mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-12-15 12:22:09 +00:00
85 lines
2.4 KiB
JSON
85 lines
2.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2007-6262",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "A certain ActiveX control in axvlc.dll in VideoLAN VLC 0.8.6 before 0.8.6d allows remote attackers to execute arbitrary code via crafted arguments to the (1) addTarget, (2) getVariable, or (3) setVariable function, resulting from a \"bad initialized pointer,\" aka a \"recursive plugin release vulnerability.\""
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"url" : "http://www.securityfocus.com/archive/1/archive/1/484563/100/0/threaded"
|
|
},
|
|
{
|
|
"url" : "http://www.coresecurity.com/?action=item&id=2035"
|
|
},
|
|
{
|
|
"url" : "http://www.videolan.org/sa0703.html"
|
|
},
|
|
{
|
|
"url" : "http://www.securityfocus.com/bid/26675"
|
|
},
|
|
{
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14280"
|
|
},
|
|
{
|
|
"url" : "http://www.vupen.com/english/advisories/2007/4061"
|
|
},
|
|
{
|
|
"url" : "http://secunia.com/advisories/27878"
|
|
},
|
|
{
|
|
"url" : "http://securityreason.com/securityalert/3420"
|
|
},
|
|
{
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/38816"
|
|
}
|
|
]
|
|
}
|
|
}
|