"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 00:52:53 +00:00
parent 8e0d0bb1bc
commit 308978cfd2
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
55 changed files with 4435 additions and 4435 deletions

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-0498", "ID": "CVE-2006-0498",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in PHP GEN before 1.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors." "value": "Multiple cross-site scripting (XSS) vulnerabilities in PHP GEN before 1.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.eyce.be/php_gen/NEWS", "name": "http://www.eyce.be/php_gen/NEWS",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.eyce.be/php_gen/NEWS" "url": "http://www.eyce.be/php_gen/NEWS"
}, },
{ {
"name" : "ADV-2006-0408", "name": "18715",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2006/0408" "url": "http://secunia.com/advisories/18715"
}, },
{ {
"name" : "22884", "name": "22884",
"refsource" : "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/22884" "url": "http://www.osvdb.org/22884"
}, },
{ {
"name" : "18715", "name": "phpgen-parameters-xss(24443)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/18715" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24443"
}, },
{ {
"name" : "phpgen-parameters-xss(24443)", "name": "ADV-2006-0408",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24443" "url": "http://www.vupen.com/english/advisories/2006/0408"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1108", "ID": "CVE-2006-1108",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in news.php in NMDeluxe before 1.0.1 allows remote attackers to execute arbitrary SQL commands via the id parameter." "value": "SQL injection vulnerability in news.php in NMDeluxe before 1.0.1 allows remote attackers to execute arbitrary SQL commands via the id parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20060317 [eVuln] NMDeluxe XSS & SQL Injection Vulnerabilities", "name": "ADV-2006-0860",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/428002/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2006/0860"
}, },
{ {
"name" : "http://evuln.com/vulns/93/summary.html", "name": "17017",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://evuln.com/vulns/93/summary.html" "url": "http://www.securityfocus.com/bid/17017"
}, },
{ {
"name" : "http://nmdeluxe.com/index.php", "name": "595",
"refsource" : "CONFIRM", "refsource": "SREASON",
"url" : "http://nmdeluxe.com/index.php" "url": "http://securityreason.com/securityalert/595"
}, },
{ {
"name" : "17017", "name": "http://evuln.com/vulns/93/summary.html",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/17017" "url": "http://evuln.com/vulns/93/summary.html"
}, },
{ {
"name" : "ADV-2006-0860", "name": "nmdeluxe-news-sql-injection(25070)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2006/0860" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25070"
}, },
{ {
"name" : "19117", "name": "http://nmdeluxe.com/index.php",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/19117" "url": "http://nmdeluxe.com/index.php"
}, },
{ {
"name" : "595", "name": "19117",
"refsource" : "SREASON", "refsource": "SECUNIA",
"url" : "http://securityreason.com/securityalert/595" "url": "http://secunia.com/advisories/19117"
}, },
{ {
"name" : "nmdeluxe-news-sql-injection(25070)", "name": "20060317 [eVuln] NMDeluxe XSS & SQL Injection Vulnerabilities",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25070" "url": "http://www.securityfocus.com/archive/1/428002/100/0/threaded"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1555", "ID": "CVE-2006-1555",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "VSNS Lemon 3.2.0 allows remote attackers to bypass authentication and access password-protected articles by setting the vsns[topic_id] cookie to the targeted topic." "value": "VSNS Lemon 3.2.0 allows remote attackers to bypass authentication and access password-protected articles by setting the vsns[topic_id] cookie to the targeted topic."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20060406 [eVuln] VSNS Lemon Multiple Vulnerabilities", "name": "1015836",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/archive/1/430345/100/0/threaded" "url": "http://securitytracker.com/id?1015836"
}, },
{ {
"name" : "http://evuln.com/vulns/106/description.html", "name": "20060406 [eVuln] VSNS Lemon Multiple Vulnerabilities",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://evuln.com/vulns/106/description.html" "url": "http://www.securityfocus.com/archive/1/430345/100/0/threaded"
}, },
{ {
"name" : "17396", "name": "vsns-lemon-cookie-auth-bypass(25459)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/17396" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25459"
}, },
{ {
"name" : "24213", "name": "17396",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/24213" "url": "http://www.securityfocus.com/bid/17396"
}, },
{ {
"name" : "1015836", "name": "http://evuln.com/vulns/106/description.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://securitytracker.com/id?1015836" "url": "http://evuln.com/vulns/106/description.html"
}, },
{ {
"name" : "19420", "name": "24213",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/19420" "url": "http://www.osvdb.org/24213"
}, },
{ {
"name" : "vsns-lemon-cookie-auth-bypass(25459)", "name": "19420",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25459" "url": "http://secunia.com/advisories/19420"
} }
] ]
} }

