mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security_alert@emc.com",
|
|
"ID": "CVE-2011-1421",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "EMC NetWorker 7.5.x before 7.5.4.3 and 7.6.x before 7.6.1.5, when the client push feature is enabled, uses weak permissions for an unspecified file, which allows local users to gain privileges via unknown vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "ADV-2011-1025",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2011/1025"
|
|
},
|
|
{
|
|
"name": "1025383",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1025383"
|
|
},
|
|
{
|
|
"name": "8214",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/8214"
|
|
},
|
|
{
|
|
"name": "20110418 ESA-2011-013: EMC NetWorker arbitrary code execution with elevated privileges vulnerability",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/517532/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "47410",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/47410"
|
|
},
|
|
{
|
|
"name": "44237",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/44237"
|
|
}
|
|
]
|
|
}
|
|
} |