mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
87 lines
2.8 KiB
JSON
87 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2007-5262",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple format string vulnerabilities in Battlefront Dropteam 1.3.3 and earlier allow remote attackers to execute arbitrary code via format string specifiers in the (1) username, (2) password, and (3) nickname fields in a \"0x01\" packet."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://aluigi.altervista.org/adv/dropteamz-adv.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://aluigi.altervista.org/adv/dropteamz-adv.txt"
|
|
},
|
|
{
|
|
"name": "dropteam-0x1packet-format-string(36974)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36974"
|
|
},
|
|
{
|
|
"name": "20071005 Multiple vulnerabilities in Dropteam 1.3.3",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/481616/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "25943",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/25943"
|
|
},
|
|
{
|
|
"name": "27107",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/27107"
|
|
},
|
|
{
|
|
"name": "3202",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/3202"
|
|
}
|
|
]
|
|
}
|
|
} |