Show plain JSON{"containers": {"cna": {"affected": [{"product": "VirusScan Enterprise Linux (VSEL)", "vendor": "Intel", "versions": [{"status": "affected", "version": "2.0.3 (and earlier)"}]}], "datePublic": "2016-12-08T00:00:00", "descriptions": [{"lang": "en", "value": "Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing."}], "problemTypes": [{"descriptions": [{"description": "Improper neutralization of CRLF sequences in HTTP headers vulnerability", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2017-09-02T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel"}, "references": [{"name": "94823", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/94823"}, {"name": "1037433", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id/1037433"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181"}, {"name": "40911", "tags": ["exploit", "x_refsource_EXPLOIT-DB"], "url": "https://www.exploit-db.com/exploits/40911/"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "secure@intel.com", "ID": "CVE-2016-8024", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "VirusScan Enterprise Linux (VSEL)", "version": {"version_data": [{"version_value": "2.0.3 (and earlier)"}]}}]}, "vendor_name": "Intel"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Improper neutralization of CRLF sequences in HTTP headers vulnerability"}]}]}, "references": {"reference_data": [{"name": "94823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94823"}, {"name": "1037433", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037433"}, {"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181"}, {"name": "40911", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40911/"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T02:13:21.584Z"}, "title": "CVE Program Container", "references": [{"name": "94823", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/94823"}, {"name": "1037433", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://www.securitytracker.com/id/1037433"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10181"}, {"name": "40911", "tags": ["exploit", "x_refsource_EXPLOIT-DB", "x_transferred"], "url": "https://www.exploit-db.com/exploits/40911/"}]}]}, "cveMetadata": {"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2016-8024", "datePublished": "2017-03-14T22:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T02:13:21.584Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}