cvelist/2014/0xxx/CVE-2014-0666.json

93 lines
2.7 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2014-0666",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Directory traversal vulnerability in the Send Screen Capture implementation in Cisco Jabber 9.2(.1) and earlier on Windows allows remote attackers to upload arbitrary types of files, and consequently execute arbitrary code, via modified packets, aka Bug ID CSCug48056."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32451",
"refsource" : "CONFIRM",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32451"
},
{
"name" : "20140115 Cisco Jabber for Windows Remote Code Execution Vulnerability",
"refsource" : "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0666"
},
{
"name" : "64965",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/64965"
},
{
"name" : "102122",
"refsource" : "OSVDB",
"url" : "http://osvdb.org/102122"
},
{
"name" : "1029635",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1029635"
},
{
"name" : "56331",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/56331"
},
{
"name" : "cisco-jabber-cve20140666-code-exec(90435)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90435"
}
]
}
}