mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
112 lines
4.0 KiB
JSON
112 lines
4.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-0058",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Buffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to elevate privileges or execute arbitrary code via a crafted message."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "oval:org.mitre.oval:def:1297",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1297"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:100088",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100088"
|
|
},
|
|
{
|
|
"name": "14518",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/14518"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:1075",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1075"
|
|
},
|
|
{
|
|
"name": "MS05-040",
|
|
"refsource": "MS",
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040"
|
|
},
|
|
{
|
|
"name": "1014639",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1014639"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:100086",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100086"
|
|
},
|
|
{
|
|
"name": "16354",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16354/"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:100084",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100084"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:1213",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1213"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:100085",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100085"
|
|
}
|
|
]
|
|
}
|
|
} |