"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:30:44 +00:00
parent bc70974a75
commit 2c245ee107
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
49 changed files with 3924 additions and 3924 deletions

View File

@ -1,97 +1,97 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-0389", "ID": "CVE-2006-0389",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in Syndication (Safari RSS) in Mac OS X 10.4 through 10.4.5 allows remote attackers to execute arbitrary JavaScript via unspecified vectors involving RSS feeds."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://docs.info.apple.com/article.html?artnum=303382", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://docs.info.apple.com/article.html?artnum=303382" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in Syndication (Safari RSS) in Mac OS X 10.4 through 10.4.5 allows remote attackers to execute arbitrary JavaScript via unspecified vectors involving RSS feeds."
{ }
"name" : "APPLE-SA-2006-03-01", ]
"refsource" : "APPLE", },
"url" : "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "TA06-062A", "description": [
"refsource" : "CERT", {
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-062A.html" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "16907", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/16907" ]
}, },
{ "references": {
"name" : "ADV-2006-0791", "reference_data": [
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2006/0791" "name": "macosx-syndication-xss(25040)",
}, "refsource": "XF",
{ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25040"
"name" : "23649", },
"refsource" : "OSVDB", {
"url" : "http://www.osvdb.org/23649" "name": "23649",
}, "refsource": "OSVDB",
{ "url": "http://www.osvdb.org/23649"
"name" : "19064", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/19064" "name": "19064",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/19064"
"name" : "macosx-syndication-xss(25040)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25040" "name": "16907",
} "refsource": "BID",
] "url": "http://www.securityfocus.com/bid/16907"
} },
} {
"name": "ADV-2006-0791",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0791"
},
{
"name": "APPLE-SA-2006-03-01",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html"
},
{
"name": "TA06-062A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA06-062A.html"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=303382",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=303382"
}
]
}
}

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-0783", "ID": "CVE-2006-0783",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in page.php in in Siteframe Beaumont, possibly 5.0.2 or 5.0.1a, allows remote attackers to inject arbitrary web script or HTML via the comment_text parameter to the user comment page (/edit/Comment)."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20060216 Siteframe Beaumont 5.0.2 <== User Comment Cross-Site Scripting Vulnerability", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/425180/100/0/threaded" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in page.php in in Siteframe Beaumont, possibly 5.0.2 or 5.0.1a, allows remote attackers to inject arbitrary web script or HTML via the comment_text parameter to the user comment page (/edit/Comment)."
{ }
"name" : "16695", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/16695" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "23267", "description": [
"refsource" : "OSVDB", {
"url" : "http://www.osvdb.org/23267" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "18892", ]
"refsource" : "SECUNIA", }
"url" : "http://secunia.com/advisories/18892" ]
}, },
{ "references": {
"name" : "443", "reference_data": [
"refsource" : "SREASON", {
"url" : "http://securityreason.com/securityalert/443" "name": "20060216 Siteframe Beaumont 5.0.2 <== User Comment Cross-Site Scripting Vulnerability",
}, "refsource": "BUGTRAQ",
{ "url": "http://www.securityfocus.com/archive/1/425180/100/0/threaded"
"name" : "siteframe-comment-xss(24836)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24836" "name": "siteframe-comment-xss(24836)",
} "refsource": "XF",
] "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24836"
} },
} {
"name": "443",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/443"
},
{
"name": "18892",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18892"
},
{
"name": "23267",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/23267"
},
{
"name": "16695",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16695"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-0822", "ID": "CVE-2006-0822",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in EmuLinker Kaillera Server before 0.99.17 allows remote attackers to cause a denial of service (probably resource consumption) via a crafted packet that causes a \"ghost game\" to be left on the server."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754" "lang": "eng",
}, "value": "Unspecified vulnerability in EmuLinker Kaillera Server before 0.99.17 allows remote attackers to cause a denial of service (probably resource consumption) via a crafted packet that causes a \"ghost game\" to be left on the server."
{ }
"name" : "16733", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/16733" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "ADV-2006-0665", "description": [
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2006/0665" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "18938", ]
"refsource" : "SECUNIA", }
"url" : "http://secunia.com/advisories/18938" ]
}, },
{ "references": {
"name" : "emulinker-packet-handling-dos(24784)", "reference_data": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24784" "name": "18938",
} "refsource": "SECUNIA",
] "url": "http://secunia.com/advisories/18938"
} },
} {
"name": "16733",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16733"
},
{
"name": "emulinker-packet-handling-dos(24784)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24784"
},
{
"name": "ADV-2006-0665",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0665"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/project/shownotes.php?release_id=394690&group_id=127754"
}
]
}
}

View File

@ -1,127 +1,127 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-0898", "ID": "CVE-2006-0898",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20060223 Vulnerability in Crypt::CBC Perl module, versions <= 2.16", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/425966/100/0/threaded" "lang": "eng",
}, "value": "Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael."
{ }
"name" : "DSA-996", ]
"refsource" : "DEBIAN", },
"url" : "http://www.debian.org/security/2006/dsa-996" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "GLSA-200603-15", "description": [
"refsource" : "GENTOO", {
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "RHSA-2008:0261", ]
"refsource" : "REDHAT", }
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0261.html" ]
}, },
{ "references": {
"name" : "RHSA-2008:0630", "reference_data": [
"refsource" : "REDHAT", {
"url" : "http://rhn.redhat.com/errata/RHSA-2008-0630.html" "name": "20899",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/20899"
"name" : "SUSE-SR:2006:015", },
"refsource" : "SUSE", {
"url" : "http://www.novell.com/linux/security/advisories/2006_38_security.html" "name": "RHSA-2008:0630",
}, "refsource": "REDHAT",
{ "url": "http://rhn.redhat.com/errata/RHSA-2008-0630.html"
"name" : "16802", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/16802" "name": "31493",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/31493"
"name" : "18755", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/18755" "name": "GLSA-200603-15",
}, "refsource": "GENTOO",
{ "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml"
"name" : "19187", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/19187" "name": "19187",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/19187"
"name" : "19303", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/19303" "name": "488",
}, "refsource": "SREASON",
{ "url": "http://securityreason.com/securityalert/488"
"name" : "20899", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/20899" "name": "DSA-996",
}, "refsource": "DEBIAN",
{ "url": "http://www.debian.org/security/2006/dsa-996"
"name" : "31493", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/31493" "name": "20060223 Vulnerability in Crypt::CBC Perl module, versions <= 2.16",
}, "refsource": "BUGTRAQ",
{ "url": "http://www.securityfocus.com/archive/1/425966/100/0/threaded"
"name" : "488", },
"refsource" : "SREASON", {
"url" : "http://securityreason.com/securityalert/488" "name": "SUSE-SR:2006:015",
}, "refsource": "SUSE",
{ "url": "http://www.novell.com/linux/security/advisories/2006_38_security.html"
"name" : "crypt-cbc-header-weak-encryption(24954)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24954" "name": "19303",
} "refsource": "SECUNIA",
] "url": "http://secunia.com/advisories/19303"
} },
} {
"name": "18755",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18755"
},
{
"name": "16802",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16802"
},
{
"name": "RHSA-2008:0261",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0261.html"
},
{
"name": "crypt-cbc-header-weak-encryption(24954)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24954"
}
]
}
}