View File

@ -1,351 +1,351 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2006-1733", "ID": "CVE-2006-1733",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) \"by inserting an XBL method into the DOM's document.body prototype chain.\"" "value": "Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) \"by inserting an XBL method into the DOM's document.body prototype chain.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-16.html", "name": "USN-275-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-16.html" "url": "https://usn.ubuntu.com/275-1/"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm", "name": "RHSA-2006:0330",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" "url": "http://www.redhat.com/support/errata/RHSA-2006-0330.html"
}, },
{ {
"name" : "DSA-1044", "name": "SSRT061145",
"refsource" : "DEBIAN", "refsource": "HP",
"url" : "http://www.debian.org/security/2006/dsa-1044" "url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
}, },
{ {
"name" : "DSA-1046", "name": "19902",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2006/dsa-1046" "url": "http://secunia.com/advisories/19902"
}, },
{ {
"name" : "DSA-1051", "name": "20060404-01-U",
"refsource" : "DEBIAN", "refsource": "SGI",
"url" : "http://www.debian.org/security/2006/dsa-1051" "url": "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
}, },
{ {
"name" : "FEDORA-2006-410", "name": "USN-276-1",
"refsource" : "FEDORA", "refsource": "UBUNTU",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html" "url": "https://usn.ubuntu.com/276-1/"
}, },
{ {
"name" : "FEDORA-2006-411", "name": "oval:org.mitre.oval:def:10815",
"refsource" : "FEDORA", "refsource": "OVAL",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10815"
}, },
{ {
"name" : "FLSA:189137-1", "name": "HPSBUX02122",
"refsource" : "FEDORA", "refsource": "HP",
"url" : "http://www.securityfocus.com/archive/1/436296/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
}, },
{ {
"name" : "FLSA:189137-2", "name": "19941",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/436338/100/0/threaded" "url": "http://secunia.com/advisories/19941"
}, },
{ {
"name" : "GLSA-200604-12", "name": "19780",
"refsource" : "GENTOO", "refsource": "SECUNIA",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml" "url": "http://secunia.com/advisories/19780"
}, },
{ {
"name" : "GLSA-200604-18", "name": "RHSA-2006:0328",
"refsource" : "GENTOO", "refsource": "REDHAT",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml" "url": "http://www.redhat.com/support/errata/RHSA-2006-0328.html"
}, },
{ {
"name" : "GLSA-200605-09", "name": "19821",
"refsource" : "GENTOO", "refsource": "SECUNIA",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml" "url": "http://secunia.com/advisories/19821"
}, },
{ {
"name" : "HPSBTU02118", "name": "GLSA-200604-12",
"refsource" : "HP", "refsource": "GENTOO",
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded" "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
}, },
{ {
"name" : "SSRT061145", "name": "21622",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded" "url": "http://secunia.com/advisories/21622"
}, },
{ {
"name" : "HPSBUX02122", "name": "19862",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded" "url": "http://secunia.com/advisories/19862"
}, },
{ {
"name" : "SSRT061158", "name": "VU#488774",
"refsource" : "HP", "refsource": "CERT-VN",
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded" "url": "http://www.kb.cert.org/vuls/id/488774"
}, },
{ {
"name" : "MDKSA-2006:075", "name": "MDKSA-2006:075",
"refsource" : "MANDRIVA", "refsource": "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:075" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:075"
}, },
{ {
"name" : "MDKSA-2006:076", "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:076" "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
}, },
{ {
"name" : "MDKSA-2006:078", "name": "19823",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:078" "url": "http://secunia.com/advisories/19823"
}, },
{ {
"name" : "RHSA-2006:0328", "name": "DSA-1051",
"refsource" : "REDHAT", "refsource": "DEBIAN",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0328.html" "url": "http://www.debian.org/security/2006/dsa-1051"
}, },
{ {
"name" : "RHSA-2006:0329", "name": "FEDORA-2006-410",
"refsource" : "REDHAT", "refsource": "FEDORA",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0329.html" "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html"
}, },
{ {
"name" : "RHSA-2006:0330", "name": "USN-271-1",
"refsource" : "REDHAT", "refsource": "UBUNTU",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0330.html" "url": "https://usn.ubuntu.com/271-1/"
}, },
{ {
"name" : "SCOSA-2006.26", "name": "19714",
"refsource" : "SCO", "refsource": "SECUNIA",
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt" "url": "http://secunia.com/advisories/19714"
}, },
{ {
"name" : "20060404-01-U", "name": "RHSA-2006:0329",
"refsource" : "SGI", "refsource": "REDHAT",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc" "url": "http://www.redhat.com/support/errata/RHSA-2006-0329.html"
}, },
{ {
"name" : "102550", "name": "GLSA-200604-18",
"refsource" : "SUNALERT", "refsource": "GENTOO",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1" "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
}, },
{ {
"name" : "228526", "name": "19811",
"refsource" : "SUNALERT", "refsource": "SECUNIA",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1" "url": "http://secunia.com/advisories/19811"
}, },
{ {
"name" : "SUSE-SA:2006:022", "name": "HPSBTU02118",
"refsource" : "SUSE", "refsource": "HP",
"url" : "http://www.novell.com/linux/security/advisories/2006_04_25.html" "url": "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
}, },
{ {
"name" : "SUSE-SA:2006:021", "name": "19794",
"refsource" : "SUSE", "refsource": "SECUNIA",
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html" "url": "http://secunia.com/advisories/19794"
}, },
{ {
"name" : "USN-275-1", "name": "oval:org.mitre.oval:def:2020",
"refsource" : "UBUNTU", "refsource": "OVAL",
"url" : "https://usn.ubuntu.com/275-1/" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2020"
}, },
{ {
"name" : "USN-276-1", "name": "19746",
"refsource" : "UBUNTU", "refsource": "SECUNIA",
"url" : "https://usn.ubuntu.com/276-1/" "url": "http://secunia.com/advisories/19746"
}, },
{ {
"name" : "USN-271-1", "name": "21033",
"refsource" : "UBUNTU", "refsource": "SECUNIA",
"url" : "https://usn.ubuntu.com/271-1/" "url": "http://secunia.com/advisories/21033"
}, },
{ {
"name" : "TA06-107A", "name": "mozilla-valueof-code-execution(25817)",
"refsource" : "CERT", "refsource": "XF",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-107A.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25817"
}, },
{ {
"name" : "VU#488774", "name": "102550",
"refsource" : "CERT-VN", "refsource": "SUNALERT",
"url" : "http://www.kb.cert.org/vuls/id/488774" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
}, },
{ {
"name" : "17516", "name": "19696",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/17516" "url": "http://secunia.com/advisories/19696"
}, },
{ {
"name" : "oval:org.mitre.oval:def:10815", "name": "19759",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10815" "url": "http://secunia.com/advisories/19759"
}, },
{ {
"name" : "ADV-2006-1356", "name": "SUSE-SA:2006:021",
"refsource" : "VUPEN", "refsource": "SUSE",
"url" : "http://www.vupen.com/english/advisories/2006/1356" "url": "http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:2020", "name": "FLSA:189137-2",
"refsource" : "OVAL", "refsource": "FEDORA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2020" "url": "http://www.securityfocus.com/archive/1/436338/100/0/threaded"
}, },
{ {
"name" : "19631", "name": "ADV-2006-1356",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/19631" "url": "http://www.vupen.com/english/advisories/2006/1356"
}, },
{ {
"name" : "19759", "name": "SSRT061158",
"refsource" : "SECUNIA", "refsource": "HP",
"url" : "http://secunia.com/advisories/19759" "url": "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
}, },
{ {
"name" : "19794", "name": "MDKSA-2006:078",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/19794" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:078"
}, },
{ {
"name" : "19821", "name": "19729",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19821" "url": "http://secunia.com/advisories/19729"
}, },
{ {
"name" : "19811", "name": "20051",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19811" "url": "http://secunia.com/advisories/20051"
}, },
{ {
"name" : "19823", "name": "19863",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19823" "url": "http://secunia.com/advisories/19863"
}, },
{ {
"name" : "19852", "name": "SCOSA-2006.26",
"refsource" : "SECUNIA", "refsource": "SCO",
"url" : "http://secunia.com/advisories/19852" "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
}, },
{ {
"name" : "19862", "name": "TA06-107A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/19862" "url": "http://www.us-cert.gov/cas/techalerts/TA06-107A.html"
}, },
{ {
"name" : "19863", "name": "FLSA:189137-1",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/19863" "url": "http://www.securityfocus.com/archive/1/436296/100/0/threaded"
}, },
{ {
"name" : "19902", "name": "17516",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/19902" "url": "http://www.securityfocus.com/bid/17516"
}, },
{ {
"name" : "19950", "name": "228526",
"refsource" : "SECUNIA", "refsource": "SUNALERT",
"url" : "http://secunia.com/advisories/19950" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
}, },
{ {
"name" : "19941", "name": "FEDORA-2006-411",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/19941" "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html"
}, },
{ {
"name" : "19714", "name": "19852",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19714" "url": "http://secunia.com/advisories/19852"
}, },
{ {
"name" : "19721", "name": "19721",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19721" "url": "http://secunia.com/advisories/19721"
}, },
{ {
"name" : "19746", "name": "SUSE-SA:2006:022",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/19746" "url": "http://www.novell.com/linux/security/advisories/2006_04_25.html"
}, },
{ {
"name" : "21033", "name": "GLSA-200605-09",
"refsource" : "SECUNIA", "refsource": "GENTOO",
"url" : "http://secunia.com/advisories/21033" "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml"
}, },
{ {
"name" : "21622", "name": "http://www.mozilla.org/security/announce/2006/mfsa2006-16.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/21622" "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-16.html"
}, },
{ {
"name" : "19696", "name": "19631",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19696" "url": "http://secunia.com/advisories/19631"
}, },
{ {
"name" : "19729", "name": "19950",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19729" "url": "http://secunia.com/advisories/19950"
}, },
{ {
"name" : "19780", "name": "MDKSA-2006:076",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/19780" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:076"
}, },
{ {
"name" : "20051", "name": "DSA-1046",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/20051" "url": "http://www.debian.org/security/2006/dsa-1046"
}, },
{ {
"name" : "mozilla-valueof-code-execution(25817)", "name": "DSA-1044",
"refsource" : "XF", "refsource": "DEBIAN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25817" "url": "http://www.debian.org/security/2006/dsa-1044"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-1792", "ID": "CVE-2006-1792",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337." "value": "Unspecified vulnerability in the POP service in MailEnable Standard Edition before 1.94, Professional Edition before 1.74, and Enterprise Edition before 1.22 has unknown attack vectors and impact related to \"authentication exploits\". NOTE: this is a different set of affected versions, and probably a different vulnerability than CVE-2006-1337."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.mailenable.com/enterprisehistory.asp", "name": "http://www.mailenable.com/professionalhistory.asp",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.mailenable.com/enterprisehistory.asp" "url": "http://www.mailenable.com/professionalhistory.asp"
}, },
{ {
"name" : "http://www.mailenable.com/professionalhistory.asp", "name": "http://www.mailenable.com/enterprisehistory.asp",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.mailenable.com/professionalhistory.asp" "url": "http://www.mailenable.com/enterprisehistory.asp"
}, },
{ {
"name" : "http://www.mailenable.com/standardhistory.asp", "name": "http://www.mailenable.com/standardhistory.asp",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.mailenable.com/standardhistory.asp" "url": "http://www.mailenable.com/standardhistory.asp"
} }
] ]
} }

View File

@ -1,116 +1,116 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5451", "ID": "CVE-2006-5451",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in TorrentFlux 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) action, (2) file, and (3) users array variables in (a) admin.php, which are not properly handled when the administrator views the Activity Log; and the (4) torrent parameter, as used by the displayName variable, in (b) startpop.php, different vectors than CVE-2006-5227." "value": "Multiple cross-site scripting (XSS) vulnerabilities in TorrentFlux 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) action, (2) file, and (3) users array variables in (a) admin.php, which are not properly handled when the administrator views the Activity Log; and the (4) torrent parameter, as used by the displayName variable, in (b) startpop.php, different vectors than CVE-2006-5227."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20061013 TorrentFlux ?startpop.php? ?torrent? Script Insertion", "name": "20061017 TorrentFlux ?file? Script Insertion",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448619/100/100/threaded" "url": "http://www.securityfocus.com/archive/1/448948/100/0/threaded"
}, },
{ {
"name" : "20061017 TorrentFlux ?action? Script Insertion", "name": "ADV-2006-4043",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/448947/100/0/threaded" "url": "http://www.vupen.com/english/advisories/2006/4043"
}, },
{ {
"name" : "20061017 TorrentFlux ?file? Script Insertion", "name": "20061017 TorrentFlux ?action? Script Insertion",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448948/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/448947/100/0/threaded"
}, },
{ {
"name" : "20061017 TorrentFlux ?user_id? Script Insertion", "name": "20061013 TorrentFlux ?startpop.php? ?torrent? Script Insertion",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/448952/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/448619/100/100/threaded"
}, },
{ {
"name" : "http://www.stevenroddis.com.au/2006/10/13/torrentflux-startpopphp-torrent-script-insertion/", "name": "http://www.stevenroddis.com.au/2006/10/13/torrentflux-startpopphp-torrent-script-insertion/",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.stevenroddis.com.au/2006/10/13/torrentflux-startpopphp-torrent-script-insertion/" "url": "http://www.stevenroddis.com.au/2006/10/13/torrentflux-startpopphp-torrent-script-insertion/"
}, },
{ {
"name" : "http://www.stevenroddis.com.au/2006/10/17/torrentflux-action-script-insertion/", "name": "20061017 TorrentFlux ?user_id? Script Insertion",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://www.stevenroddis.com.au/2006/10/17/torrentflux-action-script-insertion/" "url": "http://www.securityfocus.com/archive/1/448952/100/0/threaded"
}, },
{ {
"name" : "http://www.stevenroddis.com.au/2006/10/17/torrentflux-file-script-insertion/", "name": "22384",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.stevenroddis.com.au/2006/10/17/torrentflux-file-script-insertion/" "url": "http://secunia.com/advisories/22384"
}, },
{ {
"name" : "http://www.stevenroddis.com.au/2006/10/17/torrentflux-user_id-script-insertion/", "name": "http://www.stevenroddis.com.au/2006/10/17/torrentflux-user_id-script-insertion/",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.stevenroddis.com.au/2006/10/17/torrentflux-user_id-script-insertion/" "url": "http://www.stevenroddis.com.au/2006/10/17/torrentflux-user_id-script-insertion/"
}, },
{ {
"name" : "20534", "name": "torrentflux-startpop-xss(29592)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/20534" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29592"
}, },
{ {
"name" : "ADV-2006-4043", "name": "20534",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2006/4043" "url": "http://www.securityfocus.com/bid/20534"
}, },
{ {
"name" : "22384", "name": "http://www.stevenroddis.com.au/2006/10/17/torrentflux-file-script-insertion/",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/22384" "url": "http://www.stevenroddis.com.au/2006/10/17/torrentflux-file-script-insertion/"
}, },
{ {
"name" : "torrentflux-startpop-xss(29592)", "name": "http://www.stevenroddis.com.au/2006/10/17/torrentflux-action-script-insertion/",
"refsource" : "XF", "refsource": "MISC",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/29592" "url": "http://www.stevenroddis.com.au/2006/10/17/torrentflux-action-script-insertion/"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5760", "ID": "CVE-2006-5760",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple PHP remote file inclusion vulnerabilities in phpDynaSite 3.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the racine parameter to (1) function_log.php, (2) function_balise_url.php, or (3) connection.php." "value": "Multiple PHP remote file inclusion vulnerabilities in phpDynaSite 3.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the racine parameter to (1) function_log.php, (2) function_balise_url.php, or (3) connection.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "2717", "name": "phpdynasite-racine-file-include(30016)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "https://www.exploit-db.com/exploits/2717" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30016"
}, },
{ {
"name" : "20921", "name": "30183",
"refsource" : "BID", "refsource": "OSVDB",
"url" : "http://www.securityfocus.com/bid/20921" "url": "http://www.osvdb.org/30183"
}, },
{ {
"name" : "ADV-2006-4344", "name": "22710",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2006/4344" "url": "http://secunia.com/advisories/22710"
}, },
{ {
"name" : "30183", "name": "20921",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://www.osvdb.org/30183" "url": "http://www.securityfocus.com/bid/20921"
}, },
{ {
"name" : "30184", "name": "30185",
"refsource" : "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/30184" "url": "http://www.osvdb.org/30185"
}, },
{ {
"name" : "30185", "name": "ADV-2006-4344",
"refsource" : "OSVDB", "refsource": "VUPEN",
"url" : "http://www.osvdb.org/30185" "url": "http://www.vupen.com/english/advisories/2006/4344"
}, },
{ {
"name" : "22710", "name": "2717",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/22710" "url": "https://www.exploit-db.com/exploits/2717"
}, },
{ {
"name" : "phpdynasite-racine-file-include(30016)", "name": "30184",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30016" "url": "http://www.osvdb.org/30184"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2006-5935", "ID": "CVE-2006-5935",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in index.php in ShopSystems 4.0 and earlier allows remote attackers to execute arbitrary SQL commands via the sessid parameter." "value": "SQL injection vulnerability in index.php in ShopSystems 4.0 and earlier allows remote attackers to execute arbitrary SQL commands via the sessid parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20061111 [MajorSecurity Advisory #33]ShopSystems - SQL Injection Issue", "name": "ADV-2006-4511",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/archive/1/451315" "url": "http://www.vupen.com/english/advisories/2006/4511"
}, },
{ {
"name" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls33", "name": "22867",
"refsource" : "MISC", "refsource": "SECUNIA",
"url" : "http://www.majorsecurity.de/index_2.php?major_rls=major_rls33" "url": "http://secunia.com/advisories/22867"
}, },
{ {
"name" : "21005", "name": "shopsystem-index-sql-injection(30219)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/21005" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30219"
}, },
{ {
"name" : "ADV-2006-4511", "name": "21005",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2006/4511" "url": "http://www.securityfocus.com/bid/21005"
}, },
{ {
"name" : "22867", "name": "1871",
"refsource" : "SECUNIA", "refsource": "SREASON",
"url" : "http://secunia.com/advisories/22867" "url": "http://securityreason.com/securityalert/1871"
}, },
{ {
"name" : "1871", "name": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls33",
"refsource" : "SREASON", "refsource": "MISC",
"url" : "http://securityreason.com/securityalert/1871" "url": "http://www.majorsecurity.de/index_2.php?major_rls=major_rls33"
}, },
{ {
"name" : "shopsystem-index-sql-injection(30219)", "name": "20061111 [MajorSecurity Advisory #33]ShopSystems - SQL Injection Issue",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30219" "url": "http://www.securityfocus.com/archive/1/451315"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-2340", "ID": "CVE-2007-2340",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple PHP remote file inclusion vulnerabilities in inc/include_all.inc.php in phporacleview allow remote attackers to execute arbitrary PHP code via a URL in the (1) page_dir or (2) inc_dir parameters." "value": "Multiple PHP remote file inclusion vulnerabilities in inc/include_all.inc.php in phporacleview allow remote attackers to execute arbitrary PHP code via a URL in the (1) page_dir or (2) inc_dir parameters."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "3803", "name": "34300",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "https://www.exploit-db.com/exploits/3803" "url": "http://osvdb.org/34300"
}, },
{ {
"name" : "23672", "name": "3803",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/23672" "url": "https://www.exploit-db.com/exploits/3803"
}, },
{ {
"name" : "ADV-2007-1555", "name": "ADV-2007-1555",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2007/1555" "url": "http://www.vupen.com/english/advisories/2007/1555"
}, },
{ {
"name" : "34300", "name": "23672",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://osvdb.org/34300" "url": "http://www.securityfocus.com/bid/23672"
}, },
{ {
"name" : "25035", "name": "phporacleview-includeallinc-file-include(33904)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/25035" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33904"
}, },
{ {
"name" : "phporacleview-includeallinc-file-include(33904)", "name": "25035",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33904" "url": "http://secunia.com/advisories/25035"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-2965", "ID": "CVE-2007-2965",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and \"access validation of the address space.\"" "value": "Unspecified vulnerability in the Real-time Scanning component in multiple F-Secure products, including Internet Security 2005, 2006 and 2007; Anti-Virus 2005, 2006 and 2007; and Solutions based on F-Secure Protection Service for Consumers 6.40 and earlier allows local users to gain privileges via a crafted I/O request packet (IRP), related to IOCTL (Input/Output Control) and \"access validation of the address space.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.f-secure.com/security/fsc-2007-2.shtml", "name": "1018148",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "http://www.f-secure.com/security/fsc-2007-2.shtml" "url": "http://www.securitytracker.com/id?1018148"
}, },
{ {
"name" : "36727", "name": "1018146",
"refsource" : "OSVDB", "refsource": "SECTRACK",
"url" : "http://osvdb.org/36727" "url": "http://www.securitytracker.com/id?1018146"
}, },
{ {
"name" : "ADV-2007-1985", "name": "http://www.f-secure.com/security/fsc-2007-2.shtml",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2007/1985" "url": "http://www.f-secure.com/security/fsc-2007-2.shtml"
}, },
{ {
"name" : "1018146", "name": "fsecure-realtime-privilege-escalation(34579)",
"refsource" : "SECTRACK", "refsource": "XF",
"url" : "http://www.securitytracker.com/id?1018146" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34579"
}, },
{ {
"name" : "1018148", "name": "ADV-2007-1985",
"refsource" : "SECTRACK", "refsource": "VUPEN",
"url" : "http://www.securitytracker.com/id?1018148" "url": "http://www.vupen.com/english/advisories/2007/1985"
}, },
{ {
"name" : "25439", "name": "36727",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/25439" "url": "http://osvdb.org/36727"
}, },
{ {
"name" : "fsecure-realtime-privilege-escalation(34579)", "name": "25439",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34579" "url": "http://secunia.com/advisories/25439"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-0274", "ID": "CVE-2010-0274",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in the Edit Contact scene in Ultra-light Mode in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 has unknown impact and attack vectors, aka SPR LSHR7TBLY5." "value": "Unspecified vulnerability in the Edit Contact scene in Ultra-light Mode in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.241 for Domino 8.0.2 FP3 has unknown impact and attack vectors, aka SPR LSHR7TBLY5."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27017776", "name": "38026",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27017776" "url": "http://secunia.com/advisories/38026"
}, },
{ {
"name" : "37675", "name": "ADV-2010-0077",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/37675" "url": "http://www.vupen.com/english/advisories/2010/0077"
}, },
{ {
"name" : "38026", "name": "domino-ultralight-unspecified(55470)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/38026" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55470"
}, },
{ {
"name" : "ADV-2010-0077", "name": "37675",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2010/0077" "url": "http://www.securityfocus.com/bid/37675"
}, },
{ {
"name" : "domino-ultralight-unspecified(55470)", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27017776",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55470" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27017776"
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-0381", "ID": "CVE-2010-0381",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in modules/arcade/index.php in PHP MySpace Gold Edition 8.0 and 8.10 allows remote attackers to execute arbitrary SQL commands via the gid parameter in a show_stats action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." "value": "SQL injection vulnerability in modules/arcade/index.php in PHP MySpace Gold Edition 8.0 and 8.10 allows remote attackers to execute arbitrary SQL commands via the gid parameter in a show_stats action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "38245", "name": "38245",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/38245" "url": "http://secunia.com/advisories/38245"
} }
] ]
} }

