mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 17:21:57 +00:00
87 lines
2.8 KiB
JSON
87 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@microsoft.com",
|
|
"ID": "CVE-2011-1889",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka \"TMG Firewall Client Memory Corruption Vulnerability.\""
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "1025637",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id?1025637"
|
|
},
|
|
{
|
|
"name": "MS11-040",
|
|
"refsource": "MS",
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-040"
|
|
},
|
|
{
|
|
"name": "ms-tmg-firewall-bo(67736)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67736"
|
|
},
|
|
{
|
|
"name": "48181",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/48181"
|
|
},
|
|
{
|
|
"name": "44857",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/44857"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:12642",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12642"
|
|
}
|
|
]
|
|
}
|
|
} |