cvelist/2018/11xxx/CVE-2018-11615.json

63 lines
1.8 KiB
JSON
Raw Normal View History

2018-05-31 12:03:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "zdi-disclosures@trendmicro.com",
2018-05-31 12:03:07 -04:00
"ID" : "CVE-2018-11615",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "npm mosca",
"version" : {
"version_data" : [
{
"version_value" : "2.8.1"
}
]
}
}
]
},
"vendor_name" : "npm"
}
]
}
2018-05-31 12:03:07 -04:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
2018-08-30 08:03:39 -04:00
"value" : "This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system. Was ZDI-CAN-6306."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-20-Improper Input Validation"
}
]
}
]
},
"references" : {
"reference_data" : [
{
2018-08-30 08:03:39 -04:00
"name" : "https://zerodayinitiative.com/advisories/ZDI-18-583",
"refsource" : "MISC",
"url" : "https://zerodayinitiative.com/advisories/ZDI-18-583"
2018-05-31 12:03:07 -04:00
}
]
}
}