{
  "threat_severity" : "Moderate",
  "public_date" : "2012-03-07T00:00:00Z",
  "bugzilla" : {
    "description" : "python-sqlalchemy: SQL injection flaw due to not checking LIMIT input for correct type",
    "id" : "783305",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=783305"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "status" : "verified"
  },
  "details" : [ "Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2012-03-07T00:00:00Z",
    "advisory" : "RHSA-2012:0369",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "python-sqlalchemy-0:0.5.5-3.el6_2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-0805\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-0805" ],
  "name" : "CVE-2012-0805",
  "csaw" : false
}