Search criteria
9 vulnerabilities found for acmailer by seeds
FKIE_CVE-2016-1142
Vulnerability from fkie_nvd - Published: 2016-01-16 05:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| seeds | acmailer | * | |
| seeds | acmailer | 3.9.0 | |
| seeds | acmailer | 3.9.1 | |
| seeds | acmailer | 3.9.2 | |
| seeds | acmailer | 3.9.3 | |
| seeds | acmailer | 3.9.4 | |
| seeds | acmailer | 3.9.5 | |
| seeds | acmailer | 3.9.6 | |
| seeds | acmailer | 3.9.7 | |
| seeds | acmailer | 3.9.8 | |
| seeds | acmailer | 3.9.9 | |
| seeds | acmailer | 3.9.10 | |
| seeds | acmailer | 3.9.11 | |
| seeds | acmailer | 3.9.12 | |
| seeds | acmailer | 3.9.14 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "986C71EB-BD43-40E6-93F3-976C8DEADF37",
"versionEndExcluding": "3.8.21",
"versionStartIncluding": "3.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "FE7CC02E-0112-4B80-AEBF-13D13B135921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "9B2F6EDE-7FBD-4A02-A43A-036D0D4EBE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "90A6E799-326A-4710-A84D-FF68DFADE0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "DD8FADE1-B210-44AB-88A3-88F6426B1B66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "FB8809F1-BBB1-478F-ABE7-86FD4ABD6E54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "74E77742-0557-4237-B209-0B5734B1847A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "CB478F72-3CB2-4312-ADA1-73A52498E867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.7:beta:*:*:*:*:*:*",
"matchCriteriaId": "F99AAE6C-AA0B-4E18-9E81-E9C6DB825418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.8:beta:*:*:*:*:*:*",
"matchCriteriaId": "D451434D-CA40-45D5-87BE-BB452C50AD73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "1D556988-7FE0-4B88-9745-B15F157CCC45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.10:beta:*:*:*:*:*:*",
"matchCriteriaId": "B5346C1C-8D1A-41CE-B569-9E65BCDD17F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.11:beta:*:*:*:*:*:*",
"matchCriteriaId": "2AB4678D-E82B-4FCC-A6DD-6D7770B5D403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.12:beta:*:*:*:*:*:*",
"matchCriteriaId": "5F6115BA-4844-4B31-BCDD-7BF2E2A19A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BA8467-5DEE-4A80-8515-9907EAD5F226",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
},
{
"lang": "es",
"value": "Seeds acmailer en versiones anteriores a 3.8.21 y 3.9.x en versiones anteriores a 3.9.15 Beta permite a usuarios remotos autenticados ejecutar comandos del SO arbitrarios a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2016-1142",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-01-16T05:59:04.503",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2015-2971
Vulnerability from fkie_nvd - Published: 2015-07-19 10:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5CA5EC0-521C-4603-A75E-A2201B6A2CD1",
"versionEndExcluding": "3.8.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "FE7CC02E-0112-4B80-AEBF-13D13B135921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "9B2F6EDE-7FBD-4A02-A43A-036D0D4EBE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "90A6E799-326A-4710-A84D-FF68DFADE0B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "DD8FADE1-B210-44AB-88A3-88F6426B1B66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "FB8809F1-BBB1-478F-ABE7-86FD4ABD6E54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "74E77742-0557-4237-B209-0B5734B1847A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "CB478F72-3CB2-4312-ADA1-73A52498E867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.7:beta:*:*:*:*:*:*",
"matchCriteriaId": "F99AAE6C-AA0B-4E18-9E81-E9C6DB825418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.8:beta:*:*:*:*:*:*",
"matchCriteriaId": "D451434D-CA40-45D5-87BE-BB452C50AD73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "1D556988-7FE0-4B88-9745-B15F157CCC45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.10:beta:*:*:*:*:*:*",
"matchCriteriaId": "B5346C1C-8D1A-41CE-B569-9E65BCDD17F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:3.9.11:beta:*:*:*:*:*:*",
"matchCriteriaId": "2AB4678D-E82B-4FCC-A6DD-6D7770B5D403",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en Seeds acmailer en versiones anteriores a la 3.8.18 y 3.9.x anteriores a 3.9.12 Beta permite a usuarios remotos autenticados borrar archivos de forma arbitraria a trav\u00e9s de una cadena de caracteres manipulada."
}
],
"id": "CVE-2015-2971",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-07-19T10:59:00.090",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-3896
Vulnerability from fkie_nvd - Published: 2014-07-29 20:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN42511610/index.html | Third Party Advisory, VDB Entry | |
| vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089 | Third Party Advisory, VDB Entry | |
| vultures@jpcert.or.jp | http://www.acmailer.jp/info/de.cgi?id=52 | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN42511610/index.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.acmailer.jp/info/de.cgi?id=52 | Exploit, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FED3888-9F34-40D7-94E3-1B8AF7028C01",
"versionEndExcluding": "3.8.17",
"versionStartIncluding": "3.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:seeds:acmailer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D436EBA-83AC-4077-8398-197D5266DC03",
"versionEndExcluding": "3.9.10",
"versionStartIncluding": "3.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de CSRF en CGI programs en Seeds acmailer anterior a 3.8.17 y 3.9.x anterior a 3.9.10 Beta permiten a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios arbitrarios para solicitudes que modifican o eliminan datos, tal y como fue demostrado mediante la modificaci\u00f3n de datos que afectan la autorizaci\u00f3n."
