Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://online.securityfocus.com/archive/1/269879", "name": "20020427 Response to KF about Listar/Ecartis Vulnerability", "tags": ["Vendor Advisory"], "refsource": "BUGTRAQ"}, {"url": "http://online.securityfocus.com/archive/82/258763", "name": "20020227 listar / ecaris remote or local?", "tags": ["Vendor Advisory"], "refsource": "VULN-DEV"}, {"url": "http://online.securityfocus.com/archive/1/269658", "name": "20020425 ecartis / listar PoC", "tags": ["Vendor Advisory"], "refsource": "BUGTRAQ"}, {"url": "http://www.securityfocus.com/archive/1/261209", "name": "20020310 Ecartis/Listar multiple vulnerabilities", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.ecartis.org/", "name": "http://www.ecartis.org/", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/4271", "name": "4271", "tags": [], "refsource": "BID"}, {"url": "http://www.iss.net/security_center/static/8445.php", "name": "ecartis-local-bo(8445)", "tags": [], "refsource": "XF"}, {"url": "http://marc.info/?l=listar-support&m=101590272221720&w=2", "name": "http://marc.info/?l=listar-support&m=101590272221720&w=2", "tags": [], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Buffer overflows in Ecartis (formerly Listar) 1.0.0 in snapshot 20020427 and earlier allow local users to gain privileges via (1) a long command line argument, which is not properly handled in core.c, or possibly via bad uses of sprintf() in (2) moderate.c, (3) lcgi.c, (4) fileapi.c, (5) cookie.c, (6) codes.c, or other files."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2002-0468", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2002-08-12T04:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:listar:listar:0.126a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:listar:listar:0.127a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:listar:listar:0.129a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2016-10-18T02:20Z"}