View File

@ -1,117 +1,117 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1017", "ID": "CVE-2006-1017",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20060228 (PHP) imap functions bypass safemode and open_basedir restrictions", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/426339/100/0/threaded" "lang": "eng",
}, "value": "The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions."
{ }
"name" : "http://bugs.php.net/bug.php?id=37265", ]
"refsource" : "CONFIRM", },
"url" : "http://bugs.php.net/bug.php?id=37265" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://www.php.net/ChangeLog-5.php#5.1.5", "description": [
"refsource" : "CONFIRM", {
"url" : "http://www.php.net/ChangeLog-5.php#5.1.5" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://www.php.net/release_5_1_5.php", ]
"refsource" : "CONFIRM", }
"url" : "http://www.php.net/release_5_1_5.php" ]
}, },
{ "references": {
"name" : "MDKSA-2006:122", "reference_data": [
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:122" "name": "ADV-2006-0772",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2006/0772"
"name" : "ADV-2006-0772", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2006/0772" "name": "http://www.php.net/release_5_1_5.php",
}, "refsource": "CONFIRM",
{ "url": "http://www.php.net/release_5_1_5.php"
"name" : "23535", },
"refsource" : "OSVDB", {
"url" : "http://www.osvdb.org/23535" "name": "23535",
}, "refsource": "OSVDB",
{ "url": "http://www.osvdb.org/23535"
"name" : "18694", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/18694" "name": "21050",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/21050"
"name" : "21050", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/21050" "name": "516",
}, "refsource": "SREASON",
{ "url": "http://securityreason.com/securityalert/516"
"name" : "21546", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/21546" "name": "21546",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/21546"
"name" : "516", },
"refsource" : "SREASON", {
"url" : "http://securityreason.com/securityalert/516" "name": "MDKSA-2006:122",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:122"
"name" : "php-imap-restriction-bypass(24964)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24964" "name": "http://bugs.php.net/bug.php?id=37265",
} "refsource": "CONFIRM",
] "url": "http://bugs.php.net/bug.php?id=37265"
} },
} {
"name": "php-imap-restriction-bypass(24964)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24964"
},
{
"name": "http://www.php.net/ChangeLog-5.php#5.1.5",
"refsource": "CONFIRM",
"url": "http://www.php.net/ChangeLog-5.php#5.1.5"
},
{
"name": "20060228 (PHP) imap functions bypass safemode and open_basedir restrictions",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/426339/100/0/threaded"
},
{
"name": "18694",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18694"
}
]
}
}

View File

@ -1,92 +1,92 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1271", "ID": "CVE-2006-1271",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "SQL injection vulnerability in index.php in OxyNews allows remote attackers to execute arbitrary SQL commands via the oxynews_comment_id parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20060316 Oxynews Sql &#304;njection", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/428057/100/0/threaded" "lang": "eng",
}, "value": "SQL injection vulnerability in index.php in OxyNews allows remote attackers to execute arbitrary SQL commands via the oxynews_comment_id parameter."
{ }
"name" : "http://biyosecurity.be/bugs/oxynews.txt", ]
"refsource" : "MISC", },
"url" : "http://biyosecurity.be/bugs/oxynews.txt" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "17132", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/17132" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "ADV-2006-0976", ]
"refsource" : "VUPEN", }
"url" : "http://www.vupen.com/english/advisories/2006/0976" ]
}, },
{ "references": {
"name" : "23940", "reference_data": [
"refsource" : "OSVDB", {
"url" : "http://www.osvdb.org/23940" "name": "23940",
}, "refsource": "OSVDB",
{ "url": "http://www.osvdb.org/23940"
"name" : "19255", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/19255" "name": "17132",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/17132"
"name" : "oxynews-index-sql-injection(25301)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25301" "name": "19255",
} "refsource": "SECUNIA",
] "url": "http://secunia.com/advisories/19255"
} },
} {
"name": "20060316 Oxynews Sql &#304;njection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/428057/100/0/threaded"
},
{
"name": "oxynews-index-sql-injection(25301)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25301"
},
{
"name": "http://biyosecurity.be/bugs/oxynews.txt",
"refsource": "MISC",
"url": "http://biyosecurity.be/bugs/oxynews.txt"
},
{
"name": "ADV-2006-0976",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0976"
}
]
}
}

View File

@ -1,97 +1,97 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2006-1523", "ID": "CVE-2006-1523",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[linux-kernel] 20060411 [PATCH] __group_complete_signal: remove bogus BUG_ON", "description_data": [
"refsource" : "MLIST", {
"url" : "http://marc.info/?l=linux-kernel&m=114476543426600&w=2" "lang": "eng",
}, "value": "The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON."
{ }
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604", ]
"refsource" : "CONFIRM", },
"url" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "DSA-1103", "description": [
"refsource" : "DEBIAN", {
"url" : "http://www.debian.org/security/2006/dsa-1103" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "SUSE-SA:2006:028", ]
"refsource" : "SUSE", }
"url" : "http://www.novell.com/linux/security/advisories/2006-05-31.html" ]
}, },
{ "references": {
"name" : "17640", "reference_data": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/17640" "name": "ADV-2006-2554",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2006/2554"
"name" : "ADV-2006-2554", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2006/2554" "name": "[linux-kernel] 20060411 [PATCH] __group_complete_signal: remove bogus BUG_ON",
}, "refsource": "MLIST",
{ "url": "http://marc.info/?l=linux-kernel&m=114476543426600&w=2"
"name" : "20914", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/20914" "name": "SUSE-SA:2006:028",
}, "refsource": "SUSE",
{ "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
"name" : "20398", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/20398" "name": "DSA-1103",
} "refsource": "DEBIAN",
] "url": "http://www.debian.org/security/2006/dsa-1103"
} },
} {
"name": "20398",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20398"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604"
},
{
"name": "17640",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17640"
},
{
"name": "20914",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/20914"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1907", "ID": "CVE-2006-1907",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple SQL injection vulnerabilities in myEvent 1.x allow remote attackers to inject arbitrary SQL commands via the event_id parameter to (1) addevent.php or (2) del.php or (3) event_desc parameter to addevent.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "ADV-2006-1384", "description_data": [
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2006/1384" "lang": "eng",
}, "value": "Multiple SQL injection vulnerabilities in myEvent 1.x allow remote attackers to inject arbitrary SQL commands via the event_id parameter to (1) addevent.php or (2) del.php or (3) event_desc parameter to addevent.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
{ }
"name" : "24720", ]
"refsource" : "OSVDB", },
"url" : "http://www.osvdb.org/24720" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "24721", "description": [
"refsource" : "OSVDB", {
"url" : "http://www.osvdb.org/24721" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "19680", ]
"refsource" : "SECUNIA", }
"url" : "http://secunia.com/advisories/19680" ]
}, },
{ "references": {
"name" : "myevent-addevent-del-sql-injection(25886)", "reference_data": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25886" "name": "24721",
} "refsource": "OSVDB",
] "url": "http://www.osvdb.org/24721"
} },
} {
"name": "19680",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19680"
},
{
"name": "myevent-addevent-del-sql-injection(25886)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25886"
},
{
"name": "24720",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24720"
},
{
"name": "ADV-2006-1384",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1384"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5226", "ID": "CVE-2006-5226",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "PHP remote file inclusion vulnerability in moteur/moteur.php in Prologin.fr Freenews 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20061008 Freenews v1.1 <= (chemin) Remote File Include Vulnerability", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/448019/100/0/threaded" "lang": "eng",
}, "value": "PHP remote file inclusion vulnerability in moteur/moteur.php in Prologin.fr Freenews 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter."
{ }
"name" : "2490", ]
"refsource" : "EXPLOIT-DB", },
"url" : "https://www.exploit-db.com/exploits/2490" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "20405", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/20405" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "1704", ]
"refsource" : "SREASON", }
"url" : "http://securityreason.com/securityalert/1704" ]
}, },
{ "references": {
"name" : "freenews-moteur-file-include(29395)", "reference_data": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29395" "name": "2490",
} "refsource": "EXPLOIT-DB",
] "url": "https://www.exploit-db.com/exploits/2490"
} },
} {
"name": "1704",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1704"
},
{
"name": "20405",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20405"
},
{
"name": "freenews-moteur-file-include(29395)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29395"
},
{
"name": "20061008 Freenews v1.1 <= (chemin) Remote File Include Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/448019/100/0/threaded"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5652", "ID": "CVE-2006-5652",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in Sun iPlanet Messaging Server Messenger Express allows remote attackers to inject arbitrary web script via the expression Cascading Style Sheets (CSS) function, as demonstrated by setting the width style for an IMG element. NOTE: this issue might be related to CVE-2006-5486, however due to the vagueness of the initial advisory and different researchers, it has been assigned a new CVE."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/450184/100/0/threaded" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in Sun iPlanet Messaging Server Messenger Express allows remote attackers to inject arbitrary web script via the expression Cascading Style Sheets (CSS) function, as demonstrated by setting the width style for an IMG element. NOTE: this issue might be related to CVE-2006-5486, however due to the vagueness of the initial advisory and different researchers, it has been assigned a new CVE."
{ }
"name" : "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"", ]
"refsource" : "FULLDISC", },
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050460.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "20838", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/20838" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "1806", ]
"refsource" : "SREASON", }
"url" : "http://securityreason.com/securityalert/1806" ]
}, },
{ "references": {
"name" : "sun-messaging-expression-xss(29929)", "reference_data": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29929" "name": "sun-messaging-expression-xss(29929)",
} "refsource": "XF",
] "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29929"
} },
} {
"name": "20838",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20838"
},
{
"name": "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"",
"refsource": "FULLDISC",
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050460.html"
},
{
"name": "20061031 Cross Site Scripting (XSS) Vulnerability in iPlanet Messaging Server Messenger Express by \"Sun\"",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/450184/100/0/threaded"
},
{
"name": "1806",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1806"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5923", "ID": "CVE-2006-5923",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "PHP remote file inclusion vulnerability in index.php in Chris Mac gtcatalog (aka GimeScripts Shopping Catalog) 0.9.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the custom parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20061120 Shopping_Catalog Remote File Include exploit", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/452114/100/200/threaded" "lang": "eng",
}, "value": "PHP remote file inclusion vulnerability in index.php in Chris Mac gtcatalog (aka GimeScripts Shopping Catalog) 0.9.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the custom parameter."
{ }
"name" : "2745", ]
"refsource" : "EXPLOIT-DB", },
"url" : "https://www.exploit-db.com/exploits/2745" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "20979", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/20979" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "20979",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/20979"
},
{
"name": "20061120 Shopping_Catalog Remote File Include exploit",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/452114/100/200/threaded"
},
{
"name": "2745",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2745"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5979", "ID": "CVE-2006-5979",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Renasoft NetJetServer 2.5.3.939, and possibly earlier, uses insecure permissions for Global.asa, which allows remote attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; details are obtained from third party sources."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "ADV-2006-4559", "description_data": [
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2006/4559" "lang": "eng",
}, "value": "Renasoft NetJetServer 2.5.3.939, and possibly earlier, uses insecure permissions for Global.asa, which allows remote attackers to obtain sensitive information. NOTE: the provenance of this information is unknown; details are obtained from third party sources."
{ }
"name" : "22859", ]
"refsource" : "SECUNIA", },
"url" : "http://secunia.com/advisories/22859" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "netjetserver-permissions-info-disclosure(30338)", "description": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30338" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "netjetserver-permissions-info-disclosure(30338)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30338"
},
{
"name": "22859",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22859"
},
{
"name": "ADV-2006-4559",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/4559"
}
]
}
}

