Search criteria

9 vulnerabilities found for acmailer by seeds

FKIE_CVE-2016-1142

Vulnerability from fkie_nvd - Published: 2016-01-16 05:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Impacted products
Vendor Product Version
seeds acmailer *
seeds acmailer 3.9.0
seeds acmailer 3.9.1
seeds acmailer 3.9.2
seeds acmailer 3.9.3
seeds acmailer 3.9.4
seeds acmailer 3.9.5
seeds acmailer 3.9.6
seeds acmailer 3.9.7
seeds acmailer 3.9.8
seeds acmailer 3.9.9
seeds acmailer 3.9.10
seeds acmailer 3.9.11
seeds acmailer 3.9.12
seeds acmailer 3.9.14

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "986C71EB-BD43-40E6-93F3-976C8DEADF37",
              "versionEndExcluding": "3.8.21",
              "versionStartIncluding": "3.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FE7CC02E-0112-4B80-AEBF-13D13B135921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9B2F6EDE-7FBD-4A02-A43A-036D0D4EBE65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "90A6E799-326A-4710-A84D-FF68DFADE0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DD8FADE1-B210-44AB-88A3-88F6426B1B66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FB8809F1-BBB1-478F-ABE7-86FD4ABD6E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "74E77742-0557-4237-B209-0B5734B1847A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CB478F72-3CB2-4312-ADA1-73A52498E867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "F99AAE6C-AA0B-4E18-9E81-E9C6DB825418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "D451434D-CA40-45D5-87BE-BB452C50AD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.9:beta:*:*:*:*:*:*",
              "matchCriteriaId": "1D556988-7FE0-4B88-9745-B15F157CCC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.10:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B5346C1C-8D1A-41CE-B569-9E65BCDD17F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.11:beta:*:*:*:*:*:*",
              "matchCriteriaId": "2AB4678D-E82B-4FCC-A6DD-6D7770B5D403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.12:beta:*:*:*:*:*:*",
              "matchCriteriaId": "5F6115BA-4844-4B31-BCDD-7BF2E2A19A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA8467-5DEE-4A80-8515-9907EAD5F226",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Seeds acmailer en versiones anteriores a 3.8.21 y 3.9.x en versiones anteriores a 3.9.15 Beta permite a usuarios remotos autenticados ejecutar comandos del SO arbitrarios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2016-1142",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-01-16T05:59:04.503",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.acmailer.jp/info/de.cgi?id=64"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.acmailer.jp/info/de.cgi?id=64"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2015-2971

Vulnerability from fkie_nvd - Published: 2015-07-19 10:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string.
Impacted products
Vendor Product Version
seeds acmailer *
seeds acmailer 3.9.0
seeds acmailer 3.9.1
seeds acmailer 3.9.2
seeds acmailer 3.9.3
seeds acmailer 3.9.4
seeds acmailer 3.9.5
seeds acmailer 3.9.6
seeds acmailer 3.9.7
seeds acmailer 3.9.8
seeds acmailer 3.9.9
seeds acmailer 3.9.10
seeds acmailer 3.9.11

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5CA5EC0-521C-4603-A75E-A2201B6A2CD1",
              "versionEndExcluding": "3.8.18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FE7CC02E-0112-4B80-AEBF-13D13B135921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9B2F6EDE-7FBD-4A02-A43A-036D0D4EBE65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "90A6E799-326A-4710-A84D-FF68DFADE0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DD8FADE1-B210-44AB-88A3-88F6426B1B66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "FB8809F1-BBB1-478F-ABE7-86FD4ABD6E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "74E77742-0557-4237-B209-0B5734B1847A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CB478F72-3CB2-4312-ADA1-73A52498E867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "F99AAE6C-AA0B-4E18-9E81-E9C6DB825418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "D451434D-CA40-45D5-87BE-BB452C50AD73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.9:beta:*:*:*:*:*:*",
              "matchCriteriaId": "1D556988-7FE0-4B88-9745-B15F157CCC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.10:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B5346C1C-8D1A-41CE-B569-9E65BCDD17F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:3.9.11:beta:*:*:*:*:*:*",
              "matchCriteriaId": "2AB4678D-E82B-4FCC-A6DD-6D7770B5D403",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en Seeds acmailer en versiones anteriores a la 3.8.18 y 3.9.x anteriores a 3.9.12 Beta permite a usuarios remotos autenticados borrar archivos de forma arbitraria a trav\u00e9s de una cadena de caracteres manipulada."
    }
  ],
  "id": "CVE-2015-2971",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-07-19T10:59:00.090",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.acmailer.jp/info/de.cgi?id=58"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.acmailer.jp/info/de.cgi?id=58"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-3896

