mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
102 lines
3.4 KiB
JSON
102 lines
3.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-3426",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence in the (1) action, (2) agentid, or (3) index parameters to dagent/nwupload.asp, which are used as pathname components."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20060629 Multiple Vulnerabilities in PatchLink Update Server 6",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html"
|
|
},
|
|
{
|
|
"name": "18732",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/18732"
|
|
},
|
|
{
|
|
"name": "20060629 Multiple Vulnerabilities in PatchLink Update Server 6",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/438710/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "20876",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/20876"
|
|
},
|
|
{
|
|
"name": "20878",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/20878"
|
|
},
|
|
{
|
|
"name": "1200",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/1200"
|
|
},
|
|
{
|
|
"name": "ADV-2006-2596",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/2596"
|
|
},
|
|
{
|
|
"name": "ADV-2006-2595",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/2595"
|
|
},
|
|
{
|
|
"name": "1016405",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1016405"
|
|
}
|
|
]
|
|
}
|
|
} |