View File

@ -1,152 +1,152 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2010-0053", "ID": "CVE-2010-0053",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the run-in Cascading Style Sheets (CSS) display property."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://support.apple.com/kb/HT4070", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://support.apple.com/kb/HT4070" "lang": "eng",
}, "value": "Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the run-in Cascading Style Sheets (CSS) display property."
{ }
"name" : "http://support.apple.com/kb/HT4225", ]
"refsource" : "CONFIRM", },
"url" : "http://support.apple.com/kb/HT4225" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "APPLE-SA-2010-03-11-1", "description": [
"refsource" : "APPLE", {
"url" : "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "APPLE-SA-2010-06-21-1", ]
"refsource" : "APPLE", }
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html" ]
}, },
{ "references": {
"name" : "FEDORA-2010-8360", "reference_data": [
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html" "name": "MDVSA-2011:039",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039"
"name" : "FEDORA-2010-8379", },
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html" "name": "APPLE-SA-2010-03-11-1",
}, "refsource": "APPLE",
{ "url": "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html"
"name" : "FEDORA-2010-8423", },
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html" "name": "ADV-2010-2722",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2010/2722"
"name" : "MDVSA-2011:039", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039" "name": "43068",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/43068"
"name" : "SUSE-SR:2011:002", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" "name": "USN-1006-1",
}, "refsource": "UBUNTU",
{ "url": "http://www.ubuntu.com/usn/USN-1006-1"
"name" : "USN-1006-1", },
"refsource" : "UBUNTU", {
"url" : "http://www.ubuntu.com/usn/USN-1006-1" "name": "1023708",
}, "refsource": "SECTRACK",
{ "url": "http://www.securitytracker.com/id?1023708"
"name" : "38671", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/38671" "name": "41856",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/41856"
"name" : "62948", },
"refsource" : "OSVDB", {
"url" : "http://osvdb.org/62948" "name": "ADV-2011-0212",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2011/0212"
"name" : "oval:org.mitre.oval:def:7323", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7323" "name": "http://support.apple.com/kb/HT4225",
}, "refsource": "CONFIRM",
{ "url": "http://support.apple.com/kb/HT4225"
"name" : "1023708", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id?1023708" "name": "FEDORA-2010-8360",
}, "refsource": "FEDORA",
{ "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html"
"name" : "41856", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/41856" "name": "oval:org.mitre.oval:def:7323",
}, "refsource": "OVAL",
{ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7323"
"name" : "43068", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/43068" "name": "http://support.apple.com/kb/HT4070",
}, "refsource": "CONFIRM",
{ "url": "http://support.apple.com/kb/HT4070"
"name" : "ADV-2010-2722", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/2722" "name": "62948",
}, "refsource": "OSVDB",
{ "url": "http://osvdb.org/62948"
"name" : "ADV-2011-0212", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2011/0212" "name": "SUSE-SR:2011:002",
}, "refsource": "SUSE",
{ "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
"name" : "ADV-2011-0552", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2011/0552" "name": "ADV-2011-0552",
} "refsource": "VUPEN",
] "url": "http://www.vupen.com/english/advisories/2011/0552"
} },
} {
"name": "FEDORA-2010-8379",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html"
},
{
"name": "APPLE-SA-2010-06-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
},
{
"name": "38671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38671"
},
{
"name": "FEDORA-2010-8423",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html"
}
]
}
}

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"ID" : "CVE-2010-0135", "ID": "CVE-2010-0135",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to \"data blocks.\""
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://secunia.com/secunia_research/2010-31/", "description_data": [
"refsource" : "MISC", {
"url" : "http://secunia.com/secunia_research/2010-31/" "lang": "eng",
}, "value": "Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to \"data blocks.\""
{ }
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", ]
"refsource" : "CONFIRM", },
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01", "description": [
"refsource" : "CONFIRM", {
"url" : "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "41928", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/41928" ]
} },
] "references": {
} "reference_data": [
} {
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01"
},
{
"name": "41928",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/41928"
},
{
"name": "http://secunia.com/secunia_research/2010-31/",
"refsource": "MISC",
"url": "http://secunia.com/secunia_research/2010-31/"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812"
}
]
}
}