View File

@ -1,181 +1,181 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-0395", "ID": "CVE-2010-0395",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed." "value": "OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.openoffice.org/security/cves/CVE-2010-0395.html", "name": "MDVSA-2010:221",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "http://www.openoffice.org/security/cves/CVE-2010-0395.html" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:221"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=574119", "name": "60799",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=574119" "url": "http://secunia.com/advisories/60799"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", "name": "GLSA-201408-19",
"refsource" : "CONFIRM", "refsource": "GENTOO",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html" "url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
}, },
{ {
"name" : "DSA-2055", "name": "FEDORA-2010-9633",
"refsource" : "DEBIAN", "refsource": "FEDORA",
"url" : "http://www.debian.org/security/2010/dsa-2055" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html"
}, },
{ {
"name" : "FEDORA-2010-9576", "name": "40070",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html" "url": "http://secunia.com/advisories/40070"
}, },
{ {
"name" : "FEDORA-2010-9628", "name": "ADV-2010-1369",
"refsource" : "FEDORA", "refsource": "VUPEN",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html" "url": "http://www.vupen.com/english/advisories/2010/1369"
}, },
{ {
"name" : "FEDORA-2010-9633", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=574119",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042534.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=574119"
}, },
{ {
"name" : "GLSA-201408-19", "name": "ADV-2010-1350",
"refsource" : "GENTOO", "refsource": "VUPEN",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" "url": "http://www.vupen.com/english/advisories/2010/1350"
}, },
{ {
"name" : "MDVSA-2010:221", "name": "40084",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:221" "url": "http://secunia.com/advisories/40084"
}, },
{ {
"name" : "RHSA-2010:0459", "name": "ADV-2010-1366",
"refsource" : "REDHAT", "refsource": "VUPEN",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0459.html" "url": "http://www.vupen.com/english/advisories/2010/1366"
}, },
{ {
"name" : "SUSE-SR:2010:014", "name": "DSA-2055",
"refsource" : "SUSE", "refsource": "DEBIAN",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" "url": "http://www.debian.org/security/2010/dsa-2055"
}, },
{ {
"name" : "USN-949-1", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://ubuntu.com/usn/usn-949-1" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}, },
{ {
"name" : "TA10-287A", "name": "RHSA-2010:0459",
"refsource" : "CERT", "refsource": "REDHAT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-287A.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0459.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11091", "name": "40104",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091" "url": "http://secunia.com/advisories/40104"
}, },
{ {
"name" : "40084", "name": "ADV-2010-1353",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/40084" "url": "http://www.vupen.com/english/advisories/2010/1353"
}, },
{ {
"name" : "40104", "name": "SUSE-SR:2010:014",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/40104" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
}, },
{ {
"name" : "40107", "name": "oval:org.mitre.oval:def:11091",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/40107" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11091"
}, },
{ {
"name" : "40070", "name": "FEDORA-2010-9576",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/40070" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042468.html"
}, },
{ {
"name" : "60799", "name": "41818",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/60799" "url": "http://secunia.com/advisories/41818"
}, },
{ {
"name" : "41818", "name": "TA10-287A",
"refsource" : "SECUNIA", "refsource": "CERT",
"url" : "http://secunia.com/advisories/41818" "url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html"
}, },
{ {
"name" : "ADV-2010-1353", "name": "USN-949-1",
"refsource" : "VUPEN", "refsource": "UBUNTU",
"url" : "http://www.vupen.com/english/advisories/2010/1353" "url": "http://ubuntu.com/usn/usn-949-1"
}, },
{ {
"name" : "ADV-2010-1366", "name": "FEDORA-2010-9628",
"refsource" : "VUPEN", "refsource": "FEDORA",
"url" : "http://www.vupen.com/english/advisories/2010/1366" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042529.html"
}, },
{ {
"name" : "ADV-2010-1369", "name": "40107",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2010/1369" "url": "http://secunia.com/advisories/40107"
}, },
{ {
"name" : "ADV-2010-1350", "name": "ADV-2010-2905",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1350" "url": "http://www.vupen.com/english/advisories/2010/2905"
}, },
{ {
"name" : "ADV-2010-2905", "name": "http://www.openoffice.org/security/cves/CVE-2010-0395.html",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2010/2905" "url": "http://www.openoffice.org/security/cves/CVE-2010-0395.html"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2010-0532", "ID": "CVE-2010-0532",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse." "value": "Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://support.apple.com/kb/HT4105", "name": "oval:org.mitre.oval:def:7110",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://support.apple.com/kb/HT4105" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7110"
}, },
{ {
"name" : "APPLE-SA-2010-03-30-2", "name": "39135",
"refsource" : "APPLE", "refsource": "SECUNIA",
"url" : "http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html" "url": "http://secunia.com/advisories/39135"
}, },
{ {
"name" : "oval:org.mitre.oval:def:7110", "name": "http://support.apple.com/kb/HT4105",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7110" "url": "http://support.apple.com/kb/HT4105"
}, },
{ {
"name" : "39135", "name": "APPLE-SA-2010-03-30-2",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/39135" "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2010-1279", "ID": "CVE-2010-1279",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple unspecified vulnerabilities in Adobe Photoshop CS4 11.x before 11.0.1 allow user-assisted remote attackers to execute arbitrary code via a crafted TIFF file." "value": "Multiple unspecified vulnerabilities in Adobe Photoshop CS4 11.x before 11.0.1 allow user-assisted remote attackers to execute arbitrary code via a crafted TIFF file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb10-10.html", "name": "http://www.adobe.com/support/security/bulletins/apsb10-10.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb10-10.html" "url": "http://www.adobe.com/support/security/bulletins/apsb10-10.html"
}, },
{ {
"name" : "39849", "name": "39849",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/39849" "url": "http://www.securityfocus.com/bid/39849"
}, },
{ {
"name" : "39711", "name": "39711",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/39711" "url": "http://secunia.com/advisories/39711"
}, },
{ {
"name" : "ADV-2010-1049", "name": "ADV-2010-1049",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/1049" "url": "http://www.vupen.com/english/advisories/2010/1049"
} }
] ]
} }

View File

@ -1,116 +1,116 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2010-1626", "ID": "CVE-2010-1626",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247." "value": "MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20100510 Re: A mysql flaw.", "name": "USN-1397-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "http://www.openwall.com/lists/oss-security/2010/05/10/2" "url": "http://www.ubuntu.com/usn/USN-1397-1"
}, },
{ {
"name" : "[oss-security] 20100518 Re: A mysql flaw.", "name": "40257",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://www.openwall.com/lists/oss-security/2010/05/18/4" "url": "http://www.securityfocus.com/bid/40257"
}, },
{ {
"name" : "http://bugs.mysql.com/bug.php?id=40980", "name": "oval:org.mitre.oval:def:9490",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://bugs.mysql.com/bug.php?id=40980" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
}, },
{ {
"name" : "MDVSA-2010:101", "name": "[oss-security] 20100518 Re: A mysql flaw.",
"refsource" : "MANDRIVA", "refsource": "MLIST",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101" "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4"
}, },
{ {
"name" : "RHSA-2010:0442", "name": "ADV-2010-1194",
"refsource" : "REDHAT", "refsource": "VUPEN",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0442.html" "url": "http://www.vupen.com/english/advisories/2010/1194"
}, },
{ {
"name" : "SUSE-SR:2010:019", "name": "1024004",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" "url": "http://securitytracker.com/id?1024004"
}, },
{ {
"name" : "SUSE-SR:2010:021", "name": "[oss-security] 20100510 Re: A mysql flaw.",
"refsource" : "SUSE", "refsource": "MLIST",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2"
}, },
{ {
"name" : "USN-1397-1", "name": "MDVSA-2010:101",
"refsource" : "UBUNTU", "refsource": "MANDRIVA",
"url" : "http://www.ubuntu.com/usn/USN-1397-1" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101"
}, },
{ {
"name" : "40257", "name": "http://bugs.mysql.com/bug.php?id=40980",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/40257" "url": "http://bugs.mysql.com/bug.php?id=40980"
}, },
{ {
"name" : "oval:org.mitre.oval:def:9490", "name": "RHSA-2010:0442",
"refsource" : "OVAL", "refsource": "REDHAT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490" "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html"
}, },
{ {
"name" : "1024004", "name": "SUSE-SR:2010:021",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://securitytracker.com/id?1024004" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"
}, },
{ {
"name" : "ADV-2010-1194", "name": "SUSE-SR:2010:019",
"refsource" : "VUPEN", "refsource": "SUSE",
"url" : "http://www.vupen.com/english/advisories/2010/1194" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-3136", "ID": "CVE-2010-3136",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file." "value": "Untrusted search path vulnerability in Skype 4.2.0.169 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wab32.dll that is located in the same folder as a .skype file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "14766", "name": "skype-dll-code-execution(64577)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "http://www.exploit-db.com/exploits/14766" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11833", "name": "14766",
"refsource" : "OVAL", "refsource": "EXPLOIT-DB",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833" "url": "http://www.exploit-db.com/exploits/14766"
}, },
{ {
"name" : "skype-dll-code-execution(64577)", "name": "oval:org.mitre.oval:def:11833",
"refsource" : "XF", "refsource": "OVAL",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64577" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11833"
} }
] ]
} }

