mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
83 lines
2.6 KiB
JSON
83 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"DATE_PUBLIC": "2017-07-11T00:00:00",
|
|
"ID": "CVE-2017-7529",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "nginx",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "0.5.6 - 1.13.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "nginx"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-190"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "[nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)",
|
|
"refsource": "MLIST",
|
|
"url": "http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2017:2538",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:2538"
|
|
},
|
|
{
|
|
"name": "99534",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/99534"
|
|
},
|
|
{
|
|
"name": "1039238",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1039238"
|
|
},
|
|
{
|
|
"name": "https://puppet.com/security/cve/cve-2017-7529",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://puppet.com/security/cve/cve-2017-7529"
|
|
}
|
|
]
|
|
}
|
|
} |