mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
87 lines
2.6 KiB
JSON
87 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2007-3536",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple buffer overflows in the AMX NetLinx VNC (AmxVnc) ActiveX control in AmxVnc.dll 1.0.13.0 allow remote attackers to execute arbitrary code via long (1) Host, (2) Password, or (3) LogFile property values."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "amxnetlinx-hostpasswordlogfile-bo(35155)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35155"
|
|
},
|
|
{
|
|
"name": "24703",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/24703"
|
|
},
|
|
{
|
|
"name": "37672",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/37672"
|
|
},
|
|
{
|
|
"name": "4123",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/4123"
|
|
},
|
|
{
|
|
"name": "25891",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/25891"
|
|
},
|
|
{
|
|
"name": "ADV-2007-2387",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2007/2387"
|
|
}
|
|
]
|
|
}
|
|
} |