View File

@ -1,226 +1,226 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID" : "CVE-2010-3569", "ID": "CVE-2010-3569",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times." "value": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "name": "http://support.avaya.com/css/P8/documents/100114327",
"refsource" : "BUGTRAQ", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/archive/1/516397/100/0/threaded" "url": "http://support.avaya.com/css/P8/documents/100114327"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html", "name": "RHSA-2010:0865",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0865.html"
}, },
{ {
"name" : "http://support.avaya.com/css/P8/documents/100114315", "name": "http://support.avaya.com/css/P8/documents/100114315",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://support.avaya.com/css/P8/documents/100114315" "url": "http://support.avaya.com/css/P8/documents/100114315"
}, },
{ {
"name" : "http://support.avaya.com/css/P8/documents/100114327", "name": "GLSA-201406-32",
"refsource" : "CONFIRM", "refsource": "GENTOO",
"url" : "http://support.avaya.com/css/P8/documents/100114327" "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=639925", "name": "HPSBMU02799",
"refsource" : "CONFIRM", "refsource": "HP",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=639925" "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
}, },
{ {
"name" : "http://support.avaya.com/css/P8/documents/100123193", "name": "SUSE-SA:2010:061",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://support.avaya.com/css/P8/documents/100123193" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html", "name": "RHSA-2010:0770",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html"
}, },
{ {
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "name": "SSRT100333",
"refsource" : "CONFIRM", "refsource": "HP",
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
}, },
{ {
"name" : "FEDORA-2010-16240", "name": "RHSA-2010:0768",
"refsource" : "FEDORA", "refsource": "REDHAT",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0768.html"
}, },
{ {
"name" : "FEDORA-2010-16294", "name": "FEDORA-2010-16240",
"refsource" : "FEDORA", "refsource": "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html"
}, },
{ {
"name" : "FEDORA-2010-16312", "name": "USN-1010-1",
"refsource" : "FEDORA", "refsource": "UBUNTU",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html" "url": "http://www.ubuntu.com/usn/USN-1010-1"
}, },
{ {
"name" : "GLSA-201406-32", "name": "oval:org.mitre.oval:def:12234",
"refsource" : "GENTOO", "refsource": "OVAL",
"url" : "http://security.gentoo.org/glsa/glsa-201406-32.xml" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12234"
}, },
{ {
"name" : "HPSBUX02608", "name": "RHSA-2010:0987",
"refsource" : "HP", "refsource": "REDHAT",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748" "url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html"
}, },
{ {
"name" : "SSRT100333", "name": "RHSA-2010:0986",
"refsource" : "HP", "refsource": "REDHAT",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748" "url": "http://www.redhat.com/support/errata/RHSA-2010-0986.html"
}, },
{ {
"name" : "HPSBMU02799", "name": "44954",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=134254866602253&w=2" "url": "http://secunia.com/advisories/44954"
}, },
{ {
"name" : "RHSA-2010:0770", "name": "RHSA-2011:0880",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0770.html" "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
}, },
{ {
"name" : "RHSA-2010:0786", "name": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0786.html" "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
}, },
{ {
"name" : "RHSA-2010:0807", "name": "oval:org.mitre.oval:def:12226",
"refsource" : "REDHAT", "refsource": "OVAL",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0807.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12226"
}, },
{ {
"name" : "RHSA-2010:0768", "name": "RHSA-2010:0873",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0768.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html"
}, },
{ {
"name" : "RHSA-2010:0865", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=639925",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0865.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639925"
}, },
{ {
"name" : "RHSA-2010:0873", "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0873.html" "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
}, },
{ {
"name" : "RHSA-2010:0986", "name": "42974",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0986.html" "url": "http://secunia.com/advisories/42974"
}, },
{ {
"name" : "RHSA-2010:0987", "name": "41972",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0987.html" "url": "http://secunia.com/advisories/41972"
}, },
{ {
"name" : "RHSA-2011:0880", "name": "HPSBUX02608",
"refsource" : "REDHAT", "refsource": "HP",
"url" : "http://www.redhat.com/support/errata/RHSA-2011-0880.html" "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02616748"
}, },
{ {
"name" : "SUSE-SA:2010:061", "name": "http://support.avaya.com/css/P8/documents/100123193",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html" "url": "http://support.avaya.com/css/P8/documents/100123193"
}, },
{ {
"name" : "SUSE-SR:2010:019", "name": "RHSA-2010:0786",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" "url": "http://www.redhat.com/support/errata/RHSA-2010-0786.html"
}, },
{ {
"name" : "USN-1010-1", "name": "SUSE-SR:2010:019",
"refsource" : "UBUNTU", "refsource": "SUSE",
"url" : "http://www.ubuntu.com/usn/USN-1010-1" "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:12226", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12226" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:12234", "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
"refsource" : "OVAL", "refsource": "BUGTRAQ",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12234" "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
}, },
{ {
"name" : "41967", "name": "41967",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/41967" "url": "http://secunia.com/advisories/41967"
}, },
{ {
"name" : "41972", "name": "RHSA-2010:0807",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/41972" "url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html"
}, },
{ {
"name" : "42974", "name": "FEDORA-2010-16312",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/42974" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html"
}, },
{ {
"name" : "44954", "name": "ADV-2010-2745",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/44954" "url": "http://www.vupen.com/english/advisories/2010/2745"
}, },
{ {
"name" : "ADV-2010-2745", "name": "FEDORA-2010-16294",
"refsource" : "VUPEN", "refsource": "FEDORA",
"url" : "http://www.vupen.com/english/advisories/2010/2745" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID" : "CVE-2010-4112", "ID": "CVE-2010-4112",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "HP Insight Management Agents before 8.6 allows remote attackers to obtain sensitive information via an unspecified request that triggers disclosure of the full path." "value": "HP Insight Management Agents before 8.6 allows remote attackers to obtain sensitive information via an unspecified request that triggers disclosure of the full path."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "HPSBMA02616", "name": "SSRT100231",
"refsource" : "HP", "refsource": "HP",
"url" : "http://marc.info/?l=bugtraq&m=129244833127572&w=2" "url": "http://marc.info/?l=bugtraq&m=129244833127572&w=2"
}, },
{ {
"name" : "SSRT100231", "name": "1024898",
"refsource" : "HP", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=129244833127572&w=2" "url": "http://www.securitytracker.com/id?1024898"
}, },
{ {
"name" : "45423", "name": "45423",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/45423" "url": "http://www.securityfocus.com/bid/45423"
}, },
{ {
"name" : "1024898", "name": "HPSBMA02616",
"refsource" : "SECTRACK", "refsource": "HP",
"url" : "http://www.securitytracker.com/id?1024898" "url": "http://marc.info/?l=bugtraq&m=129244833127572&w=2"
}, },
{ {
"name" : "42603", "name": "42603",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/42603" "url": "http://secunia.com/advisories/42603"
}, },
{ {
"name" : "ADV-2010-3248", "name": "ADV-2010-3248",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/3248" "url": "http://www.vupen.com/english/advisories/2010/3248"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-4483", "ID": "CVE-2010-4483",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Google Chrome before 8.0.552.215 does not properly restrict read access to videos derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via a crafted web site." "value": "Google Chrome before 8.0.552.215 does not properly restrict read access to videos derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via a crafted web site."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://technet.microsoft.com/library/security/msvr11-002", "name": "https://technet.microsoft.com/library/security/msvr11-002",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://technet.microsoft.com/library/security/msvr11-002" "url": "https://technet.microsoft.com/library/security/msvr11-002"
}, },
{ {
"name" : "http://code.google.com/p/chromium/issues/detail?id=55745", "name": "42472",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://code.google.com/p/chromium/issues/detail?id=55745" "url": "http://secunia.com/advisories/42472"
}, },
{ {
"name" : "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html", "name": "oval:org.mitre.oval:def:11610",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11610"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11610", "name": "http://code.google.com/p/chromium/issues/detail?id=55745",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11610" "url": "http://code.google.com/p/chromium/issues/detail?id=55745"
}, },
{ {
"name" : "42472", "name": "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/42472" "url": "http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html"
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-4517", "ID": "CVE-2010-4517",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in the JExtensions JE Auto (com_jeauto) component 1.0 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the char parameter in an item action to index.php." "value": "SQL injection vulnerability in the JExtensions JE Auto (com_jeauto) component 1.0 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the char parameter in an item action to index.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "15714", "name": "15714",
"refsource" : "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/15714" "url": "http://www.exploit-db.com/exploits/15714"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-4592", "ID": "CVE-2010-4592",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The Mobile Network Connections functionality in the Connection Manager in IBM Lotus Mobile Connect before 6.1.4, when HTTP Access Services (HTTP-AS) is enabled, does not properly handle failed attempts at establishing HTTP-TCP sessions, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) by making many TCP connection attempts." "value": "The Mobile Network Connections functionality in the Connection Manager in IBM Lotus Mobile Connect before 6.1.4, when HTTP Access Services (HTTP-AS) is enabled, does not properly handle failed attempts at establishing HTTP-TCP sessions, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) by making many TCP connection attempts."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327", "name": "42703",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27020327" "url": "http://secunia.com/advisories/42703"
}, },
{ {
"name" : "IZ74588", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327",
"refsource" : "AIXAPAR", "refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ74588" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27020327"
}, },
{ {
"name" : "42703", "name": "IZ74588",
"refsource" : "SECUNIA", "refsource": "AIXAPAR",
"url" : "http://secunia.com/advisories/42703" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ74588"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-4721", "ID": "CVE-2010-4721",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in news.php in Immo Makler allows remote attackers to execute arbitrary SQL commands via the id parameter." "value": "SQL injection vulnerability in news.php in Immo Makler allows remote attackers to execute arbitrary SQL commands via the id parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "15754", "name": "69950",
"refsource" : "EXPLOIT-DB", "refsource": "OSVDB",
"url" : "http://www.exploit-db.com/exploits/15754" "url": "http://www.osvdb.org/69950"
}, },
{ {
"name" : "69950", "name": "15754",
"refsource" : "OSVDB", "refsource": "EXPLOIT-DB",
"url" : "http://www.osvdb.org/69950" "url": "http://www.exploit-db.com/exploits/15754"
}, },
{ {
"name" : "42676", "name": "42676",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/42676" "url": "http://secunia.com/advisories/42676"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-0022", "ID": "CVE-2014-0022",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package." "value": "The installUpdates function in yum-cron/yum-cron.py in yum 3.4.3 and earlier does not properly check the return value of the sigCheckPkg function, which allows remote attackers to bypass the RMP package signing restriction via an unsigned package."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://yum.baseurl.org/gitweb?p=yum.git;a=commitdiff;h=9df69e5794", "name": "65119",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://yum.baseurl.org/gitweb?p=yum.git;a=commitdiff;h=9df69e5794" "url": "http://www.securityfocus.com/bid/65119"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1052440", "name": "http://yum.baseurl.org/gitweb?p=yum.git;a=commitdiff;h=9df69e5794",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1052440" "url": "http://yum.baseurl.org/gitweb?p=yum.git;a=commitdiff;h=9df69e5794"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1057377", "name": "56637",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1057377" "url": "http://secunia.com/advisories/56637"
}, },
{ {
"name" : "65119", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1052440",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/65119" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1052440"
}, },
{ {
"name" : "56637", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1057377",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/56637" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057377"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-0100", "ID": "CVE-2014-0100",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load." "value": "Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU load."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20140304 CVE-2014-0100 -- Linux kernel: net: inet frag code race condition leading to user-after-free", "name": "[oss-security] 20140304 CVE-2014-0100 -- Linux kernel: net: inet frag code race condition leading to user-after-free",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/03/04/4" "url": "http://www.openwall.com/lists/oss-security/2014/03/04/4"
}, },
{ {
"name" : "http://patchwork.ozlabs.org/patch/325844/", "name": "http://patchwork.ozlabs.org/patch/325844/",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://patchwork.ozlabs.org/patch/325844/" "url": "http://patchwork.ozlabs.org/patch/325844/"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1070618", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1070618",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1070618" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1070618"
} }
] ]
} }

