mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.4 KiB
JSON
77 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"ID": "CVE-2014-8025",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "1031422",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1031422"
|
|
},
|
|
{
|
|
"name": "20150106 Cisco Jabber Guest Server HTML5 Response Disclosure",
|
|
"refsource": "CISCO",
|
|
"url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=36871"
|
|
},
|
|
{
|
|
"name": "20141222 Cisco Jabber Guest Server HTML5 Response Disclosure",
|
|
"refsource": "CISCO",
|
|
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8025"
|
|
},
|
|
{
|
|
"name": "71768",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/71768"
|
|
}
|
|
]
|
|
}
|
|
} |