{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:38:42.334","vulnerabilities":[{"cve":{"id":"CVE-2008-6365","sourceIdentifier":"cve@mitre.org","published":"2009-03-02T16:30:00.687","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in logon.jsp in Ad Server Solutions Ad Management Software Java allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password, related to the uname or pass parameters to logon.jsp or logon_processing.jsp.  NOTE: some of these details are obtained from third party information."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en logon.jsp en Ad Server Solutions Ad Management Software Java permite a atacantes remotos ejecutar comandos SQL de su elección mediante el (1) usuario y (2) la contraseña, relacionados con los parámetros \"uname\" o \"pass\" de logon.jsp o logon_processing.jsp. NOTA: algunos de estos detalles se han obtenido de información de terceros."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adserversolutions:ad_management_software:-:java:*:*:*:*:*:*","matchCriteriaId":"EFFCBDBC-38D0-404E-BF95-68568C074935"}]}]}],"references":[{"url":"http://secunia.com/advisories/33072","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/32790","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47282","source":"cve@mitre.org"},{"url":"https://www.exploit-db.com/exploits/7424","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/33072","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/32790","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47282","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/7424","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}