Vulnerability from fkie_nvd - Published: 2014-07-29 20:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization.
Impacted products
Vendor Product Version
seeds acmailer *
seeds acmailer *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FED3888-9F34-40D7-94E3-1B8AF7028C01",
              "versionEndExcluding": "3.8.17",
              "versionStartIncluding": "3.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D436EBA-83AC-4077-8398-197D5266DC03",
              "versionEndExcluding": "3.9.10",
              "versionStartIncluding": "3.9.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de CSRF en CGI programs en Seeds acmailer anterior a 3.8.17 y 3.9.x anterior a 3.9.10 Beta permiten a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios para solicitudes que modifican o eliminan datos, tal y como fue demostrado mediante la modificaci\u00f3n de datos que afectan la autorizaci\u00f3n."
    }
  ],
  "id": "CVE-2014-3896",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-07-29T20:55:08.647",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.acmailer.jp/info/de.cgi?id=52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.acmailer.jp/info/de.cgi?id=52"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2016-1142 (GCVE-0-2016-1142)

Vulnerability from cvelistv5 – Published: 2016-01-16 02:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.acmailer.jp/info/de.cgi?id=64 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN50899877/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.acmailer.jp/info/de.cgi?id=64"
          },
          {
            "name": "JVNDB-2016-000002",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
          },
          {
            "name": "JVN#50899877",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-01-16T04:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.acmailer.jp/info/de.cgi?id=64"
        },
        {
          "name": "JVNDB-2016-000002",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
        },
        {
          "name": "JVN#50899877",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1142",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.acmailer.jp/info/de.cgi?id=64",
              "refsource": "CONFIRM",
              "url": "http://www.acmailer.jp/info/de.cgi?id=64"
            },
            {
              "name": "JVNDB-2016-000002",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
            },
            {
              "name": "JVN#50899877",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1142",
    "datePublished": "2016-01-16T02:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.095Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-2971 (GCVE-0-2015-2971)

Vulnerability from cvelistv5 – Published: 2015-07-19 10:00 – Updated: 2024-08-06 05:32
VLAI?
Summary
Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.acmailer.jp/info/de.cgi?id=58 x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN64051989/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:32:21.119Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.acmailer.jp/info/de.cgi?id=58"
          },
          {
            "name": "JVN#64051989",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
          },
          {
            "name": "JVNDB-2015-000098",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-07-19T10:57:02",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.acmailer.jp/info/de.cgi?id=58"
        },
        {
          "name": "JVN#64051989",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
        },
        {
          "name": "JVNDB-2015-000098",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-2971",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.acmailer.jp/info/de.cgi?id=58",
              "refsource": "CONFIRM",
              "url": "http://www.acmailer.jp/info/de.cgi?id=58"
            },
            {
              "name": "JVN#64051989",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
            },
            {
              "name": "JVNDB-2015-000098",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-2971",
    "datePublished": "2015-07-19T10:00:00",
    "dateReserved": "2015-04-07T00:00:00",
    "dateUpdated": "2024-08-06T05:32:21.119Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3896 (GCVE-0-2014-3896)

