mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.6 KiB
JSON
82 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-2670",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Directory traversal vulnerability in HAURI Anti-Virus products including ViRobot Expert 4.0, Advanced Server, Linux Server 2.0, and LiveCall allows remote attackers to overwrite arbitrary files via \"..\" sequences in filenames contained in (1) ACE, (2) ARJ, (3) CAB, (4) LZH, (5) RAR, (6) TAR and (7) ZIP files."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2005-24/advisory",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2005-24/advisory"
|
|
},
|
|
{
|
|
"name": "14606",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/14606"
|
|
},
|
|
{
|
|
"name": "15846",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/15846"
|
|
},
|
|
{
|
|
"name": "http://www.globalhauri.com/html/download/down_unixpatch.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.globalhauri.com/html/download/down_unixpatch.html"
|
|
},
|
|
{
|
|
"name": "1014740",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1014740"
|
|
}
|
|
]
|
|
}
|
|
} |