mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
70 lines
2.2 KiB
JSON
70 lines
2.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"DATE_ASSIGNED": "2018-08-19T17:09:33.137027",
|
|
"DATE_REQUESTED": "2018-08-08T13:07:29",
|
|
"ID": "CVE-2018-1000644",
|
|
"REQUESTER": "sajeeb@0dd.zone",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/eclipse/rdf4j/issues/1056",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/eclipse/rdf4j/issues/1056"
|
|
},
|
|
{
|
|
"name": "https://0dd.zone/2018/08/05/rdf4j-XXE/",
|
|
"refsource": "MISC",
|
|
"url": "https://0dd.zone/2018/08/05/rdf4j-XXE/"
|
|
}
|
|
]
|
|
}
|
|
} |