{"uuid": "29e0d8d3-cdf7-441a-981a-bfa310679aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-13292", "type": "seen", "source": "https://t.me/cveNotify/215", "content": "\ud83d\udea8 #CVE-2019-13292\nA SQL Injection issue was discovered in webERP 4.15. Payments.php accepts payment data in base64 format. After this is decoded, it is deserialized. Then, this deserialized data goes directly into a SQL query, with no sanitizing checks. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13292\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T00:59:53.000000Z"}