mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.8 KiB
JSON
82 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@us.ibm.com",
|
|
"ID": "CVE-2014-3037",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site request forgery (CSRF) vulnerability in IBM Configuration Management Application (aka VVC) in IBM Rational Engineering Lifecycle Manager before 4.0.7 and 5.x before 5.0.1, Rational Software Architect Design Manager before 4.0.7 and 5.x before 5.0.1, and Rational Rhapsody Design Manager before 4.0.7 and 5.x before 5.0.1 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "ibm-vvc-cve20143037-csrf(93303)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93303"
|
|
},
|
|
{
|
|
"name": "69658",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/69658"
|
|
},
|
|
{
|
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21682120",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21682120"
|
|
},
|
|
{
|
|
"name": "61071",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/61071"
|
|
},
|
|
{
|
|
"name": "60649",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/60649"
|
|
}
|
|
]
|
|
}
|
|
} |