mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
72 lines
2.4 KiB
JSON
72 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2021-47156",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/",
|
|
"refsource": "MISC",
|
|
"name": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/"
|
|
},
|
|
{
|
|
"url": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes",
|
|
"refsource": "MISC",
|
|
"name": "https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes"
|
|
},
|
|
{
|
|
"url": "https://metacpan.org/release/Net-IPAddress-Util",
|
|
"refsource": "MISC",
|
|
"name": "https://metacpan.org/release/Net-IPAddress-Util"
|
|
}
|
|
]
|
|
}
|
|
} |