mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
87 lines
2.9 KiB
JSON
87 lines
2.9 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@symantec.com",
|
|
"ID": "CVE-2016-9091",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Blue Coat ASG",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "6.6 prior to 6.6.5.4"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Blue Coat CAS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.3 prior to 1.3.7.4"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Symantec Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Blue Coat Advanced Secure Gateway (ASG) 6.6 before 6.6.5.4 and Content Analysis System (CAS) 1.3 before 1.3.7.4 are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "OS command injection"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "97372",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/97372"
|
|
},
|
|
{
|
|
"name": "41785",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/41785/"
|
|
},
|
|
{
|
|
"name": "41786",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/41786/"
|
|
},
|
|
{
|
|
"name": "https://bto.bluecoat.com/security-advisory/sa138",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bto.bluecoat.com/security-advisory/sa138"
|
|
}
|
|
]
|
|
}
|
|
} |