View File

@ -1,137 +1,137 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2010-0544", "ID": "CVE-2010-0544",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors related to a malformed URL."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://support.apple.com/kb/HT4196", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://support.apple.com/kb/HT4196" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors related to a malformed URL."
{ }
"name" : "http://support.apple.com/kb/HT4220", ]
"refsource" : "CONFIRM", },
"url" : "http://support.apple.com/kb/HT4220" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://support.apple.com/kb/HT4225", "description": [
"refsource" : "CONFIRM", {
"url" : "http://support.apple.com/kb/HT4225" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://support.apple.com/kb/HT4456", ]
"refsource" : "CONFIRM", }
"url" : "http://support.apple.com/kb/HT4456" ]
}, },
{ "references": {
"name" : "APPLE-SA-2010-06-07-1", "reference_data": [
"refsource" : "APPLE", {
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html" "name": "http://support.apple.com/kb/HT4220",
}, "refsource": "CONFIRM",
{ "url": "http://support.apple.com/kb/HT4220"
"name" : "APPLE-SA-2010-06-16-1", },
"refsource" : "APPLE", {
"url" : "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html" "name": "http://support.apple.com/kb/HT4225",
}, "refsource": "CONFIRM",
{ "url": "http://support.apple.com/kb/HT4225"
"name" : "APPLE-SA-2010-06-21-1", },
"refsource" : "APPLE", {
"url" : "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html" "name": "APPLE-SA-2010-06-07-1",
}, "refsource": "APPLE",
{ "url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html"
"name" : "APPLE-SA-2010-11-22-1", },
"refsource" : "APPLE", {
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" "name": "40196",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/40196"
"name" : "40620", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/40620" "name": "40105",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/40105"
"name" : "oval:org.mitre.oval:def:6656", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6656" "name": "ADV-2010-1373",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2010/1373"
"name" : "1024067", },
"refsource" : "SECTRACK", {
"url" : "http://securitytracker.com/id?1024067" "name": "oval:org.mitre.oval:def:6656",
}, "refsource": "OVAL",
{ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6656"
"name" : "40105", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/40105" "name": "APPLE-SA-2010-06-16-1",
}, "refsource": "APPLE",
{ "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html"
"name" : "40196", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/40196" "name": "42314",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/42314"
"name" : "42314", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/42314" "name": "ADV-2010-1512",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2010/1512"
"name" : "ADV-2010-1373", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/1373" "name": "40620",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/40620"
"name" : "ADV-2010-1512", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/1512" "name": "http://support.apple.com/kb/HT4456",
} "refsource": "CONFIRM",
] "url": "http://support.apple.com/kb/HT4456"
} },
} {
"name": "1024067",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1024067"
},
{
"name": "http://support.apple.com/kb/HT4196",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4196"
},
{
"name": "APPLE-SA-2010-06-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html"
},
{
"name": "APPLE-SA-2010-11-22-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
}
]
}
}

View File

@ -1,92 +1,92 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@ubuntu.com",
"ID" : "CVE-2010-0825", "ID": "CVE-2010-0825",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://bugs.launchpad.net/ubuntu/+bug/531569", "description_data": [
"refsource" : "CONFIRM", {
"url" : "https://bugs.launchpad.net/ubuntu/+bug/531569" "lang": "eng",
}, "value": "lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks."
{ }
"name" : "MDVSA-2010:083", ]
"refsource" : "MANDRIVA", },
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:083" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "USN-919-1", "description": [
"refsource" : "UBUNTU", {
"url" : "http://www.ubuntu.com/usn/USN-919-1" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "39155", ]
"refsource" : "SECUNIA", }
"url" : "http://secunia.com/advisories/39155" ]
}, },
{ "references": {
"name" : "ADV-2010-0734", "reference_data": [
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/0734" "name": "MDVSA-2010:083",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:083"
"name" : "ADV-2010-0952", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/0952" "name": "emacs-emailhelper-symlink(57457)",
}, "refsource": "XF",
{ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57457"
"name" : "emacs-emailhelper-symlink(57457)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57457" "name": "USN-919-1",
} "refsource": "UBUNTU",
] "url": "http://www.ubuntu.com/usn/USN-919-1"
} },
} {
"name": "39155",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39155"
},
{
"name": "ADV-2010-0734",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0734"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+bug/531569",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+bug/531569"
},
{
"name": "ADV-2010-0952",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0952"
}
]
}
}

View File

@ -1,62 +1,62 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2010-2218", "ID": "CVE-2010-2218",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service via unspecified vectors, related to a \"JS method issue.\""
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-19.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-19.html" "lang": "eng",
} "value": "Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to cause a denial of service via unspecified vectors, related to a \"JS method issue.\""
] }
} ]
} },
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.adobe.com/support/security/bulletins/apsb10-19.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb10-19.html"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-3210", "ID": "CVE-2010-3210",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple PHP remote file inclusion vulnerabilities in Multi-lingual E-Commerce System 0.2 allow remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to (1) checkout2-CYM.php, (2) checkout2-EN.php, (3) checkout2-FR.php, (4) cat-FR.php, (5) cat-EN.php, (6) cat-CYM.php, (7) checkout1-CYM.php, (8) checkout1-EN.php, (9) checkout1-FR.php, (10) prod-CYM.php, (11) prod-EN.php, and (12) prod-FR.php in inc/."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "14835", "description_data": [
"refsource" : "EXPLOIT-DB", {
"url" : "http://www.exploit-db.com/exploits/14835" "lang": "eng",
}, "value": "Multiple PHP remote file inclusion vulnerabilities in Multi-lingual E-Commerce System 0.2 allow remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to (1) checkout2-CYM.php, (2) checkout2-EN.php, (3) checkout2-FR.php, (4) cat-FR.php, (5) cat-EN.php, (6) cat-CYM.php, (7) checkout1-CYM.php, (8) checkout1-EN.php, (9) checkout1-FR.php, (10) prod-CYM.php, (11) prod-EN.php, and (12) prod-FR.php in inc/."
{ }
"name" : "http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt", ]
"refsource" : "MISC", },
"url" : "http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "mlecs-multiple-file-include(61464)", "description": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61464" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1008-exploits/mlecomsys-rfi.txt"
},
{
"name": "mlecs-multiple-file-include(61464)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61464"
},
{
"name": "14835",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/14835"
}
]
}
}

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2010-3294", "ID": "CVE-2010-3294",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/1" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in apc.php in the Alternative PHP Cache (APC) extension before 3.1.4 for PHP allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
{ }
"name" : "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4", ]
"refsource" : "MLIST", },
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/6" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4", "description": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2010/09/14/8" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4", ]
"refsource" : "CONFIRM", }
"url" : "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4" ]
}, },
{ "references": {
"name" : "RHSA-2012:0811", "reference_data": [
"refsource" : "REDHAT", {
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0811.html" "name": "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4",
}, "refsource": "CONFIRM",
{ "url": "http://pecl.php.net/package-changelog.php?package=APC&release=3.1.4"
"name" : "ADV-2010-2406", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/2406" "name": "ADV-2010-2406",
} "refsource": "VUPEN",
] "url": "http://www.vupen.com/english/advisories/2010/2406"
} },
} {
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/6"
},
{
"name": "RHSA-2012:0811",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0811.html"
},
{
"name": "[oss-security] 20100914 CVE request: xss in pecl-apc before 3.1.4",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/1"
},
{
"name": "[oss-security] 20100914 Re: CVE request: xss in pecl-apc before 3.1.4",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2010/09/14/8"
}
]
}
}

View File

@ -1,102 +1,102 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-3474", "ID": "CVE-2010-3474",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM DB2 9.7 before FP3 does not perform the expected drops or invalidations of dependent functions upon a loss of privileges by the functions' owners, which allows remote authenticated users to bypass intended access restrictions via calls to these functions, a different vulnerability than CVE-2009-3471."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21446455", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21446455" "lang": "eng",
}, "value": "IBM DB2 9.7 before FP3 does not perform the expected drops or invalidations of dependent functions upon a loss of privileges by the functions' owners, which allows remote authenticated users to bypass intended access restrictions via calls to these functions, a different vulnerability than CVE-2009-3471."
{ }
"name" : "IC68015", ]
"refsource" : "AIXAPAR", },
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IC68015" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "43291", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/43291" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "68121", ]
"refsource" : "OSVDB", }
"url" : "http://osvdb.org/68121" ]
}, },
{ "references": {
"name" : "oval:org.mitre.oval:def:14669", "reference_data": [
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14669" "name": "43291",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/43291"
"name" : "1024457", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id?1024457" "name": "oval:org.mitre.oval:def:14669",
}, "refsource": "OVAL",
{ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14669"
"name" : "41444", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/41444" "name": "ibm-db2-public-security-bypass(61872)",
}, "refsource": "XF",
{ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61872"
"name" : "ADV-2010-2425", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/2425" "name": "IC68015",
}, "refsource": "AIXAPAR",
{ "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC68015"
"name" : "ibm-db2-public-security-bypass(61872)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/61872" "name": "ADV-2010-2425",
} "refsource": "VUPEN",
] "url": "http://www.vupen.com/english/advisories/2010/2425"
} },
} {
"name": "1024457",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024457"
},
{
"name": "41444",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41444"
},
{
"name": "68121",
"refsource": "OSVDB",
"url": "http://osvdb.org/68121"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg21446455",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg21446455"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-4362", "ID": "CVE-2010-4362",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple SQL injection vulnerabilities in MicroNetsoft RV Dealer Website allow remote attackers to execute arbitrary SQL commands via the (1) selStock parameter to search.asp and the (2) orderBy parameter to showAlllistings.asp."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "15629", "description_data": [
"refsource" : "EXPLOIT-DB", {
"url" : "http://www.exploit-db.com/exploits/15629" "lang": "eng",
}, "value": "Multiple SQL injection vulnerabilities in MicroNetsoft RV Dealer Website allow remote attackers to execute arbitrary SQL commands via the (1) selStock parameter to search.asp and the (2) orderBy parameter to showAlllistings.asp."
{ }
"name" : "45089", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/45089" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "41319", "description": [
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/41319" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "15629",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15629"
},
{
"name": "45089",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/45089"
},
{
"name": "41319",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41319"
}
]
}
}

