mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
113 lines
4.0 KiB
JSON
113 lines
4.0 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2016-4993",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CRLF injection vulnerability in the Undertow web server in WildFly 10.0.0, as used in Red Hat JBoss Enterprise Application Platform (EAP) 7.x before 7.0.2, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1838.html",
|
|
"refsource": "MISC",
|
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-1838.html"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1839.html",
|
|
"refsource": "MISC",
|
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-1839.html"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1840.html",
|
|
"refsource": "MISC",
|
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-1840.html"
|
|
},
|
|
{
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2016-1841.html",
|
|
"refsource": "MISC",
|
|
"name": "http://rhn.redhat.com/errata/RHSA-2016-1841.html"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/92894",
|
|
"refsource": "MISC",
|
|
"name": "http://www.securityfocus.com/bid/92894"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1036758",
|
|
"refsource": "MISC",
|
|
"name": "http://www.securitytracker.com/id/1036758"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:3454",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2017:3454"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:3455",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2017:3455"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:3456",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2017:3456"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:3458",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2017:3458"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344321",
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1344321"
|
|
}
|
|
]
|
|
}
|
|
} |