cvelist/2017/1000xxx/CVE-2017-1000021.json

2 lines
839 B
JSON
Raw Normal View History

{"data_version": "4.0","references": {"reference_data": [{"url": "https://randorisec.fr/logicaldoc-from-guest-to-root/"}]},"description": {"description_data": [{"lang": "eng","value": "LogicalDoc CommunityEdition 7.5.3 and prior is vulnerable to XXE when indexing XML documents."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "Logicaldoc Community Edition 7.5.3"}]},"product_name": "LogicalDoc"}]},"vendor_name": "LogicalDoc"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2017-05-06T20:43:28.271797","STATE": "PUBLIC", "ID": "CVE-2017-1000021","ASSIGNER": "kurt@seifried.org","REQUESTER": "montel.florent@gmail.com"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "XML External Entity (XXE)"}]}]}}