View File

@ -1,137 +1,137 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID" : "CVE-2010-4473", "ID": "CVE-2010-4473",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4462."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" "lang": "eng",
}, "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4462."
{ }
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", ]
"refsource" : "CONFIRM", },
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "description": [
"refsource" : "CONFIRM", {
"url" : "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "HPSBMU02797", ]
"refsource" : "HP", }
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2" ]
}, },
{ "references": {
"name" : "HPSBUX02777", "reference_data": [
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=133728004526190&w=2" "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html"
"name" : "SSRT100854", },
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=133728004526190&w=2" "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"
"name" : "SSRT100867", },
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=134254957702612&w=2" "name": "HPSBMU02799",
}, "refsource": "HP",
{ "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
"name" : "HPSBMU02799", },
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2" "name": "SUSE-SU-2011:0823",
}, "refsource": "SUSE",
{ "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html"
"name" : "RHSA-2011:0282", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0282.html" "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html"
"name" : "RHSA-2011:0880", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0880.html" "name": "oval:org.mitre.oval:def:12952",
}, "refsource": "OVAL",
{ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12952"
"name" : "SUSE-SA:2011:024", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" "name": "44954",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/44954"
"name" : "SUSE-SU-2011:0823", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" "name": "RHSA-2011:0880",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
"name" : "oval:org.mitre.oval:def:12952", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12952" "name": "RHSA-2011:0282",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html"
"name" : "oval:org.mitre.oval:def:14119", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14119" "name": "SSRT100867",
}, "refsource": "HP",
{ "url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
"name" : "44954", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/44954" "name": "49198",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/49198"
"name" : "49198", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/49198" "name": "oval:org.mitre.oval:def:14119",
} "refsource": "OVAL",
] "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14119"
} },
} {
"name": "SUSE-SA:2011:024",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html"
},
{
"name": "HPSBUX02777",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133728004526190&w=2"
},
{
"name": "SSRT100854",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=133728004526190&w=2"
},
{
"name": "HPSBMU02797",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=134254957702612&w=2"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-4610", "ID": "CVE-2010-4610",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in index.php in Html-edit CMS 3.1.8 allows remote attackers to inject arbitrary web script or HTML via the error parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "15800", "description_data": [
"refsource" : "EXPLOIT-DB", {
"url" : "http://www.exploit-db.com/exploits/15800" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in index.php in Html-edit CMS 3.1.8 allows remote attackers to inject arbitrary web script or HTML via the error parameter."
{ }
"name" : "http://www.htbridge.ch/advisory/xss_in_html_edit_cms.html", ]
"refsource" : "MISC", },
"url" : "http://www.htbridge.ch/advisory/xss_in_html_edit_cms.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "42664", "description": [
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/42664" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "15800",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/15800"
},
{
"name": "http://www.htbridge.ch/advisory/xss_in_html_edit_cms.html",
"refsource": "MISC",
"url": "http://www.htbridge.ch/advisory/xss_in_html_edit_cms.html"
},
{
"name": "42664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/42664"
}
]
}
}

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-10029", "ID": "CVE-2014-10029",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "SQL injection vulnerability in profile.php in FluxBB before 1.4.13 and 1.5.x before 1.5.7 allows remote attackers to execute arbitrary SQL commands via the req_new_email parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20141121 FluxBB <= 1.5.6 SQL Injection", "description_data": [
"refsource" : "FULLDISC", {
"url" : "http://seclists.org/fulldisclosure/2014/Nov/73" "lang": "eng",
}, "value": "SQL injection vulnerability in profile.php in FluxBB before 1.4.13 and 1.5.x before 1.5.7 allows remote attackers to execute arbitrary SQL commands via the req_new_email parameter."
{ }
"name" : "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html", ]
"refsource" : "MISC", },
"url" : "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://fluxbb.org/forums/viewtopic.php?id=8001", "description": [
"refsource" : "CONFIRM", {
"url" : "http://fluxbb.org/forums/viewtopic.php?id=8001" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "https://fluxbb.org/development/core/tickets/990/", ]
"refsource" : "CONFIRM", }
"url" : "https://fluxbb.org/development/core/tickets/990/" ]
}, },
{ "references": {
"name" : "59038", "reference_data": [
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59038" "name": "http://fluxbb.org/forums/viewtopic.php?id=8001",
}, "refsource": "CONFIRM",
{ "url": "http://fluxbb.org/forums/viewtopic.php?id=8001"
"name" : "fluxbb-profile-sql-injection(98890)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98890" "name": "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html",
} "refsource": "MISC",
] "url": "http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html"
} },
} {
"name": "59038",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59038"
},
{
"name": "20141121 FluxBB <= 1.5.6 SQL Injection",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Nov/73"
},
{
"name": "fluxbb-profile-sql-injection(98890)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98890"
},
{
"name": "https://fluxbb.org/development/core/tickets/990/",
"refsource": "CONFIRM",
"url": "https://fluxbb.org/development/core/tickets/990/"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2014-3322", "ID": "CVE-2014-3322",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cisco IOS XR 4.3(.2) and earlier on ASR 9000 devices does not properly perform NetFlow sampling of IP packets, which allows remote attackers to cause a denial of service (chip and card hangs) via malformed (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCuo68417."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009" "lang": "eng",
}, "value": "Cisco IOS XR 4.3(.2) and earlier on ASR 9000 devices does not properly perform NetFlow sampling of IP packets, which allows remote attackers to cause a denial of service (chip and card hangs) via malformed (1) IPv4 or (2) IPv6 packets, aka Bug ID CSCuo68417."
{ }
"name" : "20140722 Cisco IOS XR Software NetFlow Processing Denial of Service Vulnerability", ]
"refsource" : "CISCO", },
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3322" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "68833", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/68833" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "1030623", ]
"refsource" : "SECTRACK", }
"url" : "http://www.securitytracker.com/id/1030623" ]
}, },
{ "references": {
"name" : "60311", "reference_data": [
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/60311" "name": "60311",
} "refsource": "SECUNIA",
] "url": "http://secunia.com/advisories/60311"
} },
} {
"name": "1030623",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1030623"
},
{
"name": "20140722 Cisco IOS XR Software NetFlow Processing Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3322"
},
{
"name": "68833",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68833"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=35009"
}
]
}
}

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-3712", "ID": "CVE-2014-3712",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Katello allows remote attackers to cause a denial of service (memory consumption) via the (1) mode parameter in the setup_utils function in content_search_controller.rb or (2) action parameter in the respond function in api/api_controller.rb in app/controllers/katello/, which is passed to the to_sym method."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20141022 CVE-2014-3712 Katello: user parameters passed to to_sym", "description_data": [
"refsource" : "MLIST", {
"url" : "http://seclists.org/oss-sec/2014/q4/419" "lang": "eng",
}, "value": "Katello allows remote attackers to cause a denial of service (memory consumption) via the (1) mode parameter in the setup_utils function in content_search_controller.rb or (2) action parameter in the respond function in api/api_controller.rb in app/controllers/katello/, which is passed to the to_sym method."
{ }
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1155708", ]
"refsource" : "MISC", },
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1155708" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "70707", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/70707" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "katello-cve20143712-dos(97724)", ]
"refsource" : "XF", }
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/97724" ]
} },
] "references": {
} "reference_data": [
} {
"name": "70707",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70707"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1155708",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1155708"
},
{
"name": "katello-cve20143712-dos(97724)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97724"
},
{
"name": "[oss-security] 20141022 CVE-2014-3712 Katello: user parameters passed to to_sym",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q4/419"
}
]
}
}

