{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2018-1000527","title":"Title"},{"category":"description","text":"Froxlor version <= 0.9.39.5 contains a PHP Object Injection vulnerability in Domain name form that can result in Possible information disclosure and remote code execution. This attack appear to be exploitable via Passing malicious PHP objection in $_POST['ssl_ipandport']. This vulnerability appears to have been fixed in after commit c1e62e6.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2018-1000527","url":"https://www.suse.com/security/cve/CVE-2018-1000527"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1099249 for CVE-2018-1000527","url":"https://bugzilla.suse.com/1099249"}],"title":"SUSE CVE CVE-2018-1000527","tracking":{"current_release_date":"2025-02-18T06:47:21Z","generator":{"date":"2023-02-15T04:19:59Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2018-1000527","initial_release_date":"2023-02-15T04:19:59Z","revision_history":[{"date":"2023-02-15T04:19:59Z","number":"2","summary":"Current version"},{"date":"2025-01-01T07:08:31Z","number":"3","summary":"Current version"},{"date":"2025-02-15T07:50:24Z","number":"4","summary":"Current version"},{"date":"2025-02-18T06:47:21Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}