{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2016-15018","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-14T17:04:52.913Z","datePublished":"2023-01-15T18:58:04.715Z","dateUpdated":"2024-08-06T03:47:34.645Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T10:04:48.360Z"},"title":"krail-jpa sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"krail-jpa","versions":[{"version":"0.9.0","status":"affected"},{"version":"0.9.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in krail-jpa up to 0.9.1. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version 0.9.2 is able to address this issue. The identifier of the patch is c1e848665492e21ef6cc9be443205e36b9a1f6be. It is recommended to upgrade the affected component. The identifier VDB-218373 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in krail-jpa bis 0.9.1 ausgemacht. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil. Dank Manipulation mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 0.9.2 vermag dieses Problem zu lösen. Der Patch wird als c1e848665492e21ef6cc9be443205e36b9a1f6be bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.2,"vectorString":"AV:A/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-14T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-14T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-14T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-02-07T14:35:58.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.218373","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.218373","tags":["signature","permissions-required"]},{"url":"https://github.com/KrailOrg/krail-jpa/issues/18","tags":["issue-tracking"]},{"url":"https://github.com/KrailOrg/krail-jpa/commit/c1e848665492e21ef6cc9be443205e36b9a1f6be","tags":["patch"]},{"url":"https://github.com/KrailOrg/krail-jpa/releases/tag/0.9.2","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T03:47:34.645Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.218373","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.218373","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/KrailOrg/krail-jpa/issues/18","tags":["issue-tracking","x_transferred"]},{"url":"https://github.com/KrailOrg/krail-jpa/commit/c1e848665492e21ef6cc9be443205e36b9a1f6be","tags":["patch","x_transferred"]},{"url":"https://github.com/KrailOrg/krail-jpa/releases/tag/0.9.2","tags":["patch","x_transferred"]}]}]}}