mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
83 lines
2.4 KiB
JSON
83 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2005-2670",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Directory traversal vulnerability in HAURI Anti-Virus products including ViRobot Expert 4.0, Advanced Server, Linux Server 2.0, and LiveCall allows remote attackers to overwrite arbitrary files via \"..\" sequences in filenames contained in (1) ACE, (2) ARJ, (3) CAB, (4) LZH, (5) RAR, (6) TAR and (7) ZIP files."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://secunia.com/secunia_research/2005-24/advisory",
|
|
"refsource" : "MISC",
|
|
"url" : "http://secunia.com/secunia_research/2005-24/advisory"
|
|
},
|
|
{
|
|
"name" : "http://www.globalhauri.com/html/download/down_unixpatch.html",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.globalhauri.com/html/download/down_unixpatch.html"
|
|
},
|
|
{
|
|
"name" : "14606",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/14606"
|
|
},
|
|
{
|
|
"name" : "1014740",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1014740"
|
|
},
|
|
{
|
|
"name" : "15846",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/15846"
|
|
}
|
|
]
|
|
}
|
|
}
|