cvelist/2014/0xxx/CVE-2014-0999.json
2019-03-18 01:26:39 +00:00

82 lines
2.8 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-0999",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2015/May/95"
},
{
"name": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html"
},
{
"name": "20150522 [CORE-2015-0010] - Sendio ESP Information Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/535592/100/0/threaded"
},
{
"name": "http://www.sendio.com/software-release-history/",
"refsource": "CONFIRM",
"url": "http://www.sendio.com/software-release-history/"
},
{
"name": "37114",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/37114"
}
]
}
}