Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:redhat:spice-xpi:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BB0C3886-62F2-49AF-B8BA-B4F3F72A1C3C", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:spice-xpi:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F1084209-69C4-49F6-8356-740BC61519D0", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:spice-xpi:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9243551E-92DB-4E10-8318-EB57240DD986", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "matchCriteriaId": "14E6A30E-7577-4569-9309-53A0AF7FE3AC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The SPICE Firefox plug-in (spice-xpi) 2.4, 2.3, 2.2, and possibly other versions allows local users to overwrite arbitrary files via a symlink attack on the usbrdrctl log file, which has a predictable name."}, {"lang": "es", "value": "Vulnerabilidad de redirecci\u00f3n abierta en SPICE Firefox plug-in (spice-xpi) v2.4, v2.3, v2.2 , permite a atacantes remotos redireccionar a usuarios a sitios web de su elecci\u00f3n y llevar a cabo ataques de phishing a trav\u00e9s de un ataque de enlace simb\u00f3lico en el fichero de log usbrdrctl, por su nombre predecible.\r\n"}], "id": "CVE-2011-0012", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2011-04-18T17:55:00.937", "references": [{"source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0426.html"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/47269"}, {"source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025304"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0899"}, {"source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639869"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0426.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/47269"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025304"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2011/0899"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639869"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-59"}], "source": "nvd@nist.gov", "type": "Primary"}]}