mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@us.ibm.com",
|
|
"ID": "CVE-2016-0226",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The client implementation in IBM Informix Dynamic Server 11.70.xCn on Windows does not properly restrict access to the (1) nsrd, (2) nsrexecd, and (3) portmap executable files, which allows local users to gain privileges via a Trojan horse file."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://zerodayinitiative.com/advisories/ZDI-16-210/",
|
|
"refsource": "MISC",
|
|
"url": "http://zerodayinitiative.com/advisories/ZDI-16-210/"
|
|
},
|
|
{
|
|
"name": "http://zerodayinitiative.com/advisories/ZDI-16-209/",
|
|
"refsource": "MISC",
|
|
"url": "http://zerodayinitiative.com/advisories/ZDI-16-209/"
|
|
},
|
|
{
|
|
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21978598",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21978598"
|
|
},
|
|
{
|
|
"name": "1035286",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1035286"
|
|
},
|
|
{
|
|
"name": "http://zerodayinitiative.com/advisories/ZDI-16-208/",
|
|
"refsource": "MISC",
|
|
"url": "http://zerodayinitiative.com/advisories/ZDI-16-208/"
|
|
}
|
|
]
|
|
}
|
|
} |