}
],
"id": "CVE-2014-3896",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-07-29T20:55:08.647",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2016-1142 (GCVE-0-2016-1142)
Vulnerability from cvelistv5 – Published: 2016-01-16 02:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T22:48:13.095Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
},
{
"name": "JVNDB-2016-000002",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"name": "JVN#50899877",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-01-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-01-16T04:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
},
{
"name": "JVNDB-2016-000002",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"name": "JVN#50899877",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1142",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.acmailer.jp/info/de.cgi?id=64",
"refsource": "CONFIRM",
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
},
{
"name": "JVNDB-2016-000002",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"name": "JVN#50899877",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2016-1142",
"datePublished": "2016-01-16T02:00:00",
"dateReserved": "2015-12-26T00:00:00",
"dateUpdated": "2024-08-05T22:48:13.095Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-2971 (GCVE-0-2015-2971)
Vulnerability from cvelistv5 – Published: 2015-07-19 10:00 – Updated: 2024-08-06 05:32
VLAI?
Summary
Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T05:32:21.119Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
},
{
"name": "JVN#64051989",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"name": "JVNDB-2015-000098",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-07-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-07-19T10:57:02",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
},
{
"name": "JVN#64051989",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"name": "JVNDB-2015-000098",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-2971",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.acmailer.jp/info/de.cgi?id=58",
"refsource": "CONFIRM",
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
},
{
"name": "JVN#64051989",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"name": "JVNDB-2015-000098",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-2971",
"datePublished": "2015-07-19T10:00:00",
"dateReserved": "2015-04-07T00:00:00",
"dateUpdated": "2024-08-06T05:32:21.119Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-3896 (GCVE-0-2014-3896)
Vulnerability from cvelistv5 – Published: 2014-07-29 20:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:57:17.934Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
},
{
"name": "JVNDB-2014-000089",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"name": "JVN#42511610",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-07-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-07-29T19:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
},
{
"name": "JVNDB-2014-000089",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"name": "JVN#42511610",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3896",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.acmailer.jp/info/de.cgi?id=52",
"refsource": "CONFIRM",
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
},
{
"name": "JVNDB-2014-000089",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"name": "JVN#42511610",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-3896",
"datePublished": "2014-07-29T20:00:00",
"dateReserved": "2014-05-27T00:00:00",
"dateUpdated": "2024-08-06T10:57:17.934Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-1142 (GCVE-0-2016-1142)
Vulnerability from nvd – Published: 2016-01-16 02:00 – Updated: 2024-08-05 22:48
VLAI?
Summary
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T22:48:13.095Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
},
{
"name": "JVNDB-2016-000002",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"name": "JVN#50899877",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-01-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-01-16T04:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
},
{
"name": "JVNDB-2016-000002",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"name": "JVN#50899877",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1142",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.acmailer.jp/info/de.cgi?id=64",
"refsource": "CONFIRM",
"url": "http://www.acmailer.jp/info/de.cgi?id=64"
},
{
"name": "JVNDB-2016-000002",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002"
},
{
"name": "JVN#50899877",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN50899877/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2016-1142",
"datePublished": "2016-01-16T02:00:00",
"dateReserved": "2015-12-26T00:00:00",
"dateUpdated": "2024-08-05T22:48:13.095Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-2971 (GCVE-0-2015-2971)
Vulnerability from nvd – Published: 2015-07-19 10:00 – Updated: 2024-08-06 05:32
VLAI?
Summary
Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T05:32:21.119Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
},
{
"name": "JVN#64051989",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"name": "JVNDB-2015-000098",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-07-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-07-19T10:57:02",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
},
{
"name": "JVN#64051989",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"name": "JVNDB-2015-000098",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-2971",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.acmailer.jp/info/de.cgi?id=58",
"refsource": "CONFIRM",
"url": "http://www.acmailer.jp/info/de.cgi?id=58"
},
{
"name": "JVN#64051989",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN64051989/index.html"
},
{
"name": "JVNDB-2015-000098",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000098"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-2971",
"datePublished": "2015-07-19T10:00:00",
"dateReserved": "2015-04-07T00:00:00",
"dateUpdated": "2024-08-06T05:32:21.119Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-3896 (GCVE-0-2014-3896)
Vulnerability from nvd – Published: 2014-07-29 20:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:57:17.934Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
},
{
"name": "JVNDB-2014-000089",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"name": "JVN#42511610",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-07-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-07-29T19:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
},
{
"name": "JVNDB-2014-000089",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"name": "JVN#42511610",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-3896",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in CGI programs in Seeds acmailer before 3.8.17 and 3.9.x before 3.9.10 Beta allow remote attackers to hijack the authentication of arbitrary users for requests that modify or delete data, as demonstrated by modifying data affecting authorization."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.acmailer.jp/info/de.cgi?id=52",
"refsource": "CONFIRM",
"url": "http://www.acmailer.jp/info/de.cgi?id=52"
},
{
"name": "JVNDB-2014-000089",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000089"
},
{
"name": "JVN#42511610",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN42511610/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-3896",
"datePublished": "2014-07-29T20:00:00",
"dateReserved": "2014-05-27T00:00:00",
"dateUpdated": "2024-08-06T10:57:17.934Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}