View File

@ -1,67 +1,67 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-4040", "ID": "CVE-2014-4040",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "snap in powerpc-utils 1.2.20 produces an archive with fstab and yaboot.conf files potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20140617 Re: CVE request: multiple /tmp races in ppc64-diag", "description_data": [
"refsource" : "MLIST", {
"url" : "http://openwall.com/lists/oss-security/2014/06/17/1" "lang": "eng",
}, "value": "snap in powerpc-utils 1.2.20 produces an archive with fstab and yaboot.conf files potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream."
{ }
"name" : "RHSA-2015:0384", ]
"refsource" : "REDHAT", },
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0384.html" "problemtype": {
} "problemtype_data": [
] {
} "description": [
} {
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20140617 Re: CVE request: multiple /tmp races in ppc64-diag",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2014/06/17/1"
},
{
"name": "RHSA-2015:0384",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0384.html"
}
]
}
}

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-4505", "ID": "CVE-2014-4505",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in the Easy Breadcrumb module 7.x-2.x before 7.x-2.10 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://www.drupal.org/node/2288353", "description_data": [
"refsource" : "MISC", {
"url" : "https://www.drupal.org/node/2288353" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in the Easy Breadcrumb module 7.x-2.x before 7.x-2.10 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
{ }
"name" : "https://www.drupal.org/node/2286121", ]
"refsource" : "CONFIRM", },
"url" : "https://www.drupal.org/node/2286121" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "68106", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/68106" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "59379", ]
"refsource" : "SECUNIA", }
"url" : "http://secunia.com/advisories/59379" ]
} },
] "references": {
} "reference_data": [
} {
"name": "https://www.drupal.org/node/2286121",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/node/2286121"
},
{
"name": "59379",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59379"
},
{
"name": "https://www.drupal.org/node/2288353",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2288353"
},
{
"name": "68106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/68106"
}
]
}
}

View File

@ -1,67 +1,67 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-4726", "ID": "CVE-2014-4726",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20140708 Re: CVE request: WordPress plugin wysija-newsletters remote file upload", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2014/07/08/7" "lang": "eng",
}, "value": "Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors."
{ }
"name" : "https://wordpress.org/plugins/wysija-newsletters/changelog/", ]
"refsource" : "CONFIRM", },
"url" : "https://wordpress.org/plugins/wysija-newsletters/changelog/" "problemtype": {
} "problemtype_data": [
] {
} "description": [
} {
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wordpress.org/plugins/wysija-newsletters/changelog/",
"refsource": "CONFIRM",
"url": "https://wordpress.org/plugins/wysija-newsletters/changelog/"
},
{
"name": "[oss-security] 20140708 Re: CVE request: WordPress plugin wysija-newsletters remote file upload",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/07/08/7"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2014-8030", "ID": "CVE-2014-8030",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in sendPwMail.do in Cisco WebEx Meetings Server allows remote attackers to inject arbitrary web script or HTML via the email parameter, aka Bug ID CSCuj40381."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20150108 Cisco WebEx Meetings Server Cross-Site Scripting Vulnerability", "description_data": [
"refsource" : "CISCO", {
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8030" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in sendPwMail.do in Cisco WebEx Meetings Server allows remote attackers to inject arbitrary web script or HTML via the email parameter, aka Bug ID CSCuj40381."
{ }
"name" : "71945", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/71945" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "1031517", "description": [
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1031517" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "62163", ]
"refsource" : "SECUNIA", }
"url" : "http://secunia.com/advisories/62163" ]
}, },
{ "references": {
"name" : "cisco-webex-cve20148030-xss(100574)", "reference_data": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/100574" "name": "cisco-webex-cve20148030-xss(100574)",
} "refsource": "XF",
] "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100574"
} },
} {
"name": "1031517",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031517"
},
{
"name": "62163",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62163"
},
{
"name": "20150108 Cisco WebEx Meetings Server Cross-Site Scripting Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-8030"
},
{
"name": "71945",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71945"
}
]
}
}

View File

@ -1,67 +1,67 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-8174", "ID": "CVE-2014-8174",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "eDeploy makes it easier for remote attackers to execute arbitrary code by leveraging use of HTTP to download files."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://github.com/redhat-cip/edeploy/issues/230", "description_data": [
"refsource" : "MISC", {
"url" : "https://github.com/redhat-cip/edeploy/issues/230" "lang": "eng",
}, "value": "eDeploy makes it easier for remote attackers to execute arbitrary code by leveraging use of HTTP to download files."
{ }
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1202972", ]
"refsource" : "CONFIRM", },
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1202972" "problemtype": {
} "problemtype_data": [
] {
} "description": [
} {
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/redhat-cip/edeploy/issues/230",
"refsource": "MISC",
"url": "https://github.com/redhat-cip/edeploy/issues/230"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1202972",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202972"
}
]
}
}

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-8562", "ID": "CVE-2014-8562",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "DCM decode in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read)."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://int21.de/cve/CVE-2014-8562-ImageMagick-dcm-oob-heap-overflow.html", "description_data": [
"refsource" : "MISC", {
"url" : "https://int21.de/cve/CVE-2014-8562-ImageMagick-dcm-oob-heap-overflow.html" "lang": "eng",
}, "value": "DCM decode in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read)."
{ }
"name" : "https://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html", ]
"refsource" : "MISC", },
"url" : "https://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1159362", "description": [
"refsource" : "CONFIRM", {
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1159362" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "70837", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/70837" ]
} },
] "references": {
} "reference_data": [
} {
"name": "70837",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70837"
},
{
"name": "https://int21.de/cve/CVE-2014-8562-ImageMagick-dcm-oob-heap-overflow.html",
"refsource": "MISC",
"url": "https://int21.de/cve/CVE-2014-8562-ImageMagick-dcm-oob-heap-overflow.html"
},
{
"name": "https://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/128944/ImageMagick-Out-Of-Bounds-Read-Heap-Overflow.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1159362",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159362"
}
]
}
}

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2014-8576", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
}, "ID": "CVE-2014-8576",
"data_format" : "MITRE", "ASSIGNER": "cve@mitre.org",
"data_type" : "CVE", "STATE": "REJECT"
"data_version" : "4.0", },
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none."
} }
] ]
} }
} }

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID" : "CVE-2014-8890", "ID": "CVE-2014-8890",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM WebSphere Application Server Liberty Profile 8.5.x before 8.5.5.4 allows remote attackers to gain privileges by leveraging the combination of a servlet's deployment descriptor security constraints and ServletSecurity annotations."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21690185", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21690185" "lang": "eng",
}, "value": "IBM WebSphere Application Server Liberty Profile 8.5.x before 8.5.5.4 allows remote attackers to gain privileges by leveraging the combination of a servlet's deployment descriptor security constraints and ServletSecurity annotations."
{ }
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21963275", ]
"refsource" : "CONFIRM", },
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21963275" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "PI29911", "description": [
"refsource" : "AIXAPAR", {
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PI29911" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "71834", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/71834" ]
}, },
{ "references": {
"name" : "1033384", "reference_data": [
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1033384" "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275",
}, "refsource": "CONFIRM",
{ "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21963275"
"name" : "ibm-websphere-cve20148890-priv-escalation(99009)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99009" "name": "1033384",
} "refsource": "SECTRACK",
] "url": "http://www.securitytracker.com/id/1033384"
} },
} {
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690185"
},
{
"name": "PI29911",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PI29911"
},
{
"name": "71834",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71834"
},
{
"name": "ibm-websphere-cve20148890-priv-escalation(99009)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99009"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "product-security@qualcomm.com", "ASSIGNER": "product-security@qualcomm.com",
"ID" : "CVE-2014-9967", "ID": "CVE-2014-9967",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "All Qualcomm products", "product_name": "All Qualcomm products",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "All Android releases from CAF using the Linux kernel" "version_value": "All Android releases from CAF using the Linux kernel"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Qualcomm, Inc." "vendor_name": "Qualcomm, Inc."
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In all Android releases from CAF using the Linux kernel, an untrusted pointer dereference vulnerability exists in WideVine DRM."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Untrusted Pointer Dereference Vulnerability in TrustZone"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://source.android.com/security/bulletin/2017-06-01", "description_data": [
"refsource" : "CONFIRM", {
"url" : "https://source.android.com/security/bulletin/2017-06-01" "lang": "eng",
}, "value": "In all Android releases from CAF using the Linux kernel, an untrusted pointer dereference vulnerability exists in WideVine DRM."
{ }
"name" : "98874", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/98874" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "1038623", "description": [
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1038623" "lang": "eng",
} "value": "Untrusted Pointer Dereference Vulnerability in TrustZone"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "https://source.android.com/security/bulletin/2017-06-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2017-06-01"
},
{
"name": "98874",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98874"
},
{
"name": "1038623",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038623"
}
]
}
}

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "secalert@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2016-2116", "ID": "CVE-2016-2116",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20160303 Security issues in JasPer (CVE-2016-1577 and CVE-2016-2116)", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2016/03/03/12" "lang": "eng",
}, "value": "Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file."
{ }
"name" : "https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865", ]
"refsource" : "CONFIRM", },
"url" : "https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "DSA-3508", "description": [
"refsource" : "DEBIAN", {
"url" : "http://www.debian.org/security/2016/dsa-3508" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "RHSA-2017:1208", ]
"refsource" : "REDHAT", }
"url" : "https://access.redhat.com/errata/RHSA-2017:1208" ]
}, },
{ "references": {
"name" : "USN-2919-1", "reference_data": [
"refsource" : "UBUNTU", {
"url" : "http://www.ubuntu.com/usn/USN-2919-1" "name": "DSA-3508",
}, "refsource": "DEBIAN",
{ "url": "http://www.debian.org/security/2016/dsa-3508"
"name" : "84133", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/84133" "name": "[oss-security] 20160303 Security issues in JasPer (CVE-2016-1577 and CVE-2016-2116)",
} "refsource": "MLIST",
] "url": "http://www.openwall.com/lists/oss-security/2016/03/03/12"
} },
} {
"name": "https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/jasper/+bug/1547865"
},
{
"name": "USN-2919-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2919-1"
},
{
"name": "RHSA-2017:1208",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1208"
},
{
"name": "84133",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/84133"
}
]
}
}

View File

@ -1,90 +1,90 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "psirt@us.ibm.com", "ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC" : "2017-08-23T00:00:00", "DATE_PUBLIC": "2017-08-23T00:00:00",
"ID" : "CVE-2016-2977", "ID": "CVE-2016-2977",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Sametime", "product_name": "Sametime",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "8.5.2" "version_value": "8.5.2"
}, },
{ {
"version_value" : "8.5.2.1" "version_value": "8.5.2.1"
}, },
{ {
"version_value" : "9.0" "version_value": "9.0"
}, },
{ {
"version_value" : "9.0.0.1" "version_value": "9.0.0.1"
}, },
{ {
"version_value" : "9.0.1" "version_value": "9.0.1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "IBM" "vendor_name": "IBM"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Sametime Meeting Server 8.5.2 and 9.0 could allow a malicious user to lower other users hands in the meeting. IBM X-Force ID: 113937."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Other"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937", "description_data": [
"refsource" : "MISC", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937" "lang": "eng",
}, "value": "IBM Sametime Meeting Server 8.5.2 and 9.0 could allow a malicious user to lower other users hands in the meeting. IBM X-Force ID: 113937."
{ }
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22006439", ]
"refsource" : "CONFIRM", },
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22006439" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "100599", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/100599" "lang": "eng",
}, "value": "Other"
{ }
"name" : "1039231", ]
"refsource" : "SECTRACK", }
"url" : "http://www.securitytracker.com/id/1039231" ]
} },
] "references": {
} "reference_data": [
} {
"name": "100599",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100599"
},
{
"name": "1039231",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039231"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg22006439",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg22006439"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/113937"
}
]
}
}

View File

@ -1,67 +1,67 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID" : "CVE-2016-2986", "ID": "CVE-2016-2986",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management 6.x before 6.0.1 iFix6, Rational Quality Manager 6.x before 6.0.1 iFix6, Rational Team Concert 6.x before 6.0.1 iFix6, Rational DOORS Next Generation 6.x before 6.0.1 iFix6, Rational Engineering Lifecycle Manager 6.x before 6.0.1 iFix6, and Rational Rhapsody Design Manager 6.x before 6.0.1 iFix6 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989940", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21989940" "lang": "eng",
}, "value": "Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management 6.x before 6.0.1 iFix6, Rational Quality Manager 6.x before 6.0.1 iFix6, Rational Team Concert 6.x before 6.0.1 iFix6, Rational DOORS Next Generation 6.x before 6.0.1 iFix6, Rational Engineering Lifecycle Manager 6.x before 6.0.1 iFix6, and Rational Rhapsody Design Manager 6.x before 6.0.1 iFix6 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."
{ }
"name" : "92869", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/92869" "problemtype": {
} "problemtype_data": [
] {
} "description": [
} {
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21989940",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989940"
},
{
"name": "92869",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92869"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-3154", "ID": "CVE-2016-3154",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr", "description_data": [
"refsource" : "CONFIRM", {
"url" : "https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr" "lang": "eng",
}, "value": "The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object."
{ }
"name" : "https://core.spip.net/projects/spip/repository/revisions/22903", ]
"refsource" : "CONFIRM", },
"url" : "https://core.spip.net/projects/spip/repository/revisions/22903" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "DSA-3518", "description": [
"refsource" : "DEBIAN", {
"url" : "http://www.debian.org/security/2016/dsa-3518" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr",
"refsource": "CONFIRM",
"url": "https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-1-1-SPIP-3-0-22-et-SPIP-2-1.html?lang=fr"
},
{
"name": "DSA-3518",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3518"
},
{
"name": "https://core.spip.net/projects/spip/repository/revisions/22903",
"refsource": "CONFIRM",
"url": "https://core.spip.net/projects/spip/repository/revisions/22903"
}
]
}
}

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2016-3217", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
}, "ID": "CVE-2016-3217",
"data_format" : "MITRE", "ASSIGNER": "cve@mitre.org",
"data_type" : "CVE", "STATE": "REJECT"
"data_version" : "4.0", },
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
} }
] ]
} }
} }

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2016-3290", "ID": "CVE-2016-3290",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-3288."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "MS16-095", "description_data": [
"refsource" : "MS", {
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095" "lang": "eng",
}, "value": "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2016-3288."
{ }
"name" : "92322", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/92322" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "1036562", "description": [
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1036562" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "92322",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92322"
},
{
"name": "MS16-095",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095"
},
{
"name": "1036562",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036562"
}
]
}
}

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID" : "CVE-2016-3754", "ID": "CVE-2016-3754",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not limit process-memory usage, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 28615448."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://source.android.com/security/bulletin/2016-07-01.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://source.android.com/security/bulletin/2016-07-01.html" "lang": "eng",
}, "value": "mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not limit process-memory usage, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 28615448."
{ }
"name" : "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e", ]
"refsource" : "CONFIRM", },
"url" : "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9", "description": [
"refsource" : "CONFIRM", {
"url" : "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9" "lang": "eng",
} "value": "n/a"
] }
} ]
} }
]
},
"references": {
"reference_data": [
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/e7142a0703bc93f75e213e96ebc19000022afed9"
},
{
"name": "http://source.android.com/security/bulletin/2016-07-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-07-01.html"
},
{
"name": "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/av/+/6fdee2a83432b3b150d6a34f231c4e2f7353c01e"
}
]
}
}

