mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.3 KiB
JSON
82 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2013-6404",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"url" : "http://www.openwall.com/lists/oss-security/2013/11/28/8"
|
|
},
|
|
{
|
|
"url" : "http://quassel-irc.org/node/123"
|
|
},
|
|
{
|
|
"url" : "https://github.com/quassel/quassel/commit/a1a24da"
|
|
},
|
|
{
|
|
"url" : "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"
|
|
},
|
|
{
|
|
"url" : "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"
|
|
},
|
|
{
|
|
"url" : "http://osvdb.org/100432"
|
|
},
|
|
{
|
|
"url" : "http://secunia.com/advisories/55640"
|
|
},
|
|
{
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"
|
|
}
|
|
]
|
|
}
|
|
}
|