mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
129 lines
4.1 KiB
JSON
129 lines
4.1 KiB
JSON
{
|
|
"id": "CVE-2005-3121",
|
|
"sourceIdentifier": "security@debian.org",
|
|
"published": "2005-10-20T23:02:00.000",
|
|
"lastModified": "2008-09-05T20:53:31.217",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A rule file in module-assistant before 0.9.10 causes a temporary file to be created insecurely, which allows local users to conduct unauthorized operations."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 2.1
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "0.9.9",
|
|
"matchCriteriaId": "CB9AFFE4-19D0-4C09-B390-11CCBFF8D3B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02B9511C-B04A-450D-9AAA-57C9BBB23289"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0C6AEFA-D2DF-4C95-BE5F-3BFAA14F624D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B5E44398-57BD-440D-94AE-F282837A549F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B03F4550-129C-4168-9CC2-8461B090A8A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B8D8DD9E-EFBF-45E1-88F0-3B0C9FFA5958"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1AE4734-1C15-4D21-A789-ABC4238B82AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09E2A4D0-AB78-4608-AFA7-F46669564A83"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5BAFC6F0-7DE7-46F4-B669-A0D0EC3D05A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eduard_bloch:module-assistant:0.9.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6D70E0E-37A3-4D51-823B-CE0291D4194F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.debian.org/security/2005/dsa-867",
|
|
"source": "security@debian.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/15151",
|
|
"source": "security@debian.org"
|
|
}
|
|
]
|
|
} |