cvelist/2006/1xxx/CVE-2006-1505.json

82 lines
2.6 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 02:32:51 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1505",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 02:32:51 +00:00
"lang": "eng",
"value": "base_maintenance.php in Basic Analysis and Security Engine (BASE) before 1.2.4 (melissa), when running in standalone mode, allows remote attackers to bypass authentication, possibly by setting the standalone parameter to \"yes\"."
2017-10-16 12:31:07 -04:00
}
2019-03-18 02:32:51 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://cvs.sourceforge.net/viewcvs.py/secureideas/base-php4/docs/CHANGELOG?rev=1.233&view=markup",
"refsource": "CONFIRM",
"url": "http://cvs.sourceforge.net/viewcvs.py/secureideas/base-php4/docs/CHANGELOG?rev=1.233&view=markup"
},
{
"name": "24101",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24101"
},
{
"name": "19510",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19510"
},
{
"name": "17354",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17354"
},
{
"name": "ADV-2006-1192",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1192"
}
]
}
}