cvelist/2015/2xxx/CVE-2015-2094.json

91 lines
2.5 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2015-2094",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Stack-based buffer overflow in the WESPPlayback.WESPPlaybackCtrl.1 control in WebGate WinRDS allows remote attackers to execute arbitrary code via unspecified vectors to the (1) PrintSiteImage, (2) PlaySiteAllChannel, (3) StopSiteAllChannel, or (4) SaveSiteImage function."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.exploit-db.com/exploits/36517/"
},
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-071/"
},
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-072/"
},
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-073/"
},
{
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-074/"
},
{
"url" : "http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html"
},
{
"url" : "http://www.securityfocus.com/bid/72841"
},
{
"url" : "http://www.osvdb.org/118905"
},
{
"url" : "http://www.osvdb.org/118906"
},
{
"url" : "http://www.osvdb.org/118907"
},
{
"url" : "http://www.osvdb.org/118908"
}
]
}
}