Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.securityfocus.com/bid/39148", "name": "39148", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html", "name": "20100401 Zabbix <= 1.8.1 SQL Injection", "tags": ["Exploit"], "refsource": "FULLDISC"}, {"url": "http://legalhackers.com/advisories/zabbix181api-sql.txt", "name": "http://legalhackers.com/advisories/zabbix181api-sql.txt", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.zabbix.com/rn1.8.2.php", "name": "http://www.zabbix.com/rn1.8.2.php", "tags": ["Patch"], "refsource": "MISC"}, {"url": "http://secunia.com/advisories/39119", "name": "39119", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.osvdb.org/63456", "name": "63456", "tags": [], "refsource": "OSVDB"}, {"url": "http://legalhackers.com/poc/zabbix181api.pl-poc", "name": "http://legalhackers.com/poc/zabbix181api.pl-poc", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.vupen.com/english/advisories/2010/0799", "name": "ADV-2010-0799", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded", "name": "20100401 Zabbix <= 1.8.1 SQL Injection", "tags": [], "refsource": "BUGTRAQ"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-89"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2010-1277", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2010-04-06T16:30Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-10T19:56Z"}