mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
103 lines
3.7 KiB
JSON
103 lines
3.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2011-0535",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-site request forgery (CSRF) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to hijack the authentication of administrators for requests that change account privileges via an edit access_permissions action to index.php."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html",
|
|
"refsource": "MISC",
|
|
"name": "http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html"
|
|
},
|
|
{
|
|
"url": "http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG",
|
|
"refsource": "MISC",
|
|
"name": "http://code.zikula.org/core12/browser/tags/Zikula-1.2.5/src/docs/CHANGELOG"
|
|
},
|
|
{
|
|
"url": "http://community.zikula.org/index.php?module=News&func=display&sid=3041&title=zikula-1.2.5-released",
|
|
"refsource": "MISC",
|
|
"name": "http://community.zikula.org/index.php?module=News&func=display&sid=3041&title=zikula-1.2.5-released"
|
|
},
|
|
{
|
|
"url": "http://openwall.com/lists/oss-security/2011/02/01/1",
|
|
"refsource": "MISC",
|
|
"name": "http://openwall.com/lists/oss-security/2011/02/01/1"
|
|
},
|
|
{
|
|
"url": "http://openwall.com/lists/oss-security/2011/02/03/1",
|
|
"refsource": "MISC",
|
|
"name": "http://openwall.com/lists/oss-security/2011/02/03/1"
|
|
},
|
|
{
|
|
"url": "http://seclists.org/fulldisclosure/2011/Feb/0",
|
|
"refsource": "MISC",
|
|
"name": "http://seclists.org/fulldisclosure/2011/Feb/0"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/43114",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/43114"
|
|
},
|
|
{
|
|
"url": "http://securityreason.com/securityalert/8067",
|
|
"refsource": "MISC",
|
|
"name": "http://securityreason.com/securityalert/8067"
|
|
},
|
|
{
|
|
"url": "http://www.osvdb.org/70751",
|
|
"refsource": "MISC",
|
|
"name": "http://www.osvdb.org/70751"
|
|
}
|
|
]
|
|
}
|
|
} |