mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2009-4603",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Unspecified vulnerability in sapstartsrv.exe in the SAP Kernel 6.40, 7.00, 7.01, 7.10, 7.11, and 7.20, as used in SAP NetWeaver 7.x and SAP Web Application Server 6.x and 7.x, allows remote attackers to cause a denial of service (Management Console shutdown) via a crafted request. NOTE: some of these details are obtained from third party information."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "1023319",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id?1023319"
|
|
},
|
|
{
|
|
"name": "37684",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/37684"
|
|
},
|
|
{
|
|
"name": "http://www.cybsec.com/vuln/CYBSEC_SAP_sapstartsrv_DoS.pdf",
|
|
"refsource": "MISC",
|
|
"url": "http://www.cybsec.com/vuln/CYBSEC_SAP_sapstartsrv_DoS.pdf"
|
|
},
|
|
{
|
|
"name": "https://service.sap.com/sap/support/notes/1302231",
|
|
"refsource": "MISC",
|
|
"url": "https://service.sap.com/sap/support/notes/1302231"
|
|
},
|
|
{
|
|
"name": "37286",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/37286"
|
|
}
|
|
]
|
|
}
|
|
} |