mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
88 lines
2.5 KiB
JSON
88 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2007-1137",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "putmail.py in Putmail before 1.4 does not detect when a user attempts to use TLS with a server that does not support it, which causes putmail.py to send the username and password in plaintext while the user believes encryption is in use, and allows remote attackers to obtain sensitive information."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://putmail.sourceforge.net/home.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://putmail.sourceforge.net/home.html"
|
|
},
|
|
{
|
|
"name" : "22718",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/22718"
|
|
},
|
|
{
|
|
"name" : "ADV-2007-0753",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2007/0753"
|
|
},
|
|
{
|
|
"name" : "33764",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://osvdb.org/33764"
|
|
},
|
|
{
|
|
"name" : "24266",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/24266"
|
|
},
|
|
{
|
|
"name" : "putmail-tls-password-plaintext(32689)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/32689"
|
|
}
|
|
]
|
|
}
|
|
}
|