cvelist/2006/0xxx/CVE-2006-0223.json

87 lines
2.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 00:39:24 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0223",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 00:39:24 +00:00
"lang": "eng",
"value": "Directory traversal vulnerability in Shanghai TopCMM 123 Flash Chat Server Software 5.1 allows attackers to create or overwrite arbitrary files on the server via \"..\" (dot dot) sequences in the username field."
2017-10-16 12:31:07 -04:00
}
2019-03-18 00:39:24 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18455",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18455"
},
{
"name": "16235",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16235"
},
{
"name": "ADV-2006-0198",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0198"
},
{
"name": "http://www.123flashchat.com/flash-chat-server-v512.html",
"refsource": "MISC",
"url": "http://www.123flashchat.com/flash-chat-server-v512.html"
},
{
"name": "22440",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/22440"
},
{
"name": "123flashchat-user-directory-traversal(24137)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24137"
}
]
}
}