mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-12-30 05:58:39 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2011-4458",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Best Practical Solutions RT 3.6.x, 3.7.x, and 3.8.x before 3.8.12 and 4.x before 4.0.6, when the VERPPrefix and VERPDomain options are enabled, allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-5092 and CVE-2011-5093."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "[rt-announce] 20120522 RT 3.8.12 Released - Security Release",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"
|
|
},
|
|
{
|
|
"name": "49259",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/49259"
|
|
},
|
|
{
|
|
"name": "[rt-announce] 20120522 RT 4.0.6 Released - Security Release",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"
|
|
},
|
|
{
|
|
"name": "[rt-announce] 20120522 Security vulnerabilities in RT",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html"
|
|
},
|
|
{
|
|
"name": "53660",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/53660"
|
|
}
|
|
]
|
|
}
|
|
} |