mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
91 lines
2.5 KiB
JSON
91 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2015-2094",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Stack-based buffer overflow in the WESPPlayback.WESPPlaybackCtrl.1 control in WebGate WinRDS allows remote attackers to execute arbitrary code via unspecified vectors to the (1) PrintSiteImage, (2) PlaySiteAllChannel, (3) StopSiteAllChannel, or (4) SaveSiteImage function."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"url" : "https://www.exploit-db.com/exploits/36517/"
|
|
},
|
|
{
|
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-071/"
|
|
},
|
|
{
|
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-072/"
|
|
},
|
|
{
|
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-073/"
|
|
},
|
|
{
|
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-15-074/"
|
|
},
|
|
{
|
|
"url" : "http://packetstormsecurity.com/files/131069/WebGate-WinRDS-2.0.8-StopSiteAllChannel-Stack-Overflow.html"
|
|
},
|
|
{
|
|
"url" : "http://www.securityfocus.com/bid/72841"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/118905"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/118906"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/118907"
|
|
},
|
|
{
|
|
"url" : "http://www.osvdb.org/118908"
|
|
}
|
|
]
|
|
}
|
|
}
|