View File

@ -1,146 +1,146 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-0238", "ID": "CVE-2014-0238",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long." "value": "The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.php.net/ChangeLog-5.php", "name": "59329",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.php.net/ChangeLog-5.php" "url": "http://secunia.com/advisories/59329"
}, },
{ {
"name" : "https://bugs.php.net/bug.php?id=67327", "name": "59418",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugs.php.net/bug.php?id=67327" "url": "http://secunia.com/advisories/59418"
}, },
{ {
"name" : "https://github.com/file/file/commit/f97486ef5dc3e8735440edc4fc8808c63e1a3ef0", "name": "https://support.apple.com/HT204659",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://github.com/file/file/commit/f97486ef5dc3e8735440edc4fc8808c63e1a3ef0" "url": "https://support.apple.com/HT204659"
}, },
{ {
"name" : "http://support.apple.com/kb/HT6443", "name": "https://bugs.php.net/bug.php?id=67327",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://support.apple.com/kb/HT6443" "url": "https://bugs.php.net/bug.php?id=67327"
}, },
{ {
"name" : "https://support.apple.com/HT204659", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT204659" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683486"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "name": "RHSA-2014:1766",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-1766.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "name": "https://github.com/file/file/commit/f97486ef5dc3e8735440edc4fc8808c63e1a3ef0",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" "url": "https://github.com/file/file/commit/f97486ef5dc3e8735440edc4fc8808c63e1a3ef0"
}, },
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683486", "name": "DSA-3021",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683486" "url": "http://www.debian.org/security/2014/dsa-3021"
}, },
{ {
"name" : "APPLE-SA-2015-04-08-2", "name": "67765",
"refsource" : "APPLE", "refsource": "BID",
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" "url": "http://www.securityfocus.com/bid/67765"
}, },
{ {
"name" : "DSA-3021", "name": "SUSE-SU-2014:0869",
"refsource" : "DEBIAN", "refsource": "SUSE",
"url" : "http://www.debian.org/security/2014/dsa-3021" "url": "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html"
}, },
{ {
"name" : "RHSA-2014:1765", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1765.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
}, },
{ {
"name" : "RHSA-2014:1766", "name": "59061",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://rhn.redhat.com/errata/RHSA-2014-1766.html" "url": "http://secunia.com/advisories/59061"
}, },
{ {
"name" : "SUSE-SU-2014:0869", "name": "http://www.php.net/ChangeLog-5.php",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html" "url": "http://www.php.net/ChangeLog-5.php"
}, },
{ {
"name" : "67765", "name": "60998",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/67765" "url": "http://secunia.com/advisories/60998"
}, },
{ {
"name" : "60998", "name": "APPLE-SA-2015-04-08-2",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/60998" "url": "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html"
}, },
{ {
"name" : "59061", "name": "http://support.apple.com/kb/HT6443",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/59061" "url": "http://support.apple.com/kb/HT6443"
}, },
{ {
"name" : "59329", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/59329" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
}, },
{ {
"name" : "59418", "name": "RHSA-2014:1765",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/59418" "url": "http://rhn.redhat.com/errata/RHSA-2014-1765.html"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2014-0733", "ID": "CVE-2014-0733",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The Enterprise License Manager (ELM) component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read ELM files via a direct request to a URL, aka Bug ID CSCum46494." "value": "The Enterprise License Manager (ELM) component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read ELM files via a direct request to a URL, aka Bug ID CSCum46494."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32914", "name": "20140218 Cisco Unified Communications Manager Enterprise License Manager Information Disclosure Vulnerability",
"refsource" : "CONFIRM", "refsource": "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=32914" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0733"
}, },
{ {
"name" : "20140218 Cisco Unified Communications Manager Enterprise License Manager Information Disclosure Vulnerability", "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32914",
"refsource" : "CISCO", "refsource": "CONFIRM",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0733" "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32914"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "ics-cert@hq.dhs.gov",
"ID" : "CVE-2014-0789", "ID": "CVE-2014-0789",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple buffer overflows in the OPC Automation 2.0 Server Object ActiveX control in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 3.5 and earlier, TLXCDSTOFS33 3.5 and earlier, TLXCDLUOFS33 3.5 and earlier, TLXCDLTOFS33 3.5 and earlier, and TLXCDLFOFS33 3.5 and earlier allow remote attackers to cause a denial of service via long arguments to unspecified functions." "value": "Multiple buffer overflows in the OPC Automation 2.0 Server Object ActiveX control in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 3.5 and earlier, TLXCDSTOFS33 3.5 and earlier, TLXCDLUOFS33 3.5 and earlier, TLXCDLTOFS33 3.5 and earlier, and TLXCDLFOFS33 3.5 and earlier allow remote attackers to cause a denial of service via long arguments to unspecified functions."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://ics-cert.us-cert.gov/advisories/ICSA-14-093-01", "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-093-01",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://ics-cert.us-cert.gov/advisories/ICSA-14-093-01" "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-093-01"
}, },
{ {
"name" : "http://www.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2014/03/20140325_vulnerability_disclosure_opc_factory_server.xml", "name": "http://www.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2014/03/20140325_vulnerability_disclosure_opc_factory_server.xml",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2014/03/20140325_vulnerability_disclosure_opc_factory_server.xml" "url": "http://www.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2014/03/20140325_vulnerability_disclosure_opc_factory_server.xml"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-10005", "ID": "CVE-2014-10005",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Maian Uploader 4.0 allows remote attackers to obtain sensitive information via a request without the height parameter to load_flv.js.php, which reveals the installation path in an error message." "value": "Maian Uploader 4.0 allows remote attackers to obtain sensitive information via a request without the height parameter to load_flv.js.php, which reveals the installation path in an error message."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.com/files/124918", "name": "102487",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://packetstormsecurity.com/files/124918" "url": "http://www.osvdb.org/102487"
}, },
{ {
"name" : "102487", "name": "http://packetstormsecurity.com/files/124918",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/102487" "url": "http://packetstormsecurity.com/files/124918"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-4321", "ID": "CVE-2014-4321",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2014-8061", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2014-8061",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none."
} }
] ]
} }

View File

@ -1,111 +1,111 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-8102", "ID": "CVE-2014-8102",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value." "value": "The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/", "name": "DSA-3095",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/" "url": "http://www.debian.org/security/2014/dsa-3095"
}, },
{ {
"name" : "http://advisories.mageia.org/MGASA-2014-0532.html", "name": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://advisories.mageia.org/MGASA-2014-0532.html" "url": "http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "name": "http://advisories.mageia.org/MGASA-2014-0532.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" "url": "http://advisories.mageia.org/MGASA-2014-0532.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "name": "GLSA-201504-06",
"refsource" : "CONFIRM", "refsource": "GENTOO",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" "url": "https://security.gentoo.org/glsa/201504-06"
}, },
{ {
"name" : "DSA-3095", "name": "62292",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2014/dsa-3095" "url": "http://secunia.com/advisories/62292"
}, },
{ {
"name" : "GLSA-201504-06", "name": "MDVSA-2015:119",
"refsource" : "GENTOO", "refsource": "MANDRIVA",
"url" : "https://security.gentoo.org/glsa/201504-06" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119"
}, },
{ {
"name" : "MDVSA-2015:119", "name": "71608",
"refsource" : "MANDRIVA", "refsource": "BID",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:119" "url": "http://www.securityfocus.com/bid/71608"
}, },
{ {
"name" : "71608", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/71608" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
}, },
{ {
"name" : "62292", "name": "61947",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/62292" "url": "http://secunia.com/advisories/61947"
}, },
{ {
"name" : "61947", "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/61947" "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-8547", "ID": "CVE-2014-8547",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "libavcodec/gifdec.c in FFmpeg before 2.4.2 does not properly compute image heights, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted GIF data." "value": "libavcodec/gifdec.c in FFmpeg before 2.4.2 does not properly compute image heights, which allows remote attackers to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via crafted GIF data."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8f1457864be8fb9653643519dea1c6492f1dde57", "name": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8f1457864be8fb9653643519dea1c6492f1dde57",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8f1457864be8fb9653643519dea1c6492f1dde57" "url": "http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8f1457864be8fb9653643519dea1c6492f1dde57"
}, },
{ {
"name" : "http://www.ffmpeg.org/security.html", "name": "USN-2534-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://www.ffmpeg.org/security.html" "url": "http://www.ubuntu.com/usn/USN-2534-1"
}, },
{ {
"name" : "GLSA-201603-06", "name": "http://www.ffmpeg.org/security.html",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201603-06" "url": "http://www.ffmpeg.org/security.html"
}, },
{ {
"name" : "USN-2534-1", "name": "GLSA-201603-06",
"refsource" : "UBUNTU", "refsource": "GENTOO",
"url" : "http://www.ubuntu.com/usn/USN-2534-1" "url": "https://security.gentoo.org/glsa/201603-06"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9093", "ID": "CVE-2014-9093",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "LibreOffice before 4.3.5 allows remote attackers to cause a denial of service (invalid write operation and crash) and possibly execute arbitrary code via a crafted RTF file." "value": "LibreOffice before 4.3.5 allows remote attackers to cause a denial of service (invalid write operation and crash) and possibly execute arbitrary code via a crafted RTF file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20141119 CVE Request: LibreOffice -- several issues", "name": "[oss-security] 20141119 CVE Request: LibreOffice -- several issues",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2014/11/19/3" "url": "http://www.openwall.com/lists/oss-security/2014/11/19/3"
}, },
{ {
"name" : "[oss-security] 20141126 Re: CVE Request: LibreOffice -- several issues", "name": "https://bugs.freedesktop.org/show_bug.cgi?id=86449",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2014/11/26/7" "url": "https://bugs.freedesktop.org/show_bug.cgi?id=86449"
}, },
{ {
"name" : "https://bugs.freedesktop.org/show_bug.cgi?id=86449", "name": "FEDORA-2014-15486",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://bugs.freedesktop.org/show_bug.cgi?id=86449" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144836.html"
}, },
{ {
"name" : "DSA-3163", "name": "DSA-3163",
"refsource" : "DEBIAN", "refsource": "DEBIAN",
"url" : "http://www.debian.org/security/2015/dsa-3163" "url": "http://www.debian.org/security/2015/dsa-3163"
}, },
{ {
"name" : "FEDORA-2014-15486", "name": "[oss-security] 20141126 Re: CVE Request: LibreOffice -- several issues",
"refsource" : "FEDORA", "refsource": "MLIST",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144836.html" "url": "http://www.openwall.com/lists/oss-security/2014/11/26/7"
}, },
{ {
"name" : "GLSA-201603-05", "name": "USN-2578-1",
"refsource" : "GENTOO", "refsource": "UBUNTU",
"url" : "https://security.gentoo.org/glsa/201603-05" "url": "http://www.ubuntu.com/usn/USN-2578-1"
}, },
{ {
"name" : "USN-2578-1", "name": "GLSA-201603-05",
"refsource" : "UBUNTU", "refsource": "GENTOO",
"url" : "http://www.ubuntu.com/usn/USN-2578-1" "url": "https://security.gentoo.org/glsa/201603-05"
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2014-9163", "ID": "CVE-2014-9163",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Stack-based buffer overflow in Adobe Flash Player before 13.0.0.259 and 14.x and 15.x before 15.0.0.246 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in December 2014." "value": "Stack-based buffer overflow in Adobe Flash Player before 13.0.0.259 and 14.x and 15.x before 15.0.0.246 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in December 2014."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html", "name": "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html" "url": "http://helpx.adobe.com/security/products/flash-player/apsb14-27.html"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2014-9298", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2014-9298",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9384", "ID": "CVE-2014-9384",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9409", "ID": "CVE-2014-9409",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9435", "ID": "CVE-2014-9435",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple SQL injection vulnerabilities in Absolut Engine 1.73 allow remote authenticated users to execute arbitrary SQL commands via the (1) sectionID parameter to admin/managersection.php, (2) userID parameter to admin/edituser.php, (3) username parameter to admin/admin.php, or (4) title parameter to admin/managerrelated.php." "value": "Multiple SQL injection vulnerabilities in Absolut Engine 1.73 allow remote authenticated users to execute arbitrary SQL commands via the (1) sectionID parameter to admin/managersection.php, (2) userID parameter to admin/edituser.php, (3) username parameter to admin/admin.php, or (4) title parameter to admin/managerrelated.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20141230 Multiple SQL Injections and Reflecting XSS in Absolut Engine v. 1.73 CMS", "name": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-08.html",
"refsource" : "FULLDISC", "refsource": "MISC",
"url" : "http://seclists.org/fulldisclosure/2014/Dec/131" "url": "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-08.html"
}, },
{ {
"name" : "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-08.html", "name": "20141230 Multiple SQL Injections and Reflecting XSS in Absolut Engine v. 1.73 CMS",
"refsource" : "MISC", "refsource": "FULLDISC",
"url" : "http://sroesemann.blogspot.de/2014/12/sroeadv-2014-08.html" "url": "http://seclists.org/fulldisclosure/2014/Dec/131"
}, },
{ {
"name" : "71822", "name": "71822",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/71822" "url": "http://www.securityfocus.com/bid/71822"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-9822", "ID": "CVE-2014-9822",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file." "value": "Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20141224 Imagemagick fuzzing bug", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343478",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2014/12/24/1" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343478"
}, },
{ {
"name" : "[oss-security] 20160602 Re: ImageMagick CVEs", "name": "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=09561d37839dbfa04e017eea14811312985095d8",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2016/06/02/13" "url": "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=09561d37839dbfa04e017eea14811312985095d8"
}, },
{ {
"name" : "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=09561d37839dbfa04e017eea14811312985095d8", "name": "[oss-security] 20160602 Re: ImageMagick CVEs",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=09561d37839dbfa04e017eea14811312985095d8" "url": "http://www.openwall.com/lists/oss-security/2016/06/02/13"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1343478", "name": "[oss-security] 20141224 Imagemagick fuzzing bug",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1343478" "url": "http://www.openwall.com/lists/oss-security/2014/12/24/1"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-3168", "ID": "CVE-2016-3168",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The System module in Drupal 6.x before 6.38 and 7.x before 7.43 might allow remote attackers to hijack the authentication of site administrators for requests that download and run files with arbitrary JSON-encoded content, aka a \"reflected file download vulnerability.\"" "value": "The System module in Drupal 6.x before 6.38 and 7.x before 7.43 might allow remote attackers to hijack the authentication of site administrators for requests that download and run files with arbitrary JSON-encoded content, aka a \"reflected file download vulnerability.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20160224 CVE requests for Drupal core (SA-CORE-2016-001)", "name": "[oss-security] 20160224 CVE requests for Drupal core (SA-CORE-2016-001)",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/02/24/19" "url": "http://www.openwall.com/lists/oss-security/2016/02/24/19"
}, },
{ {
"name" : "[oss-security] 20160315 Re: CVE requests for Drupal core (SA-CORE-2016-001)", "name": "[oss-security] 20160315 Re: CVE requests for Drupal core (SA-CORE-2016-001)",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/03/15/10" "url": "http://www.openwall.com/lists/oss-security/2016/03/15/10"
}, },
{ {
"name" : "https://www.drupal.org/SA-CORE-2016-001", "name": "DSA-3498",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "https://www.drupal.org/SA-CORE-2016-001" "url": "http://www.debian.org/security/2016/dsa-3498"
}, },
{ {
"name" : "DSA-3498", "name": "https://www.drupal.org/SA-CORE-2016-001",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2016/dsa-3498" "url": "https://www.drupal.org/SA-CORE-2016-001"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID" : "CVE-2016-3848", "ID": "CVE-2016-3848",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The NVIDIA media driver in Android before 2016-08-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 28919417." "value": "The NVIDIA media driver in Android before 2016-08-05 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 28919417."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://source.android.com/security/bulletin/2016-08-01.html", "name": "http://source.android.com/security/bulletin/2016-08-01.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://source.android.com/security/bulletin/2016-08-01.html" "url": "http://source.android.com/security/bulletin/2016-08-01.html"
}, },
{ {
"name" : "92231", "name": "92231",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/92231" "url": "http://www.securityfocus.com/bid/92231"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID" : "CVE-2016-3899", "ID": "CVE-2016-3899",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "OMXCodec.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 does not validate a certain pointer, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 29421811." "value": "OMXCodec.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 does not validate a certain pointer, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted media file, aka internal bug 29421811."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://source.android.com/security/bulletin/2016-09-01.html", "name": "92821",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://source.android.com/security/bulletin/2016-09-01.html" "url": "http://www.securityfocus.com/bid/92821"
}, },
{ {
"name" : "https://android.googlesource.com/platform/frameworks/av/+/97837bb6cbac21ea679843a0037779d3834bed64", "name": "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://android.googlesource.com/platform/frameworks/av/+/97837bb6cbac21ea679843a0037779d3834bed64" "url": "http://source.android.com/security/bulletin/2016-09-01.html"
}, },
{ {
"name" : "92821", "name": "https://android.googlesource.com/platform/frameworks/av/+/97837bb6cbac21ea679843a0037779d3834bed64",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/92821" "url": "https://android.googlesource.com/platform/frameworks/av/+/97837bb6cbac21ea679843a0037779d3834bed64"
}, },
{ {
"name" : "1036763", "name": "1036763",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id/1036763" "url": "http://www.securitytracker.com/id/1036763"
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "psirt@us.ibm.com", "ASSIGNER": "psirt@us.ibm.com",
"ID" : "CVE-2016-6037", "ID": "CVE-2016-6037",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Rational Collaborative Lifecycle Management", "product_name": "Rational Collaborative Lifecycle Management",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3" "version_value": "4.0.7, 5.0, 5.0.1, 5.0.2, 6.0, 6.0.1, 6.0.2, 6.0.3"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "IBM Corporation" "vendor_name": "IBM Corporation"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "IBM Rational Team Concert (RTC) is vulnerable to HTML injection. A remote attacker with project administrator privileges could send a project that contains malicious HTML code, which when the project is viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 116918." "value": "IBM Rational Team Concert (RTC) is vulnerable to HTML injection. A remote attacker with project administrator privileges could send a project that contains malicious HTML code, which when the project is viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 116918."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Gain Access" "value": "Gain Access"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.ibm.com/support/docview.wss?uid=swg22002429", "name": "http://www.ibm.com/support/docview.wss?uid=swg22002429",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22002429" "url": "http://www.ibm.com/support/docview.wss?uid=swg22002429"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-6354", "ID": "CVE-2016-6354",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read." "value": "Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20160718 CVE request: flex: Buffer overflow in generated code (yy_get_next_buffer)", "name": "[oss-security] 20160718 CVE request: flex: Buffer overflow in generated code (yy_get_next_buffer)",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/07/18/8" "url": "http://www.openwall.com/lists/oss-security/2016/07/18/8"
}, },
{ {
"name" : "[oss-security] 20160726 Re: CVE request: flex: Buffer overflow in generated code (yy_get_next_buffer)", "name": "[oss-security] 20160726 Re: CVE request: flex: Buffer overflow in generated code (yy_get_next_buffer)",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2016/07/26/12" "url": "http://www.openwall.com/lists/oss-security/2016/07/26/12"
}, },
{ {
"name" : "https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466", "name": "https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466" "url": "https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466"
}, },
{ {
"name" : "DSA-3653", "name": "DSA-3653",
"refsource" : "DEBIAN", "refsource": "DEBIAN",
"url" : "http://www.debian.org/security/2016/dsa-3653" "url": "http://www.debian.org/security/2016/dsa-3653"
}, },
{ {
"name" : "GLSA-201701-31", "name": "GLSA-201701-31",
"refsource" : "GENTOO", "refsource": "GENTOO",
"url" : "https://security.gentoo.org/glsa/201701-31" "url": "https://security.gentoo.org/glsa/201701-31"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "psirt@cisco.com", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2016-6459", "ID": "CVE-2016-6459",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Cisco TelePresence CE and TC 8.1.x", "product_name": "Cisco TelePresence CE and TC 8.1.x",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Cisco TelePresence CE and TC 8.1.x" "version_value": "Cisco TelePresence CE and TC 8.1.x"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cisco TelePresence endpoints running either CE or TC software contain a vulnerability that could allow an authenticated, local attacker to execute a local shell command injection. More Information: CSCvb25010. Known Affected Releases: 8.1.x. Known Fixed Releases: 6.3.4 7.3.7 8.2.2 8.3.0." "value": "Cisco TelePresence endpoints running either CE or TC software contain a vulnerability that could allow an authenticated, local attacker to execute a local shell command injection. More Information: CSCvb25010. Known Affected Releases: 8.1.x. Known Fixed Releases: 6.3.4 7.3.7 8.2.2 8.3.0."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "unspecified" "value": "unspecified"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp" "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-tp"
}, },
{ {
"name" : "94075", "name": "94075",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/94075" "url": "http://www.securityfocus.com/bid/94075"
}, },
{ {
"name" : "1037187", "name": "1037187",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037187" "url": "http://www.securitytracker.com/id/1037187"
} }
] ]
} }

