mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 09:41:31 +00:00
125 lines
3.7 KiB
JSON
125 lines
3.7 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2005-1879",
|
||
|
"sourceIdentifier": "cve@mitre.org",
|
||
|
"published": "2005-06-09T04:00:00.000",
|
||
|
"lastModified": "2008-09-05T20:50:19.587",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "LutelWall 0.97 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
||
|
"accessVector": "LOCAL",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 2.1
|
||
|
},
|
||
|
"baseSeverity": "LOW",
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "NVD-CWE-Other"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:tomasz_lutelmowski:lutelwall:0.91:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9B06C3EC-1F79-459F-9470-ADC53AA59F5C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:tomasz_lutelmowski:lutelwall:0.92:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DE447A5C-D685-46B9-8E21-2FE0D4AA2CA6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:tomasz_lutelmowski:lutelwall:0.93:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5834C140-CDBA-4B4D-88AF-9D554BEFFC5F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:tomasz_lutelmowski:lutelwall:0.94:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A600AF74-8783-48E6-BF60-9E0B3F1B63AA"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:tomasz_lutelmowski:lutelwall:0.95:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7A9718B7-7FB0-4661-91BA-1195CAEB7F31"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:tomasz_lutelmowski:lutelwall:0.96:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "AD11FCBB-BC39-4F90-9C35-53CACF82D4A8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:tomasz_lutelmowski:lutelwall:0.97:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1725C38C-DA3E-456E-BCA5-7217CCB0EFA6"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://firewall.lutel.pl/download/0.98/ChangeLog",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034424.html",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://security.gentoo.org/glsa/glsa-200506-10.xml",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://securitytracker.com/id?1014112",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.securityfocus.com/bid/13863",
|
||
|
"source": "cve@mitre.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://www.zataz.net/adviso/lutelwall-05222005.txt",
|
||
|
"source": "cve@mitre.org"
|
||
|
}
|
||
|
]
|
||
|
}
|