mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
118 lines
3.5 KiB
JSON
118 lines
3.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2005-3539",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Multiple eval injection vulnerabilities in HylaFAX 4.2.3 and earlier allow remote attackers to execute arbitrary commands via (1) the notify script in HylaFAX 4.2.0 to 4.2.3 and (2) crafted CallID parameters to the faxrcvd script in HylaFAX 4.2.2 and 4.2.3."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20060105 HylaFAX Security advisory - fixed in HylaFAX 4.2.4",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/420974/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719",
|
|
"refsource" : "MISC",
|
|
"url" : "http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719"
|
|
},
|
|
{
|
|
"name" : "http://www.hylafax.org/content/HylaFAX_4.2.4_release",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.hylafax.org/content/HylaFAX_4.2.4_release"
|
|
},
|
|
{
|
|
"name" : "DSA-933",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2005/dsa-933"
|
|
},
|
|
{
|
|
"name" : "GLSA-200601-03",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200601-03.xml"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2006:015",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:015"
|
|
},
|
|
{
|
|
"name" : "16151",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/16151"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-0072",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/0072"
|
|
},
|
|
{
|
|
"name" : "18314",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/18314"
|
|
},
|
|
{
|
|
"name" : "18337",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/18337"
|
|
},
|
|
{
|
|
"name" : "18366",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/18366"
|
|
},
|
|
{
|
|
"name" : "18489",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/18489"
|
|
}
|
|
]
|
|
}
|
|
}
|