Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/centreon/centreon/releases", "name": "https://github.com/centreon/centreon/releases", "tags": ["Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://github.com/centreon/centreon/pull/6257", "name": "https://github.com/centreon/centreon/pull/6257", "tags": ["Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://github.com/centreon/centreon/pull/6256", "name": "https://github.com/centreon/centreon/pull/6256", "tags": ["Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://github.com/centreon/centreon/pull/6255", "name": "https://github.com/centreon/centreon/pull/6255", "tags": ["Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://github.com/centreon/centreon/pull/6251", "name": "https://github.com/centreon/centreon/pull/6251", "tags": ["Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://github.com/centreon/centreon/pull/6250", "name": "https://github.com/centreon/centreon/pull/6250", "tags": ["Patch", "Third Party Advisory"], "refsource": "CONFIRM"}, {"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.24.html", "name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.24.html", "tags": ["Release Notes", "Vendor Advisory"], "refsource": "CONFIRM"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in Centreon 3.4.6 including Centreon Web 2.8.23 allow attacks via the searchU parameter in viewLogs.php, the id parameter in GetXmlHost.php, the chartId parameter in ExportCSVServiceData.php, the searchCurve parameter in listComponentTemplates.php, or the host_id parameter in makeXML_ListMetrics.php."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-89"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2018-11589", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}}, "publishedDate": "2018-06-25T18:29Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:centreon:centreon_web:2.8.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:centreon:centreon:3.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-08-28T17:14Z"}