mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
72 lines
2.3 KiB
JSON
72 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2002-1253",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Abuse 2.00 and earlier allows local users to gain privileges via command line arguments that specify alternate Lisp scripts that run at escalated privileges, which can contain functions that execute commands or modify files."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://www.idefense.com/advisory/11.01.02.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://www.idefense.com/advisory/11.01.02.txt"
|
|
},
|
|
{
|
|
"name": "abuse-lisp-gain-privileges(11300)",
|
|
"refsource": "XF",
|
|
"url": "http://www.iss.net/security_center/static/11300.php"
|
|
},
|
|
{
|
|
"name": "20021101 iDEFENSE Security Advisory 11.01.02: Buffer Overflow Vulnerability in Abuse",
|
|
"refsource": "VULNWATCH",
|
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0055.html"
|
|
}
|
|
]
|
|
}
|
|
} |