mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.8 KiB
JSON
87 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@us.ibm.com",
|
|
"ID": "CVE-2012-0708",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Heap-based buffer overflow in the Ole API in the CQOle ActiveX control in cqole.dll in IBM Rational ClearQuest 7.1.1 before 7.1.1.9, 7.1.2 before 7.1.2.6, and 8.0.0 before 8.0.0.2 allows remote attackers to execute arbitrary code via a crafted web page that leverages a RegisterSchemaRepoFromFileByDbSet function-prototype mismatch."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "1026958",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id?1026958"
|
|
},
|
|
{
|
|
"name": "rcq-cqole-activex-bo(73492)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73492"
|
|
},
|
|
{
|
|
"name": "81443",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/81443"
|
|
},
|
|
{
|
|
"name": "http://www.ibm.com/support/docview.wss?uid=swg21591705",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.ibm.com/support/docview.wss?uid=swg21591705"
|
|
},
|
|
{
|
|
"name": "53170",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/53170"
|
|
},
|
|
{
|
|
"name": "48933",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/48933"
|
|
}
|
|
]
|
|
}
|
|
} |