mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
|
"ID": "CVE-2013-5350",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The \"Remember me\" feature in the opSecurityUser::getRememberLoginCookie function in lib/user/opSecurityUser.class.php in OpenPNE 3.6.13 before 3.6.13.1 and 3.8.9 before 3.8.9.1 does not properly validate login data in HTTP Cookie headers, which allows remote attackers to conduct PHP object injection attacks, and execute arbitrary PHP code, via a crafted serialized object."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://www.openpne.jp/archives/12293/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.openpne.jp/archives/12293/"
|
|
},
|
|
{
|
|
"name": "JVN#69986880",
|
|
"refsource": "JVN",
|
|
"url": "http://jvn.jp/en/jp/JVN69986880/index.html"
|
|
},
|
|
{
|
|
"name": "54043",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/54043"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2014-1/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2014-1/"
|
|
},
|
|
{
|
|
"name": "JVNDB-2014-000009",
|
|
"refsource": "JVNDB",
|
|
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009"
|
|
}
|
|
]
|
|
}
|
|
} |