{"uuid": "26fda816-31ba-4c7d-bfe8-ea9fece041f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-10056", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10749", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2015-10056\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability was found in 2071174A vinylmap. It has been classified as critical. Affected is the function contact of the file recordstoreapp/views.py. The manipulation leads to sql injection. The name of the patch is b07b79a1e92cc62574ba0492cce000ef4a7bd25f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218400.\n\ud83d\udccf Published: 2023-01-16T18:58:04.590Z\n\ud83d\udccf Modified: 2025-04-07T16:47:48.899Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.218400\n2. https://vuldb.com/?ctiid.218400\n3. https://github.com/2071174A/vinylmap/commit/b07b79a1e92cc62574ba0492cce000ef4a7bd25f", "creation_timestamp": "2025-04-07T17:45:36.000000Z"}