mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-3491",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple buffer overflows in the receiver function in loop.c in FlatFrag 0.3 and earlier allow remote attackers to execute arbitrary code via the (1) version, (2) name, and (3) model fields."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://aluigi.altervista.org/adv/flatfragz-adv.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://aluigi.altervista.org/adv/flatfragz-adv.txt"
|
|
},
|
|
{
|
|
"name": "15287",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/15287"
|
|
},
|
|
{
|
|
"name": "20051102 Buffer-overflow and crash in FlatFrag 0.3",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/415636/30/0/threaded"
|
|
},
|
|
{
|
|
"name": "20769",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/20769"
|
|
},
|
|
{
|
|
"name": "20051102 Buffer-overflow and crash in FlatFrag 0.3",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://marc.info/?l=full-disclosure&m=113096078606274&w=2"
|
|
}
|
|
]
|
|
}
|
|
} |