mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
207 lines
6.5 KiB
JSON
207 lines
6.5 KiB
JSON
{
|
|
"id": "CVE-2004-2714",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2004-12-31T05:00:00.000",
|
|
"lastModified": "2024-11-20T23:54:02.737",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Window Maker 0.80.2 and earlier allows attackers to perform unknown actions via format string specifiers in a font specification in WMGLOBAL, probably a format string vulnerability."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
|
"baseScore": 6.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 6.8,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-134"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.20.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6217910D-C42C-45A1-9093-79AC7913E8D6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.52.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24D2F210-3F2C-4E59-881B-527C6D97C074"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.53:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "258F7285-39B4-4324-A764-135C6E5BC05F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.60:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7608D98-51FF-4B72-B264-997F1CDC52AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.60.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70AFC929-AB90-4914-A900-056C074D4CCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.61:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61B98917-1DCD-4E44-B795-77D6E5EF4591"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.61.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C68989EA-4697-45D7-9AEC-A14DE785A00A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.62:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2AA2B5B-C63F-4076-A759-2B9C04D6151B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.62.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9F849D3-AF59-4318-8205-8B6E7A8129D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.63:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36012A18-0215-4357-94A0-A18A77165CC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.63.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D19C4E0B-1E47-44E1-9963-6C8596B0E746"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.64:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B674EE20-5629-4693-BC70-E72A32304F94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.65:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "433971EF-9B9D-4C7A-840A-1CF06B8A08F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.65.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13CADEFF-5ABD-4384-BAC1-18D2B625F42F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.80:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E462EB39-1D25-468F-A0CF-59BFB51C618C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:windowmaker:windowmaker:0.80.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFCA5698-8FB3-4B58-A276-21C273F9D919"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/12961",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1011918",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.osvdb.org/11108",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/11512",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.windowmaker.org/src/ChangeLog",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17845",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/12961",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1011918",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.osvdb.org/11108",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/11512",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.windowmaker.org/src/ChangeLog",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17845",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |