mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
204 lines
6.4 KiB
JSON
204 lines
6.4 KiB
JSON
{
|
|
"id": "CVE-2003-1359",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-12-31T05:00:00.000",
|
|
"lastModified": "2017-10-11T01:29:19.323",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in stmkfont utility of HP-UX 10.0 through 11.22 allows local users to gain privileges via a long command line argument."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2170549C-80D2-4FF8-AC07-BD4124125B02"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "066D4E93-366F-42D4-B27D-8AF981F5F2AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38E41C26-A086-4C9C-83D8-CB910F4B67F1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE98EAD2-838F-42A2-BC90-F739A6639D47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CFD50216-90AC-480E-A11C-E88E64C6D84A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B7A7B90-9086-4A10-8FB4-1C1D909BC173"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6AB76FE0-BEF3-40D4-B362-0C95CA625A71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:avaya:predictive_dialer_system:9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F7CB53A-ACE4-46E5-9518-B1343BD505C2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:avaya:predictive_dialer_system:11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32C58CBA-4A5D-4194-B01B-FE2F5DF34F4D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:avaya:predictive_dialer_system:12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "713DB9E3-E944-4CEA-994F-06048B23DE32"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://securityreason.com/securityalert/3236",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/advisories/4959",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/324381",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/6836",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11313",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5587",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |