cvelist/2016/5xxx/CVE-2016-5402.json

89 lines
2.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2018-10-31 09:05:25 -04:00
"CVE_data_meta" : {
"ASSIGNER" : "lpardo@redhat.com",
"ID" : "CVE-2016-5402",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
2018-10-30 18:43:47 -03:00
{
2018-10-31 09:05:25 -04:00
"product" : {
"product_data" : [
{
"product_name" : "cfme",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "[UNKNOWN]"
2018-10-30 18:43:47 -03:00
}
2018-10-31 09:05:25 -04:00
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A code injection flaw was found in the way capacity and utilization imported control files are processed. A remote, authenticated attacker with access to the capacity and utilization feature could use this flaw to execute arbitrary code as the user CFME runs as."
}
]
},
"impact" : {
"cvss" : [
[
2018-10-30 18:43:47 -03:00
{
2018-10-31 09:05:25 -04:00
"vectorString" : "8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version" : "3.0"
2018-10-30 18:43:47 -03:00
}
2018-10-31 09:05:25 -04:00
],
[
2018-10-30 18:43:47 -03:00
{
2018-10-31 09:05:25 -04:00
"vectorString" : "8.5/AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version" : "2.0"
2018-10-30 18:43:47 -03:00
}
2018-10-31 09:05:25 -04:00
]
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-94"
}
2018-10-30 18:43:47 -03:00
]
2018-10-31 09:05:25 -04:00
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5402",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5402"
2018-11-01 06:08:42 -04:00
},
{
"name" : "RHSA-2016:2839",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2839.html"
},
{
"name" : "94612",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/94612"
2018-10-31 09:05:25 -04:00
}
]
}
}