mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
222 lines
7.7 KiB
JSON
222 lines
7.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2005-2498",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "DSA-789",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2005/dsa-789"
|
|
},
|
|
{
|
|
"name": "17066",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/17066"
|
|
},
|
|
{
|
|
"name": "16441",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16441"
|
|
},
|
|
{
|
|
"name": "20050817 [PHPADSNEW-SA-2005-001] phpAdsNew and phpPgAds 2.0.6 fix multiple vulnerabilities",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=112431497300344&w=2"
|
|
},
|
|
{
|
|
"name": "16491",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16491"
|
|
},
|
|
{
|
|
"name": "16619",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16619"
|
|
},
|
|
{
|
|
"name": "20050815 [DRUPAL-SA-2005-004] Drupal 4.6.3 / 4.5.5 fixes critical XML-RPC issue",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://marc.info/?l=bugtraq&m=112412415822890&w=2"
|
|
},
|
|
{
|
|
"name": "SUSE-SA:2005:051",
|
|
"refsource": "SUSE",
|
|
"url": "http://marc.info/?l=bugtraq&m=112605112027335&w=2"
|
|
},
|
|
{
|
|
"name": "16460",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16460"
|
|
},
|
|
{
|
|
"name": "RHSA-2005:748",
|
|
"refsource": "REDHAT",
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2005-748.html"
|
|
},
|
|
{
|
|
"name": "14560",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/14560"
|
|
},
|
|
{
|
|
"name": "16558",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16558"
|
|
},
|
|
{
|
|
"name": "DSA-840",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2005/dsa-840"
|
|
},
|
|
{
|
|
"name": "16431",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16431"
|
|
},
|
|
{
|
|
"name": "16693",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16693"
|
|
},
|
|
{
|
|
"name": "FLSA:166943",
|
|
"refsource": "FEDORA",
|
|
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.html"
|
|
},
|
|
{
|
|
"name": "SUSE-SA:2005:049",
|
|
"refsource": "SUSE",
|
|
"url": "http://www.novell.com/linux/security/advisories/2005_49_php.html"
|
|
},
|
|
{
|
|
"name": "17440",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/17440"
|
|
},
|
|
{
|
|
"name": "20050815 Advisory 15/2005: PHPXMLRPC Remote PHP Code Injection Vulnerability",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/408125"
|
|
},
|
|
{
|
|
"name": "16976",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16976"
|
|
},
|
|
{
|
|
"name": "GLSA-200509-19",
|
|
"refsource": "GENTOO",
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml"
|
|
},
|
|
{
|
|
"name": "16469",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16469"
|
|
},
|
|
{
|
|
"name": "16563",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16563"
|
|
},
|
|
{
|
|
"name": "17053",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/17053"
|
|
},
|
|
{
|
|
"name": "DSA-798",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2005/dsa-798"
|
|
},
|
|
{
|
|
"name": "16468",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16468"
|
|
},
|
|
{
|
|
"name": "DSA-842",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2005/dsa-842"
|
|
},
|
|
{
|
|
"name": "16465",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16465"
|
|
},
|
|
{
|
|
"name": "16635",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16635"
|
|
},
|
|
{
|
|
"name": "http://www.hardened-php.net/advisory_152005.67.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.hardened-php.net/advisory_152005.67.html"
|
|
},
|
|
{
|
|
"name": "16432",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16432"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:9569",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9569"
|
|
},
|
|
{
|
|
"name": "16550",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16550"
|
|
}
|
|
]
|
|
}
|
|
} |