mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
220 lines
7.9 KiB
JSON
220 lines
7.9 KiB
JSON
{
|
|
"id": "CVE-2000-0096",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2000-01-26T05:00:00.000",
|
|
"lastModified": "2008-09-10T19:02:54.243",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B1208414-D175-41E2-BCBC-9E5EDBC41FFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6535E515-B0FF-4FC6-8BCC-AF8EAEDCE099"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6586A031-B6B9-4EC0-B6B7-82BBFA4AA562"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E5364920-D969-4585-A822-E26846CF7BD6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9781C125-7E2B-41BB-A4B3-2317C3B95CC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68CE4256-F1D2-49A5-B7D7-25FC9111BB61"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91310B66-9AAC-44EC-A0CC-3455DB069C17"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABA8F10C-8C06-45B6-898E-4592FE903CB1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9DE692FF-40D9-4CE5-93A5-04082E281202"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9C0F200-2DB9-4492-95C8-72772B5EC6DD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E84B8226-E4DA-4BDE-AC48-9B8999853D49"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DDC2EC10-3396-4C73-A5C5-7280F710A4EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5314989E-4D5D-4A76-A1C1-6B9786142C05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A01E055E-9B9F-42AF-A531-0B783DED5AC9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DAEDEE2A-15DA-4D2D-BF03-5417B0243382"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CB9BBB17-7B0A-4ACD-95DF-D0B1D40F8C2B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4248800A-6F2D-47EC-A62C-0E89DE89153B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8249A1D-95D9-4205-9346-3110E250295C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E37B76A4-E760-45B1-90FF-C97327A28A21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33430029-28D1-4E4F-B4B7-D2E7EB4D97E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A8C5CDE8-34FB-4AB4-A49D-5D701996CA3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48863B32-5742-4FAB-B49D-B6A771F90FE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A471EFDD-0618-4294-A1C0-4D37E794E3DF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF088417-1645-4F40-802D-143433FACE4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6802F665-8457-44C8-A3F0-91B318BE1014"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8EBE0FA1-7BBE-49AA-AA2B-77C60EDA20AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BCA23E68-E974-49A0-BDB0-AFB3A69D271D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14B5D240-F160-4419-AD95-577274D640B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta28:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9843924C-1511-489E-A222-C32113DDB080"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:qualcomm:qpopper:3.0beta29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "62F4369F-1ED0-4CCB-ABFE-D402E5A7599B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/948",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |