mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
87 lines
2.7 KiB
JSON
87 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-4533",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Argument injection vulnerability in scponlyc in scponly 4.1 and earlier, when both scp and rsync compatibility are enabled, allows local users to execute arbitrary applications via \"getopt\" style argument specifications, which are not filtered."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "18223",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/18223"
|
|
},
|
|
{
|
|
"name": "16051",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/16051"
|
|
},
|
|
{
|
|
"name": "18236",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/18236"
|
|
},
|
|
{
|
|
"name": "http://sublimation.org/scponly/#relnotes",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://sublimation.org/scponly/#relnotes"
|
|
},
|
|
{
|
|
"name": "GLSA-200512-17",
|
|
"refsource": "GENTOO",
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200512-17.xml"
|
|
},
|
|
{
|
|
"name": "scponly-escape-shell-restrictions(23875)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23875"
|
|
}
|
|
]
|
|
}
|
|
} |