Vulnerability from cvelistv5 – Published: 2014-07-29 20:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.acmailer.jp/info/de.cgi?id=52 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN42511610/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:17.934Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.acmailer.jp/info/de.cgi?id=52"
          },
          {
            "name": "JVNDB-2014-000089",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
          },
          {
            "name": "JVN#42511610",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-07-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-07-29T19:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.acmailer.jp/info/de.cgi?id=52"
        },
        {
          "name": "JVNDB-2014-000089",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
        },
        {
          "name": "JVN#42511610",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-3896",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.acmailer.jp/info/de.cgi?id=52",
              "refsource": "CONFIRM",
              "url": "http://www.acmailer.jp/info/de.cgi?id=52"
            },
            {
              "name": "JVNDB-2014-000089",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
            },
            {
              "name": "JVN#42511610",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-3896",
    "datePublished": "2014-07-29T20:00:00",
    "dateReserved": "2014-05-27T00:00:00",
    "dateUpdated": "2024-08-06T10:57:17.934Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-1142 (GCVE-0-2016-1142)

Vulnerability from nvd – Published: 2016-01-16 02:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.acmailer.jp/info/de.cgi?id=64 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN50899877/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:48:13.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.acmailer.jp/info/de.cgi?id=64"
          },
          {
            "name": "JVNDB-2016-000002",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
          },
          {
            "name": "JVN#50899877",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-01-16T04:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.acmailer.jp/info/de.cgi?id=64"
        },
        {
          "name": "JVNDB-2016-000002",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
        },
        {
          "name": "JVN#50899877",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-1142",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.acmailer.jp/info/de.cgi?id=64",
              "refsource": "CONFIRM",
              "url": "http://www.acmailer.jp/info/de.cgi?id=64"
            },
            {
              "name": "JVNDB-2016-000002",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
            },
            {
              "name": "JVN#50899877",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN50899877/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-1142",
    "datePublished": "2016-01-16T02:00:00",
    "dateReserved": "2015-12-26T00:00:00",
    "dateUpdated": "2024-08-05T22:48:13.095Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-2971 (GCVE-0-2015-2971)

Vulnerability from nvd – Published: 2015-07-19 10:00 – Updated: 2024-08-06 05:32
VLAI?
Summary
Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.acmailer.jp/info/de.cgi?id=58 x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN64051989/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:32:21.119Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.acmailer.jp/info/de.cgi?id=58"
          },
          {
            "name": "JVN#64051989",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
          },
          {
            "name": "JVNDB-2015-000098",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-07-19T10:57:02",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.acmailer.jp/info/de.cgi?id=58"
        },
        {
          "name": "JVN#64051989",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
        },
        {
          "name": "JVNDB-2015-000098",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-2971",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.acmailer.jp/info/de.cgi?id=58",
              "refsource": "CONFIRM",
              "url": "http://www.acmailer.jp/info/de.cgi?id=58"
            },
            {
              "name": "JVN#64051989",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN64051989/index.html"
            },
            {
              "name": "JVNDB-2015-000098",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-2971",
    "datePublished": "2015-07-19T10:00:00",
    "dateReserved": "2015-04-07T00:00:00",
    "dateUpdated": "2024-08-06T05:32:21.119Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3896 (GCVE-0-2014-3896)

Vulnerability from nvd – Published: 2014-07-29 20:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.acmailer.jp/info/de.cgi?id=52 x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN42511610/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:17.934Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.acmailer.jp/info/de.cgi?id=52"
          },
          {
            "name": "JVNDB-2014-000089",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
          },
          {
            "name": "JVN#42511610",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-07-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-07-29T19:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.acmailer.jp/info/de.cgi?id=52"
        },
        {
          "name": "JVNDB-2014-000089",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
        },
        {
          "name": "JVN#42511610",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-3896",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.acmailer.jp/info/de.cgi?id=52",
              "refsource": "CONFIRM",
              "url": "http://www.acmailer.jp/info/de.cgi?id=52"
            },
            {
              "name": "JVNDB-2014-000089",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
            },
            {
              "name": "JVN#42511610",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN42511610/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-3896",
    "datePublished": "2014-07-29T20:00:00",
    "dateReserved": "2014-05-27T00:00:00",
    "dateUpdated": "2024-08-06T10:57:17.934Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}