cvelist/2014/0xxx/CVE-2014-0999.json

82 lines
2.8 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 01:26:39 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-0999",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 01:26:39 +00:00
"lang": "eng",
"value": "Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header."
2017-10-16 12:31:07 -04:00
}
2019-03-18 01:26:39 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/May/95"
},
{
"name": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html"
},
{
"name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535592/100/0/threaded"
},
{
"name": "http://www.sendio.com/software-release-history/",
"refsource": "CONFIRM",
"url": "http://www.sendio.com/software-release-history/"
},
{
"name": "37114",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/37114"
}
]
}
}