mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2002-1215",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple format string vulnerabilities in heartbeat 0.4.9 and earlier (claimed as buffer overflows in some sources) allow remote attackers to execute arbitrary code via certain packets to UDP port 694 (incorrectly claimed as TCP in some sources)."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "CLA-2002:540",
|
|
"refsource": "CONECTIVA",
|
|
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000540"
|
|
},
|
|
{
|
|
"name": "SuSE-SA:2002:037",
|
|
"refsource": "SUSE",
|
|
"url": "http://www.novell.com/linux/security/advisories/2002_037_heartbeat.html"
|
|
},
|
|
{
|
|
"name": "DSA-174",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2002/dsa-174"
|
|
},
|
|
{
|
|
"name": "linuxha-heartbeat-bo(10357)",
|
|
"refsource": "XF",
|
|
"url": "http://www.iss.net/security_center/static/10357.php"
|
|
},
|
|
{
|
|
"name": "5955",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/5955"
|
|
},
|
|
{
|
|
"name": "http://linux-ha.org/security/sec01.txt",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://linux-ha.org/security/sec01.txt"
|
|
}
|
|
]
|
|
}
|
|
} |