cvelist/2005/4xxx/CVE-2005-4533.json

87 lines
2.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 22:56:51 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-4533",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 22:56:51 +00:00
"lang": "eng",
"value": "Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via \"getopt\" style argument specifications, which are not filtered."
2017-10-16 12:31:07 -04:00
}
2019-03-17 22:56:51 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18223",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18223"
},
{
"name": "16051",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16051"
},
{
"name": "18236",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18236"
},
{
"name": "http://sublimation.org/scponly/#relnotes",
"refsource": "CONFIRM",
"url": "http://sublimation.org/scponly/#relnotes"
},
{
"name": "GLSA-200512-17",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
},
{
"name": "scponly-escape-shell-restrictions(23875)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23875"
}
]
}
}