mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
122 lines
3.7 KiB
JSON
122 lines
3.7 KiB
JSON
{
|
|
"id": "CVE-2013-5026",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2013-08-06T20:55:05.530",
|
|
"lastModified": "2024-11-21T01:56:55.647",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An ActiveX control in lookout650.ocx, lookout660.ocx, and lookout670.ocx in National Instruments Lookout 6.5 through 6.7 allows remote attackers to execute arbitrary code by triggering the download of, and calls to, an arbitrary DLL file."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Un control ActiveX en los archivos lookout650.ocx, lookout660.ocx y lookout670.ocx en Lookout de National Instruments versiones 6.5 hasta 6.7, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario activando la descarga de las llamadas hacia un archivo DLL arbitrario."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 9.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ni:lookout:6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3633BF4C-623F-48E4-A89B-118A3ACB9D2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ni:lookout:6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86CD3849-E24D-4115-BB44-93BAB95EA70D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:ni:lookout:6.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE1B3D04-F37B-493D-B9C3-3739777EB4FD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://digital.ni.com/public.nsf/allkb/544407ECC5FEE44086257BCF00735D1F?OpenDocument",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://digital.ni.com/public.nsf/websearch/507DEC9DA57A708186257B3600512623?OpenDocument",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://digital.ni.com/public.nsf/websearch/A792DE0703C8108786257B3600506077?OpenDocument",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://digital.ni.com/public.nsf/allkb/544407ECC5FEE44086257BCF00735D1F?OpenDocument",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://digital.ni.com/public.nsf/websearch/507DEC9DA57A708186257B3600512623?OpenDocument",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://digital.ni.com/public.nsf/websearch/A792DE0703C8108786257B3600506077?OpenDocument",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |