"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:55:47 +00:00
parent e20d1f8ede
commit 2dd6f92f86
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
47 changed files with 4226 additions and 4226 deletions

View File

@ -1,146 +1,146 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2006-0454", "ID": "CVE-2006-0454",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value." "value": "Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[linux-kernel] 20060207 Linux 2.6.15.3", "name": "18788",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=linux-kernel&m=113927617401569&w=2" "url": "http://secunia.com/advisories/18788"
}, },
{ {
"name" : "[linux-kernel] 20060207 Re: Linux 2.6.15.3", "name": "MDKSA-2006:040",
"refsource" : "MLIST", "refsource": "MANDRIVA",
"url" : "http://marc.info/?l=linux-kernel&m=113927648820694&w=2" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:040"
}, },
{ {
"name" : "[dailydave] 20060207 Fun with Linux (2.6.12 -> 2.6.15.2)", "name": "kernel-icmp-ipoptionsecho-dos(24575)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24575"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3", "name": "18861",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3" "url": "http://secunia.com/advisories/18861"
}, },
{ {
"name" : "FLSA:157459-4", "name": "18774",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/427981/100/0/threaded" "url": "http://secunia.com/advisories/18774"
}, },
{ {
"name" : "FEDORA-2006-102", "name": "2006-0006",
"refsource" : "FEDORA", "refsource": "TRUSTIX",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html" "url": "http://www.trustix.org/errata/2006/0006"
}, },
{ {
"name" : "MDKSA-2006:040", "name": "[linux-kernel] 20060207 Linux 2.6.15.3",
"refsource" : "MANDRIVA", "refsource": "MLIST",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:040" "url": "http://marc.info/?l=linux-kernel&m=113927617401569&w=2"
}, },
{ {
"name" : "SUSE-SA:2006:006", "name": "FEDORA-2006-102",
"refsource" : "SUSE", "refsource": "FEDORA",
"url" : "http://www.novell.com/linux/security/advisories/2006_06_kernel.html" "url": "http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html"
}, },
{ {
"name" : "2006-0006", "name": "SUSE-SA:2006:006",
"refsource" : "TRUSTIX", "refsource": "SUSE",
"url" : "http://www.trustix.org/errata/2006/0006" "url": "http://www.novell.com/linux/security/advisories/2006_06_kernel.html"
}, },
{ {
"name" : "USN-250-1", "name": "FLSA:157459-4",
"refsource" : "UBUNTU", "refsource": "FEDORA",
"url" : "http://www.ubuntu.com/usn/usn-250-1" "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded"
}, },
{ {
"name" : "16532", "name": "ADV-2006-0464",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/16532" "url": "http://www.vupen.com/english/advisories/2006/0464"
}, },
{ {
"name" : "ADV-2006-0464", "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2006/0464" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3"
}, },
{ {
"name" : "18788", "name": "USN-250-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/18788" "url": "http://www.ubuntu.com/usn/usn-250-1"
}, },
{ {
"name" : "18861", "name": "18784",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18861" "url": "http://secunia.com/advisories/18784"
}, },
{ {
"name" : "18766", "name": "16532",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/18766" "url": "http://www.securityfocus.com/bid/16532"
}, },
{ {
"name" : "18774", "name": "[linux-kernel] 20060207 Re: Linux 2.6.15.3",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/18774" "url": "http://marc.info/?l=linux-kernel&m=113927648820694&w=2"
}, },
{ {
"name" : "18784", "name": "[dailydave] 20060207 Fun with Linux (2.6.12 -> 2.6.15.2)",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/18784" "url": "http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html"
}, },
{ {
"name" : "kernel-icmp-ipoptionsecho-dos(24575)", "name": "18766",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24575" "url": "http://secunia.com/advisories/18766"
} }
] ]
} }

View File

@ -1,111 +1,111 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-0616", "ID": "CVE-2006-0616",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in Sun Java JDK and JRE 5.0 Update 4 and earlier allows remote attackers to bypass Java sandbox security and obtain privileges via unspecified vectors involving the reflection APIs, aka the \"fourth issue.\"" "value": "Unspecified vulnerability in Sun Java JDK and JRE 5.0 Update 4 and earlier allows remote attackers to bypass Java sandbox security and obtain privileges via unspecified vectors involving the reflection APIs, aka the \"fourth issue.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://docs.info.apple.com/article.html?artnum=303658", "name": "ADV-2006-0828",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://docs.info.apple.com/article.html?artnum=303658" "url": "http://www.vupen.com/english/advisories/2006/0828"
}, },
{ {
"name" : "GLSA-200602-07", "name": "GLSA-200602-07",
"refsource" : "GENTOO", "refsource": "GENTOO",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200602-07.xml" "url": "http://www.gentoo.org/security/en/glsa/glsa-200602-07.xml"
}, },
{ {
"name" : "102171", "name": "1015596",
"refsource" : "SUNALERT", "refsource": "SECTRACK",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1" "url": "http://securitytracker.com/id?1015596"
}, },
{ {
"name" : "VU#759996", "name": "ADV-2006-0467",
"refsource" : "CERT-VN", "refsource": "VUPEN",
"url" : "http://www.kb.cert.org/vuls/id/759996" "url": "http://www.vupen.com/english/advisories/2006/0467"
}, },
{ {
"name" : "ADV-2006-0467", "name": "18884",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2006/0467" "url": "http://secunia.com/advisories/18884"
}, },
{ {
"name" : "ADV-2006-0828", "name": "sun-jre-reflection-privilege-elevation(24561)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/0828" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24561"
}, },
{ {
"name" : "ADV-2006-1398", "name": "18760",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2006/1398" "url": "http://secunia.com/advisories/18760"
}, },
{ {
"name" : "1015596", "name": "VU#759996",
"refsource" : "SECTRACK", "refsource": "CERT-VN",
"url" : "http://securitytracker.com/id?1015596" "url": "http://www.kb.cert.org/vuls/id/759996"
}, },
{ {
"name" : "18760", "name": "ADV-2006-1398",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/18760" "url": "http://www.vupen.com/english/advisories/2006/1398"
}, },
{ {
"name" : "18884", "name": "http://docs.info.apple.com/article.html?artnum=303658",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/18884" "url": "http://docs.info.apple.com/article.html?artnum=303658"
}, },
{ {
"name" : "sun-jre-reflection-privilege-elevation(24561)", "name": "102171",
"refsource" : "XF", "refsource": "SUNALERT",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24561" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1586", "ID": "CVE-2006-1586",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in admin_login.asp in ISP of Egypt SiteMan allows remote attackers to execute arbitrary SQL commands via the pass parameter." "value": "SQL injection vulnerability in admin_login.asp in ISP of Egypt SiteMan allows remote attackers to execute arbitrary SQL commands via the pass parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20060401 SiteMan <= All version SQL injection in admin_login.asp", "name": "24362",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/429607/100/0/threaded" "url": "http://www.osvdb.org/24362"
}, },
{ {
"name" : "17347", "name": "19500",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/17347" "url": "http://secunia.com/advisories/19500"
}, },
{ {
"name" : "ADV-2006-1190", "name": "ADV-2006-1190",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/1190" "url": "http://www.vupen.com/english/advisories/2006/1190"
}, },
{ {
"name" : "24362", "name": "17347",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/24362" "url": "http://www.securityfocus.com/bid/17347"
}, },
{ {
"name" : "19500", "name": "siteman-adminlogin-sql-injection(25595)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/19500" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25595"
}, },
{ {
"name" : "siteman-adminlogin-sql-injection(25595)", "name": "20060401 SiteMan <= All version SQL injection in admin_login.asp",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25595" "url": "http://www.securityfocus.com/archive/1/429607/100/0/threaded"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1598", "ID": "CVE-2006-1598",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "AN HTTPD 1.42n, and possibly other versions before 1.42p, allows remote attackers to obtain source code of scripts via crafted requests with (1) dot and (2) space characters in the file extension." "value": "AN HTTPD 1.42n, and possibly other versions before 1.42p, allows remote attackers to obtain source code of scripts via crafted requests with (1) dot and (2) space characters in the file extension."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20060403 Secunia Research: AN HTTPD Script Source Disclosure Vulnerability", "name": "24323",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/archive/1/429667/100/0/threaded" "url": "http://www.osvdb.org/24323"
}, },
{ {
"name" : "http://secunia.com/secunia_research/2006-21/advisory", "name": "20060403 Secunia Research: AN HTTPD Script Source Disclosure Vulnerability",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/secunia_research/2006-21/advisory" "url": "http://www.securityfocus.com/archive/1/429667/100/0/threaded"
}, },
{ {
"name" : "17350", "name": "19326",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/17350" "url": "http://secunia.com/advisories/19326"
}, },
{ {
"name" : "ADV-2006-1200", "name": "1015858",
"refsource" : "VUPEN", "refsource": "SECTRACK",
"url" : "http://www.vupen.com/english/advisories/2006/1200" "url": "http://securitytracker.com/id?1015858"
}, },
{ {
"name" : "24323", "name": "http://secunia.com/secunia_research/2006-21/advisory",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/24323" "url": "http://secunia.com/secunia_research/2006-21/advisory"
}, },
{ {
"name" : "1015858", "name": "anhttpd-script-source-disclosure(25591)",
"refsource" : "SECTRACK", "refsource": "XF",
"url" : "http://securitytracker.com/id?1015858" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25591"
}, },
{ {
"name" : "19326", "name": "ADV-2006-1200",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/19326" "url": "http://www.vupen.com/english/advisories/2006/1200"
}, },
{ {
"name" : "anhttpd-script-source-disclosure(25591)", "name": "17350",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25591" "url": "http://www.securityfocus.com/bid/17350"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1785", "ID": "CVE-2006-1785",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Adobe Document Server for Reader Extensions 6.0 allows remote authenticated users to inject arbitrary web script via a leading (1) ftp or (2) http URI in the ReaderURL variable in the \"Update Download Site\" section of ads-readerext. NOTE: it is not clear whether the vendor advisory addresses this issue. In addition, since the issue requires administrative privileges to exploit, it is not clear whether this crosses security boundaries." "value": "Adobe Document Server for Reader Extensions 6.0 allows remote authenticated users to inject arbitrary web script via a leading (1) ftp or (2) http URI in the ReaderURL variable in the \"Update Download Site\" section of ads-readerext. NOTE: it is not clear whether the vendor advisory addresses this issue. In addition, since the issue requires administrative privileges to exploit, it is not clear whether this crosses security boundaries."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20060413 Secunia Research: Adobe Document Server for Reader ExtensionsMultiple Vulnerabilities", "name": "20060413 Secunia Research: Adobe Document Server for Reader ExtensionsMultiple Vulnerabilities",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/430869/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/430869/100/0/threaded"
}, },
{ {
"name" : "http://secunia.com/secunia_research/2005-68/advisory/", "name": "24588",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://secunia.com/secunia_research/2005-68/advisory/" "url": "http://www.osvdb.org/24588"
}, },
{ {
"name" : "http://www.adobe.com/support/techdocs/322699.html", "name": "http://www.adobe.com/support/techdocs/322699.html",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.adobe.com/support/techdocs/322699.html" "url": "http://www.adobe.com/support/techdocs/322699.html"
}, },
{ {
"name" : "17500", "name": "15924",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/17500" "url": "http://secunia.com/advisories/15924"
}, },
{ {
"name" : "ADV-2006-1342", "name": "adobe-readerurl-xss(25770)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/1342" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25770"
}, },
{ {
"name" : "24588", "name": "http://secunia.com/secunia_research/2005-68/advisory/",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/24588" "url": "http://secunia.com/secunia_research/2005-68/advisory/"
}, },
{ {
"name" : "15924", "name": "ADV-2006-1342",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/15924" "url": "http://www.vupen.com/english/advisories/2006/1342"
}, },
{ {
"name" : "adobe-readerurl-xss(25770)", "name": "17500",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25770" "url": "http://www.securityfocus.com/bid/17500"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-4239", "ID": "CVE-2006-4239",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "PHP remote file inclusion vulnerability in include/urights.php in Outreach Project Tool (OPT) Max 1.2.6 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the CRM_inc parameter." "value": "PHP remote file inclusion vulnerability in include/urights.php in Outreach Project Tool (OPT) Max 1.2.6 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the CRM_inc parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "2192", "name": "19548",
"refsource" : "EXPLOIT-DB", "refsource": "BID",
"url" : "https://www.exploit-db.com/exploits/2192" "url": "http://www.securityfocus.com/bid/19548"
}, },
{ {
"name" : "19548", "name": "21517",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/19548" "url": "http://secunia.com/advisories/21517"
}, },
{ {
"name" : "ADV-2006-3296", "name": "ADV-2006-3296",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/3296" "url": "http://www.vupen.com/english/advisories/2006/3296"
}, },
{ {
"name" : "21517", "name": "2192",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/21517" "url": "https://www.exploit-db.com/exploits/2192"
}, },
{ {
"name" : "opt-urights-file-include(28402)", "name": "opt-urights-file-include(28402)",
"refsource" : "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28402" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28402"
} }
] ]
} }

File diff suppressed because it is too large Load Diff

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5524", "ID": "CVE-2006-5524",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in index.php in phplist 2.10.2 allows remote attackers to inject arbitrary web script or HTML via the p parameter. NOTE: This issue might overlap CVE-2006-5321." "value": "Cross-site scripting (XSS) vulnerability in index.php in phplist 2.10.2 allows remote attackers to inject arbitrary web script or HTML via the p parameter. NOTE: This issue might overlap CVE-2006-5321."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20061016 [Xss] IN phplist v 2.10.2, &copy;", "name": "20577",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/448923/100/100/threaded" "url": "http://www.securityfocus.com/bid/20577/info"
}, },
{ {
"name" : "20577", "name": "20061016 [Xss] IN phplist v 2.10.2, &copy;",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/20577/info" "url": "http://www.securityfocus.com/archive/1/448923/100/100/threaded"
}, },
{ {
"name" : "ADV-2006-4084", "name": "22431",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2006/4084" "url": "http://secunia.com/advisories/22431"
}, },
{ {
"name" : "1017102", "name": "1779",
"refsource" : "SECTRACK", "refsource": "SREASON",
"url" : "http://securitytracker.com/alerts/2006/Oct/1017102.html" "url": "http://securityreason.com/securityalert/1779"
}, },
{ {
"name" : "22431", "name": "1017102",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/22431" "url": "http://securitytracker.com/alerts/2006/Oct/1017102.html"
}, },
{ {
"name" : "1779", "name": "ADV-2006-4084",
"refsource" : "SREASON", "refsource": "VUPEN",
"url" : "http://securityreason.com/securityalert/1779" "url": "http://www.vupen.com/english/advisories/2006/4084"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-2064", "ID": "CVE-2010-2064",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,101 +1,101 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2010-2477", "ID": "CVE-2010-2477",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in the paste.httpexceptions implementation in Paste before 1.7.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving a 404 status code, related to (1) paste.urlparser.StaticURLParser, (2) paste.urlparser.PkgResourcesParser, (3) paste.urlmap.URLMap, and (4) HTTPNotFound." "value": "Multiple cross-site scripting (XSS) vulnerabilities in the paste.httpexceptions implementation in Paste before 1.7.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving a 404 status code, related to (1) paste.urlparser.StaticURLParser, (2) paste.urlparser.PkgResourcesParser, (3) paste.urlmap.URLMap, and (4) HTTPNotFound."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20100629 CVE request: XSS in python paste", "name": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=oss-security&m=127785414818815&w=2" "url": "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole"
}, },
{ {
"name" : "[oss-security] 20100630 Re: CVE request: XSS in python paste", "name": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=oss-security&m=127792576822169&w=2" "url": "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56"
}, },
{ {
"name" : "[pylons-discuss] 20100624 Paste 1.7.4, security fix for XSS hole", "name": "41160",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain" "url": "http://www.securityfocus.com/bid/41160"
}, },
{ {
"name" : "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56", "name": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://bitbucket.org/ianb/paste/changeset/fcae59df8b56" "url": "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1"
}, },
{ {
"name" : "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole", "name": "42500",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://pylonshq.com/articles/archives/2010/6/paste_174_released_addresses_xss_security_hole" "url": "http://secunia.com/advisories/42500"
}, },
{ {
"name" : "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1", "name": "USN-1026-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://groups.google.com/group/paste-users/browse_thread/thread/3b3fff3dadd0b1e5?pli=1" "url": "http://www.ubuntu.com/usn/USN-1026-1"
}, },
{ {
"name" : "USN-1026-1", "name": "[pylons-discuss] 20100624 Paste 1.7.4, security fix for XSS hole",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "http://www.ubuntu.com/usn/USN-1026-1" "url": "http://groups.google.com/group/pylons-discuss/msg/8c256dc076a408d8?dmode=source&output=gplain"
}, },
{ {
"name" : "41160", "name": "[oss-security] 20100629 CVE request: XSS in python paste",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/41160" "url": "http://marc.info/?l=oss-security&m=127785414818815&w=2"
}, },
{ {
"name" : "42500", "name": "[oss-security] 20100630 Re: CVE request: XSS in python paste",
"refsource" : "SECUNIA", "refsource": "MLIST",
"url" : "http://secunia.com/advisories/42500" "url": "http://marc.info/?l=oss-security&m=127792576822169&w=2"
} }
] ]
} }

View File

@ -1,116 +1,116 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2010-2492", "ID": "CVE-2010-2492",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors." "value": "Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "name": "RHSA-2010:0723",
"refsource" : "BUGTRAQ", "refsource": "REDHAT",
"url" : "http://www.securityfocus.com/archive/1/520102/100/0/threaded" "url": "http://www.redhat.com/support/errata/RHSA-2010-0723.html"
}, },
{ {
"name" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a6f80fb7b5986fda663d94079d3bba0937a6b6ff", "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a6f80fb7b5986fda663d94079d3bba0937a6b6ff" "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded"
}, },
{ {
"name" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35", "name": "46397",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35" "url": "http://secunia.com/advisories/46397"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=611385", "name": "MDVSA-2010:198",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=611385" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198"
}, },
{ {
"name" : "http://support.avaya.com/css/P8/documents/100113326", "name": "RHSA-2011:0007",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://support.avaya.com/css/P8/documents/100113326" "url": "http://www.redhat.com/support/errata/RHSA-2011-0007.html"
}, },
{ {
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=611385",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=611385"
}, },
{ {
"name" : "MDVSA-2010:172", "name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:172" "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35"
}, },
{ {
"name" : "MDVSA-2010:198", "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a6f80fb7b5986fda663d94079d3bba0937a6b6ff",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a6f80fb7b5986fda663d94079d3bba0937a6b6ff"
}, },
{ {
"name" : "RHSA-2010:0723", "name": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0723.html" "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html"
}, },
{ {
"name" : "RHSA-2011:0007", "name": "http://support.avaya.com/css/P8/documents/100113326",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0007.html" "url": "http://support.avaya.com/css/P8/documents/100113326"
}, },
{ {
"name" : "42890", "name": "42890",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/42890" "url": "http://secunia.com/advisories/42890"
}, },
{ {
"name" : "46397", "name": "MDVSA-2010:172",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/46397" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:172"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2010-2550", "ID": "CVE-2010-2550",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate fields in an SMB request, which allows remote attackers to execute arbitrary code via a crafted SMB packet, aka \"SMB Pool Overflow Vulnerability.\"" "value": "The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate fields in an SMB request, which allows remote attackers to execute arbitrary code via a crafted SMB packet, aka \"SMB Pool Overflow Vulnerability.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "MS10-054", "name": "TA10-222A",
"refsource" : "MS", "refsource": "CERT",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-054" "url": "http://www.us-cert.gov/cas/techalerts/TA10-222A.html"
}, },
{ {
"name" : "TA10-222A", "name": "oval:org.mitre.oval:def:11106",
"refsource" : "CERT", "refsource": "OVAL",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-222A.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11106"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11106", "name": "MS10-054",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11106" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-054"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2010-3229", "ID": "CVE-2010-3229",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka \"TLSv1 Denial of Service Vulnerability.\"" "value": "The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka \"TLSv1 Denial of Service Vulnerability.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://support.avaya.com/css/P8/documents/100113338", "name": "oval:org.mitre.oval:def:6806",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://support.avaya.com/css/P8/documents/100113338" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6806"
}, },
{ {
"name" : "MS10-085", "name": "MS10-085",
"refsource" : "MS", "refsource": "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-085" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-085"
}, },
{ {
"name" : "TA10-285A", "name": "http://support.avaya.com/css/P8/documents/100113338",
"refsource" : "CERT", "refsource": "CONFIRM",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-285A.html" "url": "http://support.avaya.com/css/P8/documents/100113338"
}, },
{ {
"name" : "43780", "name": "TA10-285A",
"refsource" : "BID", "refsource": "CERT",
"url" : "http://www.securityfocus.com/bid/43780" "url": "http://www.us-cert.gov/cas/techalerts/TA10-285A.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:6806", "name": "43780",
"refsource" : "OVAL", "refsource": "BID",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6806" "url": "http://www.securityfocus.com/bid/43780"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2010-3234", "ID": "CVE-2010-3234",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka \"Formula Substream Memory Corruption Vulnerability.\"" "value": "Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka \"Formula Substream Memory Corruption Vulnerability.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "MS10-080", "name": "oval:org.mitre.oval:def:7555",
"refsource" : "MS", "refsource": "OVAL",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-080" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7555"
}, },
{ {
"name" : "TA10-285A", "name": "MS10-080",
"refsource" : "CERT", "refsource": "MS",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-285A.html" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-080"
}, },
{ {
"name" : "oval:org.mitre.oval:def:7555", "name": "TA10-285A",
"refsource" : "OVAL", "refsource": "CERT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7555" "url": "http://www.us-cert.gov/cas/techalerts/TA10-285A.html"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID" : "CVE-2010-3290", "ID": "CVE-2010-3290",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in HP Systems Insight Manager (SIM) before 6.2 allows remote authenticated users to gain privileges via unknown vectors." "value": "Unspecified vulnerability in HP Systems Insight Manager (SIM) before 6.2 allows remote authenticated users to gain privileges via unknown vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "HPSBMA02591", "name": "hp-sim-unspec-priv-esc(62680)",
"refsource" : "HP", "refsource": "XF",
"url" : "http://marc.info/?l=bugtraq&m=128768031706686&w=2" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62680"
}, },
{ {
"name" : "SSRT100299", "name": "HPSBMA02591",
"refsource" : "HP", "refsource": "HP",
"url" : "http://marc.info/?l=bugtraq&m=128768031706686&w=2" "url": "http://marc.info/?l=bugtraq&m=128768031706686&w=2"
}, },
{ {
"name" : "44265", "name": "SSRT100299",
"refsource" : "BID", "refsource": "HP",
"url" : "http://www.securityfocus.com/bid/44265" "url": "http://marc.info/?l=bugtraq&m=128768031706686&w=2"
}, },
{ {
"name" : "1024622", "name": "1024622",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024622" "url": "http://www.securitytracker.com/id?1024622"
}, },
{ {
"name" : "hp-sim-unspec-priv-esc(62680)", "name": "44265",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/62680" "url": "http://www.securityfocus.com/bid/44265"
} }
] ]
} }

View File

@ -1,101 +1,101 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2010-3790", "ID": "CVE-2010-3790",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "QuickTime in Apple Mac OS X 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file that causes an image sample transformation to scale a sprite outside a buffer boundary." "value": "QuickTime in Apple Mac OS X 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file that causes an image sample transformation to scale a sprite outside a buffer boundary."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-11-038/", "name": "http://www.zerodayinitiative.com/advisories/ZDI-11-038/",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-11-038/" "url": "http://www.zerodayinitiative.com/advisories/ZDI-11-038/"
}, },
{ {
"name" : "http://support.apple.com/kb/HT4435", "name": "http://support.apple.com/kb/HT4435",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://support.apple.com/kb/HT4435" "url": "http://support.apple.com/kb/HT4435"
}, },
{ {
"name" : "http://support.apple.com/kb/HT4447", "name": "http://support.apple.com/kb/HT4723",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://support.apple.com/kb/HT4447" "url": "http://support.apple.com/kb/HT4723"
}, },
{ {
"name" : "http://support.apple.com/kb/HT4723", "name": "1024729",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://support.apple.com/kb/HT4723" "url": "http://www.securitytracker.com/id?1024729"
}, },
{ {
"name" : "APPLE-SA-2010-11-10-1", "name": "APPLE-SA-2011-06-23-1",
"refsource" : "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
}, },
{ {
"name" : "APPLE-SA-2010-12-07-1", "name": "APPLE-SA-2010-12-07-1",
"refsource" : "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Dec/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00000.html"
}, },
{ {
"name" : "APPLE-SA-2011-06-23-1", "name": "APPLE-SA-2010-11-10-1",
"refsource" : "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
}, },
{ {
"name" : "44794", "name": "http://support.apple.com/kb/HT4447",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/44794" "url": "http://support.apple.com/kb/HT4447"
}, },
{ {
"name" : "1024729", "name": "44794",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id?1024729" "url": "http://www.securityfocus.com/bid/44794"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2010-4088", "ID": "CVE-2010-4088",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086." "value": "dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a .dir file with \"duplicated references to the same KEY* chunk,\" a different vulnerability than CVE-2010-2581, CVE-2010-4084, CVE-2010-4085, and CVE-2010-4086."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088", "name": "1024664",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/514580/100/0/threaded" "url": "http://www.securitytracker.com/id?1024664"
}, },
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-25.html", "name": "http://www.adobe.com/support/security/bulletins/apsb10-25.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-25.html" "url": "http://www.adobe.com/support/security/bulletins/apsb10-25.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:12169", "name": "oval:org.mitre.oval:def:12169",
"refsource" : "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12169"
}, },
{ {
"name" : "1024664", "name": "20101030 Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-4088",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://www.securitytracker.com/id?1024664" "url": "http://www.securityfocus.com/archive/1/514580/100/0/threaded"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID" : "CVE-2010-4433", "ID": "CVE-2010-4433",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in Oracle Solaris 10 allows remote attackers to affect confidentiality via unknown vectors related to Ethernet and the Driver sub-component." "value": "Unspecified vulnerability in Oracle Solaris 10 allows remote attackers to affect confidentiality via unknown vectors related to Ethernet and the Driver sub-component."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", "name": "solaris-ethernet-info-disclosure(64799)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64799"
}, },
{ {
"name" : "45893", "name": "42984",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/45893" "url": "http://secunia.com/advisories/42984"
}, },
{ {
"name" : "70567", "name": "45893",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://osvdb.org/70567" "url": "http://www.securityfocus.com/bid/45893"
}, },
{ {
"name" : "1024975", "name": "1024975",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id?1024975" "url": "http://www.securitytracker.com/id?1024975"
}, },
{ {
"name" : "42984", "name": "ADV-2011-0151",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/42984" "url": "http://www.vupen.com/english/advisories/2011/0151"
}, },
{ {
"name" : "ADV-2011-0151", "name": "70567",
"refsource" : "VUPEN", "refsource": "OSVDB",
"url" : "http://www.vupen.com/english/advisories/2011/0151" "url": "http://osvdb.org/70567"
}, },
{ {
"name" : "solaris-ethernet-info-disclosure(64799)", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64799" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID" : "CVE-2010-4457", "ID": "CVE-2010-4457",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in Oracle Solaris 11 Express allows remote attackers to affect availability, related to SMB and CIFS." "value": "Unspecified vulnerability in Oracle Solaris 11 Express allows remote attackers to affect availability, related to SMB and CIFS."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", "name": "70587",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html" "url": "http://osvdb.org/70587"
}, },
{ {
"name" : "45864", "name": "45864",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/45864" "url": "http://www.securityfocus.com/bid/45864"
}, },
{ {
"name" : "70587", "name": "1024975",
"refsource" : "OSVDB", "refsource": "SECTRACK",
"url" : "http://osvdb.org/70587" "url": "http://www.securitytracker.com/id?1024975"
}, },
{ {
"name" : "1024975", "name": "ADV-2011-0151",
"refsource" : "SECTRACK", "refsource": "VUPEN",
"url" : "http://www.securitytracker.com/id?1024975" "url": "http://www.vupen.com/english/advisories/2011/0151"
}, },
{ {
"name" : "ADV-2011-0151", "name": "solaris-cifs-dos(64807)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2011/0151" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64807"
}, },
{ {
"name" : "solaris-cifs-dos(64807)", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64807" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-4662", "ID": "CVE-2010-4662",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2011-1189", "ID": "CVE-2011-1189",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Google Chrome before 10.0.648.127 does not properly perform box layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a \"stale node.\"" "value": "Google Chrome before 10.0.648.127 does not properly perform box layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a \"stale node.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=70027", "name": "oval:org.mitre.oval:def:14370",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://code.google.com/p/chromium/issues/detail?id=70027" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14370"
}, },
{ {
"name" : "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html", "name": "46785",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html" "url": "http://www.securityfocus.com/bid/46785"
}, },
{ {
"name" : "46785", "name": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/46785" "url": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14370", "name": "google-box-layouts-dos(65953)",
"refsource" : "OVAL", "refsource": "XF",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14370" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65953"
}, },
{ {
"name" : "ADV-2011-0628", "name": "http://code.google.com/p/chromium/issues/detail?id=70027",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2011/0628" "url": "http://code.google.com/p/chromium/issues/detail?id=70027"
}, },
{ {
"name" : "google-box-layouts-dos(65953)", "name": "ADV-2011-0628",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/65953" "url": "http://www.vupen.com/english/advisories/2011/0628"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2011-1444", "ID": "CVE-2011-1444",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Race condition in the sandbox launcher implementation in Google Chrome before 11.0.696.57 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors." "value": "Race condition in the sandbox launcher implementation in Google Chrome before 11.0.696.57 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=76542", "name": "DSA-2245",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://code.google.com/p/chromium/issues/detail?id=76542" "url": "http://www.debian.org/security/2011/dsa-2245"
}, },
{ {
"name" : "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html", "name": "http://code.google.com/p/chromium/issues/detail?id=76542",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html" "url": "http://code.google.com/p/chromium/issues/detail?id=76542"
}, },
{ {
"name" : "DSA-2245", "name": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2011/dsa-2245" "url": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:14372", "name": "oval:org.mitre.oval:def:14372",
"refsource" : "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14372" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14372"
}, },
{ {
"name" : "chrome-sandbox-launcher-code-exec(67151)", "name": "chrome-sandbox-launcher-code-exec(67151)",
"refsource" : "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/67151" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67151"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2014-3318", "ID": "CVE-2014-3318",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Directory traversal vulnerability in dna/viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via a crafted URL, aka Bug ID CSCup76318." "value": "Directory traversal vulnerability in dna/viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via a crafted URL, aka Bug ID CSCup76318."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34897", "name": "68482",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=34897" "url": "http://www.securityfocus.com/bid/68482"
}, },
{ {
"name" : "20140709 Cisco Unified Communications Manager DNA Path Traversal Vulnerability", "name": "1030554",
"refsource" : "CISCO", "refsource": "SECTRACK",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3318" "url": "http://www.securitytracker.com/id/1030554"
}, },
{ {
"name" : "68482", "name": "20140709 Cisco Unified Communications Manager DNA Path Traversal Vulnerability",
"refsource" : "BID", "refsource": "CISCO",
"url" : "http://www.securityfocus.com/bid/68482" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3318"
}, },
{ {
"name" : "1030554", "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34897",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1030554" "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34897"
}, },
{ {
"name" : "59728", "name": "cucm-cve20143318-dir-traversal(94433)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/59728" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94433"
}, },
{ {
"name" : "cucm-cve20143318-dir-traversal(94433)", "name": "59728",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/94433" "url": "http://secunia.com/advisories/59728"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-3415", "ID": "CVE-2014-3415",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in Sharetronix before 3.4 allows remote authenticated users to execute arbitrary SQL commands via the invite_users[] parameter to the /invite page for a group." "value": "SQL injection vulnerability in Sharetronix before 3.4 allows remote authenticated users to execute arbitrary SQL commands via the invite_users[] parameter to the /invite page for a group."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://www.htbridge.com/advisory/HTB23214", "name": "https://www.htbridge.com/advisory/HTB23214",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://www.htbridge.com/advisory/HTB23214" "url": "https://www.htbridge.com/advisory/HTB23214"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html", "name": "http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html" "url": "http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html"
}, },
{ {
"name" : "67680", "name": "67680",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/67680" "url": "http://www.securityfocus.com/bid/67680"
} }
] ]
} }

View File

@ -1,186 +1,186 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-3669", "ID": "CVE-2014-3669",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value." "value": "Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://git.php.net/?p=php-src.git;a=commit;h=56754a7f9eba0e4f559b6ca081d9f2a447b3f159", "name": "RHSA-2014:1824",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://git.php.net/?p=php-src.git;a=commit;h=56754a7f9eba0e4f559b6ca081d9f2a447b3f159" "url": "http://rhn.redhat.com/errata/RHSA-2014-1824.html"
}, },
{ {
"name" : "http://php.net/ChangeLog-5.php", "name": "59967",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://php.net/ChangeLog-5.php" "url": "http://secunia.com/advisories/59967"
}, },
{ {
"name" : "https://bugs.php.net/bug.php?id=68044", "name": "openSUSE-SU-2014:1391",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://bugs.php.net/bug.php?id=68044" "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00034.html"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1154500", "name": "RHSA-2014:1767",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1154500" "url": "http://rhn.redhat.com/errata/RHSA-2014-1767.html"
}, },
{ {
"name" : "http://linux.oracle.com/errata/ELSA-2014-1767.html", "name": "USN-2391-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://linux.oracle.com/errata/ELSA-2014-1767.html" "url": "http://www.ubuntu.com/usn/USN-2391-1"
}, },
{ {
"name" : "http://linux.oracle.com/errata/ELSA-2014-1768.html", "name": "https://support.apple.com/HT204659",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://linux.oracle.com/errata/ELSA-2014-1768.html" "url": "https://support.apple.com/HT204659"
}, },
{ {
"name" : "https://support.apple.com/HT204659", "name": "openSUSE-SU-2014:1377",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://support.apple.com/HT204659" "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00024.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html", "name": "61982",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html" "url": "http://secunia.com/advisories/61982"
}, },
{ {
"name" : "APPLE-SA-2015-04-08-2", "name": "61763",
"refsource" : "APPLE", "refsource": "SECUNIA",
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" "url": "http://secunia.com/advisories/61763"
}, },
{ {
"name" : "DSA-3064", "name": "http://linux.oracle.com/errata/ELSA-2014-1767.html",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2014/dsa-3064" "url": "http://linux.oracle.com/errata/ELSA-2014-1767.html"
}, },
{ {
"name" : "RHSA-2014:1767", "name": "RHSA-2014:1766",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1767.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
}, },
{ {
"name" : "RHSA-2014:1768", "name": "DSA-3064",
"refsource" : "REDHAT", "refsource": "DEBIAN",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1768.html" "url": "http://www.debian.org/security/2014/dsa-3064"
}, },
{ {
"name" : "RHSA-2014:1765", "name": "http://linux.oracle.com/errata/ELSA-2014-1768.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html" "url": "http://linux.oracle.com/errata/ELSA-2014-1768.html"
}, },
{ {
"name" : "RHSA-2014:1766", "name": "http://git.php.net/?p=php-src.git;a=commit;h=56754a7f9eba0e4f559b6ca081d9f2a447b3f159",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html" "url": "http://git.php.net/?p=php-src.git;a=commit;h=56754a7f9eba0e4f559b6ca081d9f2a447b3f159"
}, },
{ {
"name" : "RHSA-2014:1824", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1824.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
}, },
{ {
"name" : "openSUSE-SU-2014:1377", "name": "http://php.net/ChangeLog-5.php",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-11/msg00024.html" "url": "http://php.net/ChangeLog-5.php"
}, },
{ {
"name" : "openSUSE-SU-2014:1391", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1154500",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2014-11/msg00034.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154500"
}, },
{ {
"name" : "openSUSE-SU-2015:0014", "name": "https://bugs.php.net/bug.php?id=68044",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-01/msg00006.html" "url": "https://bugs.php.net/bug.php?id=68044"
}, },
{ {
"name" : "USN-2391-1", "name": "70611",
"refsource" : "UBUNTU", "refsource": "BID",
"url" : "http://www.ubuntu.com/usn/USN-2391-1" "url": "http://www.securityfocus.com/bid/70611"
}, },
{ {
"name" : "70611", "name": "APPLE-SA-2015-04-08-2",
"refsource" : "BID", "refsource": "APPLE",
"url" : "http://www.securityfocus.com/bid/70611" "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
}, },
{ {
"name" : "59967", "name": "61970",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/59967" "url": "http://secunia.com/advisories/61970"
}, },
{ {
"name" : "60630", "name": "openSUSE-SU-2015:0014",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/60630" "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00006.html"
}, },
{ {
"name" : "60699", "name": "RHSA-2014:1765",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/60699" "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
}, },
{ {
"name" : "61763", "name": "RHSA-2014:1768",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/61763" "url": "http://rhn.redhat.com/errata/RHSA-2014-1768.html"
}, },
{ {
"name" : "61970", "name": "60699",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/61970" "url": "http://secunia.com/advisories/60699"
}, },
{ {
"name" : "61982", "name": "60630",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/61982" "url": "http://secunia.com/advisories/60630"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-3849", "ID": "CVE-2014-3849",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The iMember360 plugin 3.8.012 through 3.9.001 for WordPress does not properly restrict access, which allows remote attackers to delete arbitrary users via a request containing a user name in the Email parameter and the API key in the i4w_clearuser parameter." "value": "The iMember360 plugin 3.8.012 through 3.9.001 for WordPress does not properly restrict access, which allows remote attackers to delete arbitrary users via a request containing a user name in the Email parameter and the API key in the i4w_clearuser parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "33076", "name": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html",
"refsource" : "EXPLOIT-DB", "refsource": "MISC",
"url" : "http://www.exploit-db.com/exploits/33076" "url": "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html"
}, },
{ {
"name" : "20140424 Multiple Vulnerabilities in iMember360 (Wordpress plugin)", "name": "33076",
"refsource" : "FULLDISC", "refsource": "EXPLOIT-DB",
"url" : "http://seclists.org/fulldisclosure/2014/Apr/265" "url": "http://www.exploit-db.com/exploits/33076"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html", "name": "106300",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html" "url": "http://www.osvdb.org/106300"
}, },
{ {
"name" : "106300", "name": "20140424 Multiple Vulnerabilities in iMember360 (Wordpress plugin)",
"refsource" : "OSVDB", "refsource": "FULLDISC",
"url" : "http://www.osvdb.org/106300" "url": "http://seclists.org/fulldisclosure/2014/Apr/265"
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-4590", "ID": "CVE-2014-4590",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in get.php in the WP Microblogs plugin 0.4.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the oauth_verifier parameter." "value": "Cross-site scripting (XSS) vulnerability in get.php in the WP Microblogs plugin 0.4.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the oauth_verifier parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss", "name": "http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss" "url": "http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss"
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2014-8454", "ID": "CVE-2014-8454",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8455 and CVE-2014-9165." "value": "Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8455 and CVE-2014-9165."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://helpx.adobe.com/security/products/reader/apsb14-28.html", "name": "http://helpx.adobe.com/security/products/reader/apsb14-28.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://helpx.adobe.com/security/products/reader/apsb14-28.html" "url": "http://helpx.adobe.com/security/products/reader/apsb14-28.html"
} }
] ]
} }

View File

@ -1,131 +1,131 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-8485", "ID": "CVE-2014-8485",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file." "value": "The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20141026 Re: strings / libbfd crasher", "name": "62241",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2014/10/26/2" "url": "http://secunia.com/advisories/62241"
}, },
{ {
"name" : "http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html", "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=17510",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html" "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17510"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1157276", "name": "MDVSA-2015:029",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1157276" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029"
}, },
{ {
"name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=17510", "name": "USN-2496-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=17510" "url": "http://www.ubuntu.com/usn/USN-2496-1"
}, },
{ {
"name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=493a33860c71cac998f1a56d6d87d6faa801fbaa", "name": "FEDORA-2014-14995",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=493a33860c71cac998f1a56d6d87d6faa801fbaa" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "name": "70741",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://www.securityfocus.com/bid/70741"
}, },
{ {
"name" : "FEDORA-2014-14838", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1157276",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157276"
}, },
{ {
"name" : "FEDORA-2014-14963", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{ {
"name" : "FEDORA-2014-14995", "name": "[oss-security] 20141026 Re: strings / libbfd crasher",
"refsource" : "FEDORA", "refsource": "MLIST",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145328.html" "url": "http://www.openwall.com/lists/oss-security/2014/10/26/2"
}, },
{ {
"name" : "GLSA-201612-24", "name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=493a33860c71cac998f1a56d6d87d6faa801fbaa",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201612-24" "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=493a33860c71cac998f1a56d6d87d6faa801fbaa"
}, },
{ {
"name" : "MDVSA-2015:029", "name": "FEDORA-2014-14963",
"refsource" : "MANDRIVA", "refsource": "FEDORA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:029" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145262.html"
}, },
{ {
"name" : "USN-2496-1", "name": "62746",
"refsource" : "UBUNTU", "refsource": "SECUNIA",
"url" : "http://www.ubuntu.com/usn/USN-2496-1" "url": "http://secunia.com/advisories/62746"
}, },
{ {
"name" : "70741", "name": "FEDORA-2014-14838",
"refsource" : "BID", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/bid/70741" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145742.html"
}, },
{ {
"name" : "62241", "name": "http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/62241" "url": "http://lcamtuf.blogspot.co.uk/2014/10/psa-dont-run-strings-on-untrusted-files.html"
}, },
{ {
"name" : "62746", "name": "GLSA-201612-24",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/62746" "url": "https://security.gentoo.org/glsa/201612-24"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-8955", "ID": "CVE-2014-8955",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in the Contact Form Clean and Simple (clean-and-simple-contact-form-by-meg-nicholas) plugin 4.4.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the cscf[name] parameter to contact-us/." "value": "Cross-site scripting (XSS) vulnerability in the Contact Form Clean and Simple (clean-and-simple-contact-form-by-meg-nicholas) plugin 4.4.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the cscf[name] parameter to contact-us/."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html", "name": "cleansimplecontact-wordpress-cscf-xss(98469)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98469"
}, },
{ {
"name" : "cleansimplecontact-wordpress-cscf-xss(98469)", "name": "http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/98469" "url": "http://packetstormsecurity.com/files/128957/WordPress-Clean-And-Simple-Contact-Form-4.4.0-XSS.html"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9217", "ID": "CVE-2014-9217",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Graylog2 before 0.92 allows remote attackers to bypass LDAP authentication via crafted wildcards." "value": "Graylog2 before 0.92 allows remote attackers to bypass LDAP authentication via crafted wildcards."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20141222 Graylog2-Web LDAP Injection - CVE-2014-9217", "name": "graylog-cve20149217-ldap-injection(99571)",
"refsource" : "MLIST", "refsource": "XF",
"url" : "http://seclists.org/oss-sec/2014/q4/1130" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99571"
}, },
{ {
"name" : "http://www.graylog2.org/news/post/0010-graylog2-v0-92", "name": "http://www.graylog2.org/news/post/0010-graylog2-v0-92",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.graylog2.org/news/post/0010-graylog2-v0-92" "url": "http://www.graylog2.org/news/post/0010-graylog2-v0-92"
}, },
{ {
"name" : "graylog-cve20149217-ldap-injection(99571)", "name": "[oss-security] 20141222 Graylog2-Web LDAP Injection - CVE-2014-9217",
"refsource" : "XF", "refsource": "MLIST",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99571" "url": "http://seclists.org/oss-sec/2014/q4/1130"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9315", "ID": "CVE-2014-9315",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9520", "ID": "CVE-2014-9520",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in execute.php in InfiniteWP Admin Panel before 2.4.4 allows remote attackers to execute arbitrary SQL commands via the historyID parameter." "value": "SQL injection vulnerability in execute.php in InfiniteWP Admin Panel before 2.4.4 allows remote attackers to execute arbitrary SQL commands via the historyID parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20141210 Multiple vulnerabilities in InfiniteWP Admin Panel", "name": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/",
"refsource" : "FULLDISC", "refsource": "MISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/43" "url": "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/"
}, },
{ {
"name" : "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/", "name": "20141210 Multiple vulnerabilities in InfiniteWP Admin Panel",
"refsource" : "MISC", "refsource": "FULLDISC",
"url" : "https://lifeforms.nl/20141210/infinitewp-vulnerabilities/" "url": "http://seclists.org/fulldisclosure/2014/Dec/43"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9719", "ID": "CVE-2014-9719",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9725", "ID": "CVE-2014-9725",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@symantec.com",
"ID" : "CVE-2016-2209", "ID": "CVE-2016-2209",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer overflow in Dec2SS.dll in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code via a crafted file." "value": "Buffer overflow in Dec2SS.dll in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code via a crafted file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "40037", "name": "40037",
"refsource" : "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/40037/" "url": "https://www.exploit-db.com/exploits/40037/"
}, },
{ {
"name" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_00", "name": "1036199",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_00" "url": "http://www.securitytracker.com/id/1036199"
}, },
{ {
"name" : "91436", "name": "1036198",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/91436" "url": "http://www.securitytracker.com/id/1036198"
}, },
{ {
"name" : "1036198", "name": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_00",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1036198" "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_00"
}, },
{ {
"name" : "1036199", "name": "91436",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1036199" "url": "http://www.securityfocus.com/bid/91436"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2016-2596", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2016-2596",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
} }
] ]
} }

View File

@ -1,101 +1,101 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2016-2841", "ID": "CVE-2016-2841",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control." "value": "The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20160302 CVE request Qemu: net: ne2000: infinite loop in ne2000_receive", "name": "[oss-security] 20160302 CVE request Qemu: net: ne2000: infinite loop in ne2000_receive",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/03/02/8" "url": "http://www.openwall.com/lists/oss-security/2016/03/02/8"
}, },
{ {
"name" : "[qemu-devel] 20160226 Re: [PATCH v2] net: ne2000: check ring buffer control registers", "name": "http://git.qemu.org/?p=qemu.git;a=commit;h=415ab35a441eca767d033a2702223e785b9d5190",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg06126.html" "url": "http://git.qemu.org/?p=qemu.git;a=commit;h=415ab35a441eca767d033a2702223e785b9d5190"
}, },
{ {
"name" : "[qemu-stable] 20160329 [Qemu-stable] [ANNOUNCE] QEMU 2.5.1 Stable released", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1303106",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303106"
}, },
{ {
"name" : "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update", "name": "84028",
"refsource" : "MLIST", "refsource": "BID",
"url" : "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html" "url": "http://www.securityfocus.com/bid/84028"
}, },
{ {
"name" : "http://git.qemu.org/?p=qemu.git;a=commit;h=415ab35a441eca767d033a2702223e785b9d5190", "name": "GLSA-201609-01",
"refsource" : "CONFIRM", "refsource": "GENTOO",
"url" : "http://git.qemu.org/?p=qemu.git;a=commit;h=415ab35a441eca767d033a2702223e785b9d5190" "url": "https://security.gentoo.org/glsa/201609-01"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1303106", "name": "[qemu-devel] 20160226 Re: [PATCH v2] net: ne2000: check ring buffer control registers",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1303106" "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg06126.html"
}, },
{ {
"name" : "GLSA-201609-01", "name": "USN-2974-1",
"refsource" : "GENTOO", "refsource": "UBUNTU",
"url" : "https://security.gentoo.org/glsa/201609-01" "url": "http://www.ubuntu.com/usn/USN-2974-1"
}, },
{ {
"name" : "USN-2974-1", "name": "[debian-lts-announce] 20181130 [SECURITY] [DLA 1599-1] qemu security update",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "http://www.ubuntu.com/usn/USN-2974-1" "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
}, },
{ {
"name" : "84028", "name": "[qemu-stable] 20160329 [Qemu-stable] [ANNOUNCE] QEMU 2.5.1 Stable released",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/84028" "url": "http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-2906", "ID": "CVE-2016-2906",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "psirt@cisco.com", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2016-6451", "ID": "CVE-2016-6451",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Cisco Prime Collaboration Provisioning 10.6", "product_name": "Cisco Prime Collaboration Provisioning 10.6",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Cisco Prime Collaboration Provisioning 10.6" "version_value": "Cisco Prime Collaboration Provisioning 10.6"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple vulnerabilities in the web framework code of the Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCut43061 CSCut43066 CSCut43736 CSCut43738 CSCut43741 CSCut43745 CSCut43748 CSCut43751 CSCut43756 CSCut43759 CSCut43764 CSCut43766. Known Affected Releases: 10.6." "value": "Multiple vulnerabilities in the web framework code of the Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCut43061 CSCut43066 CSCut43736 CSCut43738 CSCut43741 CSCut43745 CSCut43748 CSCut43751 CSCut43756 CSCut43759 CSCut43764 CSCut43766. Known Affected Releases: 10.6."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "unspecified" "value": "unspecified"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-pcp", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-pcp",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-pcp" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-pcp"
}, },
{ {
"name" : "93917", "name": "1037112",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/93917" "url": "http://www.securitytracker.com/id/1037112"
}, },
{ {
"name" : "1037112", "name": "93917",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1037112" "url": "http://www.securityfocus.com/bid/93917"
} }
] ]
} }

View File

@ -1,69 +1,69 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "security@google.com", "ASSIGNER": "security@android.com",
"ID" : "CVE-2016-6750", "ID": "CVE-2016-6750",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Android", "product_name": "Android",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Kernel-3.10" "version_value": "Kernel-3.10"
}, },
{ {
"version_value" : "Kernel-3.18" "version_value": "Kernel-3.18"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Google Inc." "vendor_name": "Google Inc."
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An information disclosure vulnerability in Qualcomm components including the GPU driver, power driver, SMSM Point-to-Point driver, and sound driver in Android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Android ID: A-30312054. References: Qualcomm QC-CR#1052825." "value": "An information disclosure vulnerability in Qualcomm components including the GPU driver, power driver, SMSM Point-to-Point driver, and sound driver in Android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Android ID: A-30312054. References: Qualcomm QC-CR#1052825."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Information disclosure" "value": "Information disclosure"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://source.android.com/security/bulletin/2016-11-01.html", "name": "https://source.android.com/security/bulletin/2016-11-01.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://source.android.com/security/bulletin/2016-11-01.html" "url": "https://source.android.com/security/bulletin/2016-11-01.html"
}, },
{ {
"name" : "94139", "name": "94139",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/94139" "url": "http://www.securityfocus.com/bid/94139"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-6877", "ID": "CVE-2016-6877",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** DISPUTED ** Citrix XenMobile Server before 10.5.0.24 allows man-in-the-middle attackers to trigger HTTP 302 redirections via vectors involving the HTTP Host header and a cached page. NOTE: the vendor reports \"our internal analysis of this issue concluded that this was not a valid vulnerability\" because an exploitation scenario would involve a man-in-the-middle attack against a TLS session." "value": "** DISPUTED ** Citrix XenMobile Server before 10.5.0.24 allows man-in-the-middle attackers to trigger HTTP 302 redirections via vectors involving the HTTP Host header and a cached page. NOTE: the vendor reports \"our internal analysis of this issue concluded that this was not a valid vulnerability\" because an exploitation scenario would involve a man-in-the-middle attack against a TLS session."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://www.solutionary.com/threat-intelligence/vulnerability-disclosures/2017/03/citrix-xenmobile-server/", "name": "98341",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://www.solutionary.com/threat-intelligence/vulnerability-disclosures/2017/03/citrix-xenmobile-server/" "url": "http://www.securityfocus.com/bid/98341"
}, },
{ {
"name" : "98341", "name": "https://www.solutionary.com/threat-intelligence/vulnerability-disclosures/2017/03/citrix-xenmobile-server/",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/98341" "url": "https://www.solutionary.com/threat-intelligence/vulnerability-disclosures/2017/03/citrix-xenmobile-server/"
} }
] ]
} }

View File

@ -1,85 +1,85 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "anemec@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2016-7071", "ID": "CVE-2016-7071",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "CFME", "product_name": "CFME",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "5.6.2.2" "version_value": "5.6.2.2"
}, },
{ {
"version_value" : "5.7.0.7" "version_value": "5.7.0.7"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Red Hat" "vendor_name": "Red Hat"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "It was found that the CloudForms before 5.6.2.2, and 5.7.0.7 did not properly apply permissions controls to VM IDs passed by users. A remote, authenticated attacker could use this flaw to execute arbitrary VMs on systems managed by CloudForms if they know the ID of the VM." "value": "It was found that the CloudForms before 5.6.2.2, and 5.7.0.7 did not properly apply permissions controls to VM IDs passed by users. A remote, authenticated attacker could use this flaw to execute arbitrary VMs on systems managed by CloudForms if they know the ID of the VM."
} }
] ]
}, },
"impact" : { "impact": {
"cvss" : [ "cvss": [
[ [
{ {
"vectorString" : "8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString": "8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version" : "3.0" "version": "3.0"
} }
], ],
[ [
{ {
"vectorString" : "9.0/AV:N/AC:L/Au:S/C:C/I:C/A:C", "vectorString": "9.0/AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version" : "2.0" "version": "2.0"
} }
] ]
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "CWE-285" "value": "CWE-285"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7071", "name": "RHSA-2016:2091",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7071" "url": "http://rhn.redhat.com/errata/RHSA-2016-2091.html"
}, },
{ {
"name" : "RHSA-2016:2091", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7071",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2091.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7071"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "product-security@apple.com", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2016-7601", "ID": "CVE-2016-7601",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the \"Local Authentication\" component, which does not honor the configured screen-lock time interval if the Touch ID prompt is visible." "value": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the \"Local Authentication\" component, which does not honor the configured screen-lock time interval if the Touch ID prompt is visible."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207422", "name": "https://support.apple.com/HT207422",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT207422" "url": "https://support.apple.com/HT207422"
}, },
{ {
"name" : "94850", "name": "1037429",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/94850" "url": "http://www.securitytracker.com/id/1037429"
}, },
{ {
"name" : "1037429", "name": "94850",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1037429" "url": "http://www.securityfocus.com/bid/94850"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "product-security@apple.com", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2016-7627", "ID": "CVE-2016-7627",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the \"CoreGraphics\" component. It allows attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted font." "value": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the \"CoreGraphics\" component. It allows attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted font."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207422", "name": "https://support.apple.com/HT207487",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT207422" "url": "https://support.apple.com/HT207487"
}, },
{ {
"name" : "https://support.apple.com/HT207423", "name": "https://support.apple.com/HT207422",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT207423" "url": "https://support.apple.com/HT207422"
}, },
{ {
"name" : "https://support.apple.com/HT207487", "name": "94905",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://support.apple.com/HT207487" "url": "http://www.securityfocus.com/bid/94905"
}, },
{ {
"name" : "94905", "name": "1037469",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/94905" "url": "http://www.securitytracker.com/id/1037469"
}, },
{ {
"name" : "1037469", "name": "https://support.apple.com/HT207423",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037469" "url": "https://support.apple.com/HT207423"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "product-security@apple.com", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2016-7635", "ID": "CVE-2016-7635",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site." "value": "An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207421", "name": "https://support.apple.com/HT207427",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT207421" "url": "https://support.apple.com/HT207427"
}, },
{ {
"name" : "https://support.apple.com/HT207422", "name": "94907",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://support.apple.com/HT207422" "url": "http://www.securityfocus.com/bid/94907"
}, },
{ {
"name" : "https://support.apple.com/HT207424", "name": "https://support.apple.com/HT207421",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT207424" "url": "https://support.apple.com/HT207421"
}, },
{ {
"name" : "https://support.apple.com/HT207427", "name": "1037459",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT207427" "url": "http://www.securitytracker.com/id/1037459"
}, },
{ {
"name" : "GLSA-201706-15", "name": "https://support.apple.com/HT207422",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201706-15" "url": "https://support.apple.com/HT207422"
}, },
{ {
"name" : "94907", "name": "GLSA-201706-15",
"refsource" : "BID", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/bid/94907" "url": "https://security.gentoo.org/glsa/201706-15"
}, },
{ {
"name" : "1037459", "name": "https://support.apple.com/HT207424",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037459" "url": "https://support.apple.com/HT207424"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "vultures@jpcert.or.jp", "ASSIGNER": "vultures@jpcert.or.jp",
"ID" : "CVE-2016-7824", "ID": "CVE-2016-7824",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "WNC01WH", "product_name": "WNC01WH",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "firmware version 1.0.0.8 and earlier" "version_value": "firmware version 1.0.0.8 and earlier"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "BUFFALO INC." "vendor_name": "BUFFALO INC."
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffalo NC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to bypass access restriction to enable the debug option via unspecified vectors." "value": "Buffalo NC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to bypass access restriction to enable the debug option via unspecified vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Fails to restrict access" "value": "Fails to restrict access"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://buffalo.jp/support_s/s20161201.html", "name": "JVN#40613060",
"refsource" : "CONFIRM", "refsource": "JVN",
"url" : "http://buffalo.jp/support_s/s20161201.html" "url": "https://jvn.jp/en/jp/JVN40613060/index.html"
}, },
{ {
"name" : "JVN#40613060", "name": "http://buffalo.jp/support_s/s20161201.html",
"refsource" : "JVN", "refsource": "CONFIRM",
"url" : "https://jvn.jp/en/jp/JVN40613060/index.html" "url": "http://buffalo.jp/support_s/s20161201.html"
}, },
{ {
"name" : "94648", "name": "94648",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/94648" "url": "http://www.securityfocus.com/bid/94648"
} }
] ]
} }