René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

99 lines
2.6 KiB
JSON

{
"id": "CVE-2005-1394",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-05-03T04:00:00.000",
"lastModified": "2016-10-18T03:19:47.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in ArcGIS for ESRI ArcInfo Workstation 9.0 allows local users to gain privileges via format string specifiers in the ARCHOME environment variable to (1) wservice or (2) lockmgr."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "17F291A5-FAAD-4B01-85B2-1267D63EE64D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcinfo_workstation:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B64E5827-8AEF-458D-9AFD-2D7A8FFD83C6"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=full-disclosure&m=111489411524630&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1013852",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://support.esri.com/index.cfm?fa=downloads.patchesServicePacks.viewPatch&PID=14&MetaID=1015",
"source": "cve@mitre.org"
},
{
"url": "http://www.digitalmunition.com/DMA%5B2005-0425a%5D.txt",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}