Show plain JSON{"id": "CVE-2007-4634", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-08-31T23:17:00.000", "references": [{"url": "http://secunia.com/advisories/26641", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1018624", "source": "cve@mitre.org"}, {"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00808ae327.shtml", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/25480", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2007/3010", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36326", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in Cisco CallManager and Unified Communications Manager (CUCM) before 3.3(5)sr2b, 4.1 before 4.1(3)sr5, 4.2 before 4.2(3)sr2, and 4.3 before 4.3(1)sr1 allow remote attackers to execute arbitrary SQL commands via the lang variable to the (1) user or (2) admin logon page, aka CSCsi64265."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Cisco CallManager y Unified Communications Manager (CUCM) versiones anteriores a 3.3(5)sr2b, 4.1 versiones anteriores a 4.1(3)sr5, 4.2 versiones anteriores a 4.2(3)sr2, y 4.3 versiones anteriores a 4.3(1)sr1, permiten a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante la variable lang en la p\u00e1gina de acceso de (1) usuario \u00f3 (2) administrador, tambi\u00e9n conocido como CSCsi64265."}], "lastModified": "2017-07-29T01:33:04.050", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B9DA1F8-FA05-4380-8EFF-AF9FEF18FF2E"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65BB9155-89E5-4D54-AF1B-D5CA38392D5D"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A76CD6B-0C24-4F5F-B4BB-BA114150A7F1"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9BD08CD-9169-4B1E-A6DE-B138E6AB533C"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFFD96E3-B19F-41B7-86FD-DBFD41382C28"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E9BF838-87A2-43B8-975B-524D7F954BF5"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9600EA23-5428-4312-A38E-480E3C3228BF"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57F5547E-F9C8-4F9C-96A1-563A66EE8D48"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6C20851-DC17-4E89-A6C1-D1B52D47608F"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC830649-C0D4-4FFC-8701-80FB4A706F58"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "935D2815-7146-4125-BDBE-BFAA62A88EC9"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BF54827-75E6-4BA0-84F0-0EC0E24A4A73"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C8628E7-D3C8-4212-B0A5-6B5AC14D6101"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C"}, {"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F1DEC3B-2782-4144-9651-73116294765D"}, {"criteria": "cpe:2.3:h:cisco:call_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6049596-9D62-4EC4-BEAE-A2023F6F3346"}, {"criteria": "cpe:2.3:h:cisco:call_manager:3.3\\(5\\)sr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87560280-EF6A-46DC-9368-0C98E0A5B7E8"}, {"criteria": "cpe:2.3:h:cisco:call_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F977BD4D-308D-4415-9302-5C44238881A7"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "373E71AE-C735-4476-A574-56C35BAD8DB0"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F9AA9D0-3205-4A5D-8161-C80D1855D91E"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B771F3F8-CD24-4710-A7A8-D4F9E0DB4BB2"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71DA8A99-A678-42F8-AFC5-323E77D9BCC5"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3C30434-29FD-45D4-B9D8-BEB65FE4471A"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FA55FCB-FFFB-495F-86A8-262E7995B519"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6ECFC2B-9978-46FF-BC4E-A81B9B835E29"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.2\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3979687E-2BDE-42CD-ACF6-5EE3AF6CD5B2"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.2\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB63E43F-96D1-442E-8AA7-B0183117F6A4"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.2\\(3\\)sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86960ABE-F133-49EE-A8E3-70CF1DD93ADC"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.2\\(3\\)sr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36C8C9AA-8AA2-40C2-88A2-0860543601C6"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98B77A94-5477-4703-9421-2266EC603319"}, {"criteria": "cpe:2.3:h:cisco:call_manager:4.3\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AF86C50-A2B2-4944-8361-C67766DCA2DA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}