cvelist/2011/0xxx/CVE-2011-0926.json

92 lines
3.1 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 04:52:18 +00:00
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2011-0926",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 04:52:18 +00:00
"lang": "eng",
"value": "A certain ActiveX control in CSDWebInstaller.ocx in Cisco Secure Desktop (CSD) does not properly verify the signature of an unspecified downloaded program, which allows remote attackers to execute arbitrary code by spoofing the CSD installation process, a different vulnerability than CVE-2010-0589."
2017-10-16 12:31:07 -04:00
}
2019-03-18 04:52:18 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0513",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0513"
},
{
"name": "cisco-securedesktop-activex-code-execution(65755)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65755"
},
{
"name": "20110223 ZDI-11-091: (0day) Cisco Secure Desktop CSDWebInstaller Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/516647/100/0/threaded"
},
{
"name": "8105",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8105"
},
{
"name": "1025118",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025118"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-091/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-091/"
},
{
"name": "46536",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46536"
}
]
}
}