Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://packetstormsecurity.com/files/123821/Ops-View-Pre-4.4.1-Blind-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/123821/Ops-View-Pre-4.4.1-Blind-SQL-Injection.html", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0149.html", "name": "20131028 CVE-2013-5694 Blind SQL Injection in Ops View", "tags": ["Exploit"], "refsource": "BUGTRAQ"}, {"url": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes", "name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes", "tags": [], "refsource": "MISC"}, {"url": "http://osvdb.org/99038", "name": "99038", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.exploit-db.com/exploits/29326", "name": "29326", "tags": [], "refsource": "EXPLOIT-DB"}, {"url": "http://osvdb.org/ref/99/opsview-sqli.txt", "name": "http://osvdb.org/ref/99/opsview-sqli.txt", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/63387", "name": "63387", "tags": ["Exploit"], "refsource": "BID"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "SQL injection vulnerability in status/service/acknowledge in Opsview before 4.4.1 allows remote attackers to execute arbitrary SQL commands via the service_selection parameter."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-89"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2013-5694", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2013-11-05T20:55Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.2:-:*:*:pro:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.2:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.1:-:*:*:pro:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.1:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.10:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.8:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.6:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.4:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.1:-:*:*:community:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.0:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.2:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.14:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.12:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.0:-:*:*:pro:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:3.0:-:*:*:community:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.3:-:*:*:pro:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:*:-:*:*:pro:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "4.4"}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:*:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "4.4"}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:opsview:opsview:4.3:-:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2013-11-07T01:03Z"}