mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2011-2084",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 allows remote authenticated users to read (1) hashes of former passwords and (2) ticket correspondence history by leveraging access to a privileged account."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "[rt-announce] 20120522 RT 3.8.12 Released - Security Release",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"
|
|
},
|
|
{
|
|
"name": "49259",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/49259"
|
|
},
|
|
{
|
|
"name": "[rt-announce] 20120522 RT 4.0.6 Released - Security Release",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"
|
|
},
|
|
{
|
|
"name": "[rt-announce] 20120522 Security vulnerabilities in RT",
|
|
"refsource": "MLIST",
|
|
"url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html"
|
|
},
|
|
{
|
|
"name": "53660",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/53660"
|
|
}
|
|
]
|
|
}
|
|
} |