Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in the Export CSV page in the Participants Database plugin before 1.5.4.9 for WordPress allows remote attackers to execute arbitrary SQL commands via the query parameter in an \"output CSV\" action to pdb-signup/."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2014-06-04T14:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html"}, {"tags": ["x_refsource_MISC"], "url": "https://www.yarubo.com/advisories/1"}, {"name": "33613", "tags": ["exploit", "x_refsource_EXPLOIT-DB"], "url": "http://www.exploit-db.com/exploits/33613"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://wordpress.org/plugins/participants-database/changelog"}, {"name": "20140601 Yarubo #1: Arbitrary SQL Execution in Participants Database\tfor Wordpress", "tags": ["mailing-list", "x_refsource_FULLDISC"], "url": "http://seclists.org/fulldisclosure/2014/Jun/0"}, {"name": "107626", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://osvdb.org/show/osvdb/107626"}, {"name": "67769", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/67769"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3961", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "SQL injection vulnerability in the Export CSV page in the Participants Database plugin before 1.5.4.9 for WordPress allows remote attackers to execute arbitrary SQL commands via the query parameter in an \"output CSV\" action to pdb-signup/."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html"}, {"name": "https://www.yarubo.com/advisories/1", "refsource": "MISC", "url": "https://www.yarubo.com/advisories/1"}, {"name": "33613", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/33613"}, {"name": "https://wordpress.org/plugins/participants-database/changelog", "refsource": "CONFIRM", "url": "https://wordpress.org/plugins/participants-database/changelog"}, {"name": "20140601 Yarubo #1: Arbitrary SQL Execution in Participants Database\tfor Wordpress", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Jun/0"}, {"name": "107626", "refsource": "OSVDB", "url": "http://osvdb.org/show/osvdb/107626"}, {"name": "67769", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67769"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T10:57:18.112Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/126878/WordPress-Participants-Database-1.5.4.8-SQL-Injection.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.yarubo.com/advisories/1"}, {"name": "33613", "tags": ["exploit", "x_refsource_EXPLOIT-DB", "x_transferred"], "url": "http://www.exploit-db.com/exploits/33613"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://wordpress.org/plugins/participants-database/changelog"}, {"name": "20140601 Yarubo #1: Arbitrary SQL Execution in Participants Database\tfor Wordpress", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"], "url": "http://seclists.org/fulldisclosure/2014/Jun/0"}, {"name": "107626", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://osvdb.org/show/osvdb/107626"}, {"name": "67769", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/67769"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3961", "datePublished": "2014-06-04T14:00:00Z", "dateReserved": "2014-06-04T00:00:00Z", "dateUpdated": "2024-09-16T16:27:38.978Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}