mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
102 lines
3.6 KiB
JSON
102 lines
3.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2010-2465",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.darkreading.com/blog/archives/2010/04/attacking_door.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.darkreading.com/blog/archives/2010/04/attacking_door.html"
|
|
},
|
|
{
|
|
"name": "40374",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/40374"
|
|
},
|
|
{
|
|
"name": "VU#251133",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/251133"
|
|
},
|
|
{
|
|
"name": "http://www.kb.cert.org/vuls/id/MAPG-83TQL8",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.kb.cert.org/vuls/id/MAPG-83TQL8"
|
|
},
|
|
{
|
|
"name": "http://www.securityinfowatch.com/Executives+Columns+%2526+Features/1316527?pageNum=2",
|
|
"refsource": "MISC",
|
|
"url": "http://www.securityinfowatch.com/Executives+Columns+%2526+Features/1316527?pageNum=2"
|
|
},
|
|
{
|
|
"name": "http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon",
|
|
"refsource": "MISC",
|
|
"url": "http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon"
|
|
},
|
|
{
|
|
"name": "65757",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/65757"
|
|
},
|
|
{
|
|
"name": "41134",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/41134"
|
|
},
|
|
{
|
|
"name": "http://blip.tv/file/3414004",
|
|
"refsource": "MISC",
|
|
"url": "http://blip.tv/file/3414004"
|
|
}
|
|
]
|
|
}
|
|
} |