View File

@ -1,75 +1,75 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "security@apache.org", "ASSIGNER": "security@apache.org",
"DATE_PUBLIC" : "2016-10-27T00:00:00", "DATE_PUBLIC": "2016-10-27T00:00:00",
"ID" : "CVE-2016-6813", "ID": "CVE-2016-6813",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Apache CloudStack", "product_name": "Apache CloudStack",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "4.1 to 4.8.1.0" "version_value": "4.1 to 4.8.1.0"
}, },
{ {
"version_value" : "4.9.0.0" "version_value": "4.9.0.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Apache Software Foundation" "vendor_name": "Apache Software Foundation"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-\"root\") CloudStack user, the malicious user may be able to reset the API keys for the other user, in turn accessing their account and resources." "value": "Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-\"root\") CloudStack user, the malicious user may be able to reset the API keys for the other user, in turn accessing their account and resources."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Information Disclosure" "value": "Information Disclosure"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[cloudstack-announce] 20161027 Apache CloudStack Security Releases 4.8.1.1, 4.9.0.1", "name": "[cloudstack-announce] 20161027 Apache CloudStack Security Releases 4.8.1.1, 4.9.0.1",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "https://s.apache.org/qV5l" "url": "https://s.apache.org/qV5l"
}, },
{ {
"name" : "[www-announce] 20161028 [SECURITY] CVE-2016-6813: Apache CloudStack registerUserKeys authorization vulnerability", "name": "93945",
"refsource" : "MLIST", "refsource": "BID",
"url" : "http://mail-archives.apache.org/mod_mbox/www-announce/201610.mbox/%3CCAJtfqCupOYQoNY2BNx86_zauses_MpmpiX8WciO_DEaWp6uNig@mail.gmail.com%3E" "url": "http://www.securityfocus.com/bid/93945"
}, },
{ {
"name" : "93945", "name": "[www-announce] 20161028 [SECURITY] CVE-2016-6813: Apache CloudStack registerUserKeys authorization vulnerability",
"refsource" : "BID", "refsource": "MLIST",
"url" : "http://www.securityfocus.com/bid/93945" "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201610.mbox/%3CCAJtfqCupOYQoNY2BNx86_zauses_MpmpiX8WciO_DEaWp6uNig@mail.gmail.com%3E"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "secure@microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2016-7228", "ID": "CVE-2016-7228",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\"" "value": "Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "MS16-133", "name": "93994",
"refsource" : "MS", "refsource": "BID",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-133" "url": "http://www.securityfocus.com/bid/93994"
}, },
{ {
"name" : "93994", "name": "MS16-133",
"refsource" : "BID", "refsource": "MS",
"url" : "http://www.securityfocus.com/bid/93994" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-133"
}, },
{ {
"name" : "1037246", "name": "1037246",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id/1037246" "url": "http://www.securitytracker.com/id/1037246"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "secure@microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2016-7238", "ID": "CVE-2016-7238",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 mishandle caching for NTLM password-change requests, which allows local users to gain privileges via a crafted application, aka \"Windows NTLM Elevation of Privilege Vulnerability.\"" "value": "Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 mishandle caching for NTLM password-change requests, which allows local users to gain privileges via a crafted application, aka \"Windows NTLM Elevation of Privilege Vulnerability.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "MS16-137", "name": "1037249",
"refsource" : "MS", "refsource": "SECTRACK",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-137" "url": "http://www.securitytracker.com/id/1037249"
}, },
{ {
"name" : "94045", "name": "MS16-137",
"refsource" : "BID", "refsource": "MS",
"url" : "http://www.securityfocus.com/bid/94045" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-137"
}, },
{ {
"name" : "1037249", "name": "94045",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1037249" "url": "http://www.securityfocus.com/bid/94045"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-7370", "ID": "CVE-2016-7370",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "product-security@apple.com", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2016-7618", "ID": "CVE-2016-7618",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the \"Foundation\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted .gcx file." "value": "An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the \"Foundation\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted .gcx file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT207423", "name": "94903",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://support.apple.com/HT207423" "url": "http://www.securityfocus.com/bid/94903"
}, },
{ {
"name" : "94903", "name": "1037469",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/94903" "url": "http://www.securitytracker.com/id/1037469"
}, },
{ {
"name" : "1037469", "name": "https://support.apple.com/HT207423",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037469" "url": "https://support.apple.com/HT207423"
} }
] ]
} }

View File

@ -1,101 +1,101 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "psirt@adobe.com", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2016-7870", "ID": "CVE-2016-7870",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier", "product_name": "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier" "version_value": "Adobe Flash Player 23.0.0.207 and earlier, 11.2.202.644 and earlier"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution." "value": "Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer Overflow / Underflow" "value": "Buffer Overflow / Underflow"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-16-623", "name": "SUSE-SU-2016:3148",
"refsource" : "MISC", "refsource": "SUSE",
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-16-623" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html"
}, },
{ {
"name" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html", "name": "MS16-154",
"refsource" : "CONFIRM", "refsource": "MS",
"url" : "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154"
}, },
{ {
"name" : "GLSA-201701-17", "name": "94871",
"refsource" : "GENTOO", "refsource": "BID",
"url" : "https://security.gentoo.org/glsa/201701-17" "url": "http://www.securityfocus.com/bid/94871"
}, },
{ {
"name" : "MS16-154", "name": "GLSA-201701-17",
"refsource" : "MS", "refsource": "GENTOO",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154" "url": "https://security.gentoo.org/glsa/201701-17"
}, },
{ {
"name" : "RHSA-2016:2947", "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-623",
"refsource" : "REDHAT", "refsource": "MISC",
"url" : "http://rhn.redhat.com/errata/RHSA-2016-2947.html" "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-623"
}, },
{ {
"name" : "SUSE-SU-2016:3148", "name": "1037442",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html" "url": "http://www.securitytracker.com/id/1037442"
}, },
{ {
"name" : "openSUSE-SU-2016:3160", "name": "RHSA-2016:2947",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html" "url": "http://rhn.redhat.com/errata/RHSA-2016-2947.html"
}, },
{ {
"name" : "94871", "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/94871" "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-39.html"
}, },
{ {
"name" : "1037442", "name": "openSUSE-SU-2016:3160",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1037442" "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2016-8085", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2016-8085",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-8122", "ID": "CVE-2016-8122",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,116 +1,116 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "secalert@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2016-8650", "ID": "CVE-2016-8650",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent." "value": "The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20161115 OS-S 2016-21 - Local DoS: Linux Kernel Nullpointer Dereference via keyctl", "name": "https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073",
"refsource" : "FULLDISC", "refsource": "CONFIRM",
"url" : "http://seclists.org/fulldisclosure/2016/Nov/76" "url": "https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073"
}, },
{ {
"name" : "[oss-security] 20161125 Linux kernel: CVE-2016-8650 : Local denial of service with in key subsystem", "name": "1037968",
"refsource" : "MLIST", "refsource": "SECTRACK",
"url" : "http://www.openwall.com/lists/oss-security/2016/11/24/8" "url": "http://www.securitytracker.com/id/1037968"
}, },
{ {
"name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073", "name": "20161115 OS-S 2016-21 - Local DoS: Linux Kernel Nullpointer Dereference via keyctl",
"refsource" : "CONFIRM", "refsource": "FULLDISC",
"url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073" "url": "http://seclists.org/fulldisclosure/2016/Nov/76"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1395187", "name": "[oss-security] 20161125 Linux kernel: CVE-2016-8650 : Local denial of service with in key subsystem",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1395187" "url": "http://www.openwall.com/lists/oss-security/2016/11/24/8"
}, },
{ {
"name" : "https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://github.com/torvalds/linux/commit/f5527fffff3f002b0a6b376163613b82f69de073" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187"
}, },
{ {
"name" : "https://source.android.com/security/bulletin/2017-03-01.html", "name": "RHSA-2018:1854",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://source.android.com/security/bulletin/2017-03-01.html" "url": "https://access.redhat.com/errata/RHSA-2018:1854"
}, },
{ {
"name" : "RHSA-2017:0931", "name": "RHSA-2017:0932",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:0931" "url": "https://access.redhat.com/errata/RHSA-2017:0932"
}, },
{ {
"name" : "RHSA-2017:0932", "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073",
"refsource" : "REDHAT", "refsource": "CONFIRM",
"url" : "https://access.redhat.com/errata/RHSA-2017:0932" "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f5527fffff3f002b0a6b376163613b82f69de073"
}, },
{ {
"name" : "RHSA-2017:0933", "name": "RHSA-2017:0933",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2017:0933" "url": "https://access.redhat.com/errata/RHSA-2017:0933"
}, },
{ {
"name" : "RHSA-2018:1854", "name": "RHSA-2017:0931",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:1854" "url": "https://access.redhat.com/errata/RHSA-2017:0931"
}, },
{ {
"name" : "94532", "name": "94532",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/94532" "url": "http://www.securityfocus.com/bid/94532"
}, },
{ {
"name" : "1037968", "name": "https://source.android.com/security/bulletin/2017-03-01.html",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id/1037968" "url": "https://source.android.com/security/bulletin/2017-03-01.html"
} }
] ]
} }