[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-6887":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-23T10:19:07.713Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":44,"aliases":45,"duplicate_of":9,"upstream":46,"downstream":47,"duplicates":48,"related":49,"reserved_at":9,"published_at":50,"modified_at":51,"state":52,"summary":53,"references_raw":60,"kevs":71,"epss":9,"epss_history":72,"metrics":73,"affected":85},"CVE-2026-6887","Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-89","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.","weakness","Stable","Base","High",[20,24,28,32,36,40],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-109","Object Relational Mapping Injection",[],{"id":29,"name":30,"techniques":31},"CAPEC-110","SQL Injection through SOAP Parameter Tampering",[],{"id":33,"name":34,"techniques":35},"CAPEC-470","Expanding Control over the Operating System from the Database",[],{"id":37,"name":38,"techniques":39},"CAPEC-66","SQL Injection",[],{"id":41,"name":42,"techniques":43},"CAPEC-7","Blind SQL Injection",[],[],[],[],[],[],[],"2026-04-23T09:30:29.670Z","2026-04-23T09:31:41.817Z","Received",{"cisa_kev":54,"cisa_ransomware":54,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":55,"severity_score":56,"severity_version":57,"severity_source":58,"severity_vector":59,"severity_status":52},false,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[61,67],{"url":62,"sources":63,"tags":65},"https://www.twcert.org.tw/tw/cp-132-10861-b8709-1.html",[58,64],"nvd",[66],"Third Party Advisory",{"url":68,"sources":69,"tags":70},"https://www.twcert.org.tw/en/cp-139-10863-2f48e-2.html",[58,64],[66],[],[],[74,81],{"source":58,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":75,"cvss_v4_0":78},{"baseScore":56,"baseSeverity":76,"vectorString":59,"impactScore":56,"exploitabilityScore":77},"CRITICAL",10,{"baseScore":79,"baseSeverity":76,"vectorString":80,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":64,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":82,"cvss_v4_0":83},{"baseScore":56,"baseSeverity":76,"vectorString":59,"impactScore":56,"exploitabilityScore":77},{"baseScore":79,"baseSeverity":76,"vectorString":84,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[86],{"ecosystem":9,"name":87,"vendor":88,"product":89,"cpe_part":90,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":91},"Borg SPM 2007","borg technology corporation","borg spm 2007","a",[92],{"version":93,"is_range":54,"range_type":58,"version_start":93,"version_start_type":94,"version_end":93,"version_end_type":94,"fixed_in":9},"0","including"]