cvelist/2017/10xxx/CVE-2017-10815.json

77 lines
2.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 23:15:10 +00:00
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2017-10815",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "MaLion for Windows",
"version": {
"version_data": [
{
"version_value": "5.2.1 and earlier (only when \"Remote Control\" is installed)"
}
]
}
},
{
"product_name": "MaLion for Mac",
"version": {
"version_data": [
{
"version_value": "4.0.1 to 5.2.1 (only when \"Remote Control\" is installed)"
}
]
}
}
]
},
"vendor_name": "Intercom, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:15:10 +00:00
"lang": "eng",
"value": "MaLion for Windows 5.2.1 and earlier (only when \"Remote Control\" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when \"Remote Control\" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:15:10 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authentication bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.intercom.co.jp/information/2017/0801.html",
"refsource": "MISC",
"url": "http://www.intercom.co.jp/information/2017/0801.html"
},
{
"name": "https://jvn.jp/en/vu/JVNVU91587298/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
}
]
}
}