mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
161 lines
5.3 KiB
JSON
161 lines
5.3 KiB
JSON
{
|
|
"id": "CVE-2003-0238",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-05-27T04:00:00.000",
|
|
"lastModified": "2017-07-11T01:29:29.353",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Message Session window in Mirabilis ICQ Pro 2003a allows remote attackers to cause a denial of service (CPU consumption) by spoofing the address of an ADS server and sending HTML with a -1 width in a table tag."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La ventana \"Message Session\" en Mirabilis ICQ Pro 2003a permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de CPU) simulando la direcci\u00f3n de un servidor ADS y enviando HTML con un -1 en el campo anchura de una tabla."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:99a_2.15build1701:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9CB6B89-E3B1-4096-AF07-C9E74BFCABDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:99a_2.21build1800:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7181BF12-E9B6-4F8E-B1D0-3251007389D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2000.0a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1C7B95B0-8CCB-4561-B354-80925B9769D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2000.0b_build3278:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C1E49E4-1BB4-40BF-AB6F-829ACAEDC581"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2001a:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BEA5FE1-267D-41B3-AA41-794DA021C4A1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2001b_build3636:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B10F3133-2D77-4A16-9F16-766EB4B3C5DA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2001b_build3638:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E03F3686-071C-48E4-ABDD-BF68162CDC20"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2001b_build3659:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AC70672D-FE67-42C2-83D2-D1E554BF2C8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2002a_build3722:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28ABA292-10F6-447A-9494-CA716B9F47FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2002a_build3727:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0228FD42-8E98-472C-9C8A-D8396DF4E30E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2003a_build3777:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1884958-DBAB-4999-9EBF-96D363FF26D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2003a_build3799:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74A65FB3-ECB5-45EF-9B53-9F55E55B2DA0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:mirabilis:icq:2003a_build3800:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F0A9C10-A685-4D02-A9FF-6689441AF598"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0051.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=105216842131995&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.coresecurity.com/common/showdoc.php?idx=315&idxseccion=10",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/7465",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11947",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |