{ "schema_version": "1.4.0", "id": "GHSA-c67h-89mw-v4vj", "modified": "2022-05-17T04:13:16Z", "published": "2022-05-17T04:13:16Z", "aliases": [ "CVE-2012-1665" ], "details": "Multiple SQL injection vulnerabilities in the admin panel in osCMax before 2.5.1 allow (1) remote attackers to execute arbitrary SQL commands via the username parameter in a process action to admin/login.php or (2) remote administrators to execute arbitrary SQL commands via the status parameter to admin/stats_monthly_sales.php or (3) country parameter in a process action to admin/create_account_process.php.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1665" }, { "type": "WEB", "url": "https://www.htbridge.com/advisory/HTB23081" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0021.html" }, { "type": "WEB", "url": "http://bugtrack.oscmax.com/view.php?id=1165" }, { "type": "WEB", "url": "http://www.oscmax.com/blog/michael_s/oscmax_v251_has_been_released_security_update" }, { "type": "WEB", "url": "http://www.osvdb.org/80900" }, { "type": "WEB", "url": "http://www.osvdb.org/80901" }, { "type": "WEB", "url": "http://www.osvdb.org/80902" } ], "database_specific": { "cwe_ids": [ "CWE-89" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-05-20T18:59:00Z" } }