{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T10:41:59.716","vulnerabilities":[{"cve":{"id":"CVE-2004-0300","sourceIdentifier":"cve@mitre.org","published":"2004-11-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in Online Store Kit 3.0 allows remote attackers to inject arbitrary SQL and gain unauthorized access via (1) the cat parameter in shop.php, (2) the id parameter in more.php, (3) the cat_manufacturer parameter in shop_by_brand.php, or (4) the id parameter in listing.php."},{"lang":"es","value":"Vulnerabilidad de inyección de SQL en Online Store Kit 3.0 permite a atacantes remotos inyectar SQL arbitrario y ganar acceso no autorizado mediante (1) el parámetro cat en shop.php, (2) el parámetro id en more.php, y (3) el parámetro cat_manufacturer en shop_by_brand.php, o (4) el parámetro id en listing.php."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ecommerce_corporation_online:store_kit:3.0_lite:*:*:*:*:*:*:*","matchCriteriaId":"3A4E7003-79F8-41F7-83C7-213842CD8F7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ecommerce_corporation_online:store_kit:3.0_pro:*:*:*:*:*:*:*","matchCriteriaId":"ECE2A17C-E33D-4527-AA90-0B1C39F63DE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ecommerce_corporation_online:store_kit:3.0_standard:*:*:*:*:*:*:*","matchCriteriaId":"50876CBB-538F-4AC0-AA89-7E5119F1A6E4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=107712117913185&w=2","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/10902/","source":"cve@mitre.org"},{"url":"http://securitytracker.com/alerts/2004/Feb/1009092.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3973","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/9676","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/9687","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.systemsecure.org/advisories/ssadvisory16022004.php","source":"cve@mitre.org"},{"url":"http://www.zone-h.org/en/advisories/read/id=3972/","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15232","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=107712117913185&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/10902/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/alerts/2004/Feb/1009092.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3973","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/9676","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/9687","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.systemsecure.org/advisories/ssadvisory16022004.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.zone-h.org/en/advisories/read/id=3972/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15232","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}