mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
77 lines
2.5 KiB
JSON
77 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@intel.com",
|
|
"ID": "CVE-2016-8024",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "VirusScan Enterprise Linux (VSEL)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "2.0.3 (and earlier)"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Intel"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper neutralization of CRLF sequences in HTTP headers vulnerability"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "94823",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/94823"
|
|
},
|
|
{
|
|
"name": "1037433",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1037433"
|
|
},
|
|
{
|
|
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181"
|
|
},
|
|
{
|
|
"name": "40911",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/40911/"
|
|
}
|
|
]
|
|
}
|
|
} |