cvelist/2007/2xxx/CVE-2007-2881.json

102 lines
3.2 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 02:14:33 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-2881",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 02:14:33 +00:00
"lang": "eng",
"value": "Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation."
2017-10-16 12:31:07 -04:00
}
2019-03-18 02:14:33 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-1957",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1957"
},
{
"name": "sun-java-web-socks-bo(34524)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34524"
},
{
"name": "25405",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25405"
},
{
"name": "35841",
"refsource": "OSVDB",
"url": "http://osvdb.org/35841"
},
{
"name": "VU#746889",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/746889"
},
{
"name": "102927",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102927-1"
},
{
"name": "20070525 Sun Java System Web Proxy Multiple Buffer Overflow Vulnerabilities",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=536"
},
{
"name": "1018130",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018130"
},
{
"name": "24165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24165"
}
]
}
}