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID" : "CVE-2016-3876", "ID": "CVE-2016-3876",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "providers/settings/SettingsProvider.java in Android 6.x before 2016-09-01 and 7.0 before 2016-09-01 allows physically proximate attackers to bypass the SAFE_BOOT_DISALLOWED protection mechanism and boot to safe mode via the Android Debug Bridge (adb) tool, aka internal bug 29900345."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://source.android.com/security/bulletin/2016-09-01.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://source.android.com/security/bulletin/2016-09-01.html" "lang": "eng",
}, "value": "providers/settings/SettingsProvider.java in Android 6.x before 2016-09-01 and 7.0 before 2016-09-01 allows physically proximate attackers to bypass the SAFE_BOOT_DISALLOWED protection mechanism and boot to safe mode via the Android Debug Bridge (adb) tool, aka internal bug 29900345."
{ }
"name" : "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745", ]
"refsource" : "CONFIRM", },
"url" : "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "92819", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/92819" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "1036763", ]
"refsource" : "SECTRACK", }
"url" : "http://www.securitytracker.com/id/1036763" ]
} },
] "references": {
} "reference_data": [
} {
"name": "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/base/+/91fc934bb2e5ea59929bb2f574de6db9b5100745"
},
{
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
},
{
"name": "1036763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763"
},
{
"name": "92819",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92819"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-6242", "ID": "CVE-2016-6242",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (assertion failure and kernel panic) via a large ident value in a kevent system call."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2016/07/14/5" "lang": "eng",
}, "value": "OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (assertion failure and kernel panic) via a large ident value in a kevent system call."
{ }
"name" : "[oss-security] 20160717 ReL Multiple Bugs in OpenBSD Kernel", ]
"refsource" : "MLIST", },
"url" : "http://www.openwall.com/lists/oss-security/2016/07/17/7" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://www.openbsd.org/errata58.html", "description": [
"refsource" : "CONFIRM", {
"url" : "http://www.openbsd.org/errata58.html" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://www.openbsd.org/errata59.html", ]
"refsource" : "CONFIRM", }
"url" : "http://www.openbsd.org/errata59.html" ]
}, },
{ "references": {
"name" : "91805", "reference_data": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/91805" "name": "http://www.openbsd.org/errata59.html",
} "refsource": "CONFIRM",
] "url": "http://www.openbsd.org/errata59.html"
} },
} {
"name": "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/14/5"
},
{
"name": "[oss-security] 20160717 ReL Multiple Bugs in OpenBSD Kernel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/17/7"
},
{
"name": "http://www.openbsd.org/errata58.html",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/errata58.html"
},
{
"name": "91805",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91805"
}
]
}
}

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-6246", "ID": "CVE-2016-6246",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "OpenBSD 5.8 and 5.9 allows certain local users with kern.usermount privileges to cause a denial of service (kernel panic) by mounting a tmpfs with a VNOVAL in the (1) username, (2) groupname, or (3) device name of the root node."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2016/07/14/5" "lang": "eng",
}, "value": "OpenBSD 5.8 and 5.9 allows certain local users with kern.usermount privileges to cause a denial of service (kernel panic) by mounting a tmpfs with a VNOVAL in the (1) username, (2) groupname, or (3) device name of the root node."
{ }
"name" : "[oss-security] 20160717 ReL Multiple Bugs in OpenBSD Kernel", ]
"refsource" : "MLIST", },
"url" : "http://www.openwall.com/lists/oss-security/2016/07/17/7" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://www.openbsd.org/errata58.html", "description": [
"refsource" : "CONFIRM", {
"url" : "http://www.openbsd.org/errata58.html" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://www.openbsd.org/errata59.html", ]
"refsource" : "CONFIRM", }
"url" : "http://www.openbsd.org/errata59.html" ]
}, },
{ "references": {
"name" : "91805", "reference_data": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/91805" "name": "http://www.openbsd.org/errata59.html",
} "refsource": "CONFIRM",
] "url": "http://www.openbsd.org/errata59.html"
} },
} {
"name": "[oss-security] 20160714 Multiple Bugs in OpenBSD Kernel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/14/5"
},
{
"name": "[oss-security] 20160717 ReL Multiple Bugs in OpenBSD Kernel",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/07/17/7"
},
{
"name": "http://www.openbsd.org/errata58.html",
"refsource": "CONFIRM",
"url": "http://www.openbsd.org/errata58.html"
},
{
"name": "91805",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91805"
}
]
}
}

View File

@ -1,97 +1,97 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "psirt@adobe.com", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2016-7874", "ID": "CVE-2016-7874",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier", "product_name": "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier" "version_value": "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Memory Corruption"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html" "lang": "eng",
}, "value": "Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution."
{ }
"name" : "GLSA-201701-17", ]
"refsource" : "GENTOO", },
"url" : "https://security.gentoo.org/glsa/201701-17" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "MS16-154", "description": [
"refsource" : "MS", {
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154" "lang": "eng",
}, "value": "Memory Corruption"
{ }
"name" : "RHSA-2016:2947", ]
"refsource" : "REDHAT", }
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html" ]
}, },
{ "references": {
"name" : "SUSE-SU-2016:3148", "reference_data": [
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" "name": "SUSE-SU-2016:3148",
}, "refsource": "SUSE",
{ "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
"name" : "openSUSE-SU-2016:3160", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" "name": "MS16-154",
}, "refsource": "MS",
{ "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
"name" : "94866", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/94866" "name": "GLSA-201701-17",
}, "refsource": "GENTOO",
{ "url": "https://security.gentoo.org/glsa/201701-17"
"name" : "1037442", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1037442" "name": "1037442",
} "refsource": "SECTRACK",
] "url": "http://www.securitytracker.com/id/1037442"
} },
} {
"name": "94866",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94866"
},
{
"name": "RHSA-2016:2947",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource": "CONFIRM",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
},
{
"name": "openSUSE-SU-2016:3160",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
}
]
}
}

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-7935", "ID": "CVE-2016-7935",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print()."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html" "lang": "eng",
}, "value": "The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print()."
{ }
"name" : "DSA-3775", ]
"refsource" : "DEBIAN", },
"url" : "http://www.debian.org/security/2017/dsa-3775" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "GLSA-201702-30", "description": [
"refsource" : "GENTOO", {
"url" : "https://security.gentoo.org/glsa/201702-30" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "RHSA-2017:1871", ]
"refsource" : "REDHAT", }
"url" : "https://access.redhat.com/errata/RHSA-2017:1871" ]
}, },
{ "references": {
"name" : "95852", "reference_data": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/95852" "name": "1037755",
}, "refsource": "SECTRACK",
{ "url": "http://www.securitytracker.com/id/1037755"
"name" : "1037755", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1037755" "name": "DSA-3775",
} "refsource": "DEBIAN",
] "url": "http://www.debian.org/security/2017/dsa-3775"
} },
} {
"name": "RHSA-2017:1871",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1871"
},
{
"name": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html",
"refsource": "CONFIRM",
"url": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html"
},
{
"name": "95852",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95852"
},
{
"name": "GLSA-201702-30",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-30"
}
]
}
}

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-7938", "ID": "CVE-2016-7938",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame()."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html" "lang": "eng",
}, "value": "The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame()."
{ }
"name" : "DSA-3775", ]
"refsource" : "DEBIAN", },
"url" : "http://www.debian.org/security/2017/dsa-3775" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "GLSA-201702-30", "description": [
"refsource" : "GENTOO", {
"url" : "https://security.gentoo.org/glsa/201702-30" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "RHSA-2017:1871", ]
"refsource" : "REDHAT", }
"url" : "https://access.redhat.com/errata/RHSA-2017:1871" ]
}, },
{ "references": {
"name" : "95852", "reference_data": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/95852" "name": "1037755",
}, "refsource": "SECTRACK",
{ "url": "http://www.securitytracker.com/id/1037755"
"name" : "1037755", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1037755" "name": "DSA-3775",
} "refsource": "DEBIAN",
] "url": "http://www.debian.org/security/2017/dsa-3775"
} },
} {
"name": "RHSA-2017:1871",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1871"
},
{
"name": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html",
"refsource": "CONFIRM",
"url": "https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html"
},
{
"name": "95852",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95852"
},
{
"name": "GLSA-201702-30",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-30"
}
]
}
}

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-7941", "ID": "CVE-2016-7941",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }