Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.ubuntu.com/usn/USN-2168-1", "name": "USN-2168-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://www.openwall.com/lists/oss-security/2014/02/10/15", "name": "[oss-security] 20140210 CVE requests: Pacemaker, Python Imaging Library, eyeD3, 9base, rc, Gamera, RPLY - insecure use of /tmp", "tags": [], "refsource": "MLIST"}, {"url": "http://www.openwall.com/lists/oss-security/2014/02/11/1", "name": "[oss-security] 20140210 Re: CVE requests: Pacemaker, Python Imaging Library, eyeD3, 9base, rc, Gamera, RPLY - insecure use of /tmp", "tags": [], "refsource": "MLIST"}, {"url": "https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7", "name": "https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7", "tags": ["Exploit", "Patch"], "refsource": "CONFIRM"}, {"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html", "name": "openSUSE-SU-2014:0591", "tags": [], "refsource": "SUSE"}, {"url": "http://www.securityfocus.com/bid/65513", "name": "65513", "tags": [], "refsource": "BID"}, {"url": "https://security.gentoo.org/glsa/201612-52", "name": "GLSA-201612-52", "tags": [], "refsource": "GENTOO"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-264"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2014-1933", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "LOW", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2014-04-17T14:55Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "2.3.0"}, {"cpe23Uri": "cpe:2.3:a:pythonware:python_imaging_library:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.1.7"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-07-01T01:29Z"}