cvelist/2009/4xxx/CVE-2009-4762.json
2019-03-17 23:38:30 +00:00

102 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4762",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "MoinMoin 1.7.x before 1.7.3 and 1.8.x before 1.8.3 checks parent ACLs in certain inappropriate circumstances during processing of hierarchical ACLs, which allows remote attackers to bypass intended access restrictions by requesting an item, a different vulnerability than CVE-2008-6603."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://hg.moinmo.in/moin/1.7/rev/897cdbe9e8f2",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.7/rev/897cdbe9e8f2"
},
{
"name": "http://moinmo.in/SecurityFixes",
"refsource": "CONFIRM",
"url": "http://moinmo.in/SecurityFixes"
},
{
"name": "ADV-2010-1208",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1208"
},
{
"name": "DSA-2014",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2014"
},
{
"name": "39887",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39887"
},
{
"name": "35277",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35277"
},
{
"name": "USN-941-1",
"refsource": "UBUNTU",
"url": "http://ubuntu.com/usn/usn-941-1"
},
{
"name": "ADV-2010-0600",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0600"
},
{
"name": "http://hg.moinmo.in/moin/1.8/rev/897cdbe9e8f2",
"refsource": "CONFIRM",
"url": "http://hg.moinmo.in/moin/1.8/rev/897cdbe9e8f2"
}
]
}
}