mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
102 lines
3.5 KiB
JSON
102 lines
3.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-0869",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory traversal vulnerability in the \"remember me\" feature in liveuser.php in PHP Extension and Application Repository (PEAR) LiveUser 0.16.8 and earlier allows remote attackers to determine file existence, and possibly delete arbitrary files with short pathnames or possibly read arbitrary files, via a .. (dot dot) in the store_id value of a cookie."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://pear.php.net/package/LiveUser/download/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://pear.php.net/package/LiveUser/download/"
|
|
},
|
|
{
|
|
"name": "1015659",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1015659"
|
|
},
|
|
{
|
|
"name": "16761",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/16761"
|
|
},
|
|
{
|
|
"name": "liveuser-liveuser-file-deletion(24853)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24853"
|
|
},
|
|
{
|
|
"name": "liveuser-liveuser-file-access(24852)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24852"
|
|
},
|
|
{
|
|
"name": "20060221 PEAR LiveUser File Access Vulnerabilities",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/425711/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "466",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/466"
|
|
},
|
|
{
|
|
"name": "ADV-2006-0697",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/0697"
|
|
},
|
|
{
|
|
"name": "http://www.gulftech.org/?node=research&article_id=00103-02212006",
|
|
"refsource": "MISC",
|
|
"url": "http://www.gulftech.org/?node=research&article_id=00103-02212006"
|
|
}
|
|
]
|
|
}
|
|
} |