name": "20040420 [PNSA 2004-2] PostNuke Security Advisory PNSA 2004-2", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq&m=108256503718978&w=2"}, {"name": "20040414 [SCAN Associates Sdn Bhd Security Advisory] Postnuke v 0.726 and below SQL injection", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020154.html"}, {"name": "5368", "refsource": "OSVDB", "url": "http://www.osvdb.org/5368"}, {"name": "1009801", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1009801"}, {"name": "postnuke-changeinfo-sql-injection(15875)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15875"}, {"name": "11386", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11386"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-08T01:07:49.130Z"}, "title": "CVE Program Container", "references": [{"name": "5369", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://www.osvdb.org/5369"}, {"name": "10146", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/10146"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://news.postnuke.com/Article2580.html"}, {"name": "postnuke-indexphp-sql-injection(15869)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15869"}, {"name": "20040420 [PNSA 2004-2] PostNuke Security Advisory PNSA 2004-2", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://marc.info/?l=bugtraq&m=108256503718978&w=2"}, {"name": "20040414 [SCAN Associates Sdn Bhd Security Advisory] Postnuke v 0.726 and below SQL injection", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020154.html"}, {"name": "5368", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://www.osvdb.org/5368"}, {"name": "1009801", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://securitytracker.com/id?1009801"}, {"name": "postnuke-changeinfo-sql-injection(15875)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15875"}, {"name": "11386", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/11386"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1949", "datePublished": "2005-05-10T04:00:00", "dateReserved": "2005-05-04T00:00:00", "dateUpdated": "2024-08-08T01:07:49.130Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}