mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2004-1658",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \\device\\physicalmemory to restore the running kernel's SDT ServiceTable."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.security.org.sg/vuln/kerio4016.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.security.org.sg/vuln/kerio4016.html"
|
|
},
|
|
{
|
|
"name": "kerio-pf-protection-dos(17270)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17270"
|
|
},
|
|
{
|
|
"name": "11096",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/11096"
|
|
},
|
|
{
|
|
"name": "12468",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/12468/"
|
|
},
|
|
{
|
|
"name": "20040902 Kerio Personal Firewall's Application Launch Protection Can Be Disabled by Direct Service Table Restoration",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=109420310631039&w=2"
|
|
}
|
|
]
|
|
}
|
|
} |