René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

132 lines
3.8 KiB
JSON

{
"id": "CVE-2002-0468",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-08-12T04:00:00.000",
"lastModified": "2016-10-18T02:20:22.197",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-21:*:*:*:*:*:*:*",
"matchCriteriaId": "2C9FD55B-466F-4385-AF88-E341B7C5A32D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-25:*:*:*:*:*:*:*",
"matchCriteriaId": "240D0A65-FC01-4B21-9821-A786F5677785"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:listar:listar:0.126a:*:*:*:*:*:*:*",
"matchCriteriaId": "65AE2735-44FB-4FCB-A520-7348ADE6F464"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:listar:listar:0.127a:*:*:*:*:*:*:*",
"matchCriteriaId": "AA66A07F-CDF5-40DB-B999-7AA7C5000AF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:listar:listar:0.129a:*:*:*:*:*:*:*",
"matchCriteriaId": "C15B56B6-ADC6-4D37-A561-914F52B73AAC"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=listar-support&m=101590272221720&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://online.securityfocus.com/archive/1/269658",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://online.securityfocus.com/archive/1/269879",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://online.securityfocus.com/archive/82/258763",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.ecartis.org/",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/8445.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/261209",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/4271",
"source": "cve@mitre.org"
}
]
}