mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
78 lines
2.1 KiB
JSON
78 lines
2.1 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2015-2308",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Eval injection vulnerability in the HttpCache class in HttpKernel in Symfony 2.x before 2.3.27, 2.4.x and 2.5.x before 2.5.11, and 2.6.x before 2.6.6 allows remote attackers to execute arbitrary PHP code via a language=\"php\" attribute of a SCRIPT element."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://symfony.com/blog/cve-2015-2308-esi-code-injection",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://symfony.com/blog/cve-2015-2308-esi-code-injection"
|
|
},
|
|
{
|
|
"name" : "JVN#19578958",
|
|
"refsource" : "JVN",
|
|
"url" : "http://jvn.jp/en/jp/JVN19578958/index.html"
|
|
},
|
|
{
|
|
"name" : "JVNDB-2015-000089",
|
|
"refsource" : "JVNDB",
|
|
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000089"
|
|
},
|
|
{
|
|
"name" : "75357",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/75357"
|
|
}
|
|
]
|
|
}
|
|
}
|