From 314fcfcafec489a848b4e5cdf3dfab3c70231101 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 3 Aug 2018 14:38:14 -0400 Subject: [PATCH] - Restored 'affects' and 'problemtype' container information accidentally overlooked. --- 2017/14xxx/CVE-2017-14444.json | 8 ++++---- 2017/14xxx/CVE-2017-14445.json | 8 ++++---- 2017/14xxx/CVE-2017-14446.json | 8 ++++---- 2017/16xxx/CVE-2017-16338.json | 8 ++++---- 2017/16xxx/CVE-2017-16339.json | 8 ++++---- 2017/16xxx/CVE-2017-16340.json | 8 ++++---- 2017/16xxx/CVE-2017-16341.json | 8 ++++---- 2017/16xxx/CVE-2017-16342.json | 8 ++++---- 2017/16xxx/CVE-2017-16343.json | 8 ++++---- 2017/16xxx/CVE-2017-16344.json | 8 ++++---- 2017/16xxx/CVE-2017-16345.json | 8 ++++---- 2017/16xxx/CVE-2017-16346.json | 8 ++++---- 2017/16xxx/CVE-2017-16347.json | 8 ++++---- 2017/16xxx/CVE-2017-16349.json | 8 ++++---- 2018/3xxx/CVE-2018-3834.json | 8 ++++---- 15 files changed, 60 insertions(+), 60 deletions(-) diff --git a/2017/14xxx/CVE-2017-14444.json b/2017/14xxx/CVE-2017-14444.json index a3b39140e69..778411dc9b7 100644 --- a/2017/14xxx/CVE-2017-14444.json +++ b/2017/14xxx/CVE-2017-14444.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "buffer overflow" } ] } diff --git a/2017/14xxx/CVE-2017-14445.json b/2017/14xxx/CVE-2017-14445.json index fc139f93db5..86baa7b75fa 100644 --- a/2017/14xxx/CVE-2017-14445.json +++ b/2017/14xxx/CVE-2017-14445.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "buffer overflow" } ] } diff --git a/2017/14xxx/CVE-2017-14446.json b/2017/14xxx/CVE-2017-14446.json index f13c09a6c5c..4ec99d550dc 100644 --- a/2017/14xxx/CVE-2017-14446.json +++ b/2017/14xxx/CVE-2017-14446.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16338.json b/2017/16xxx/CVE-2017-16338.json index 476eb2eb710..e7fcf7b2fdb 100644 --- a/2017/16xxx/CVE-2017-16338.json +++ b/2017/16xxx/CVE-2017-16338.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16339.json b/2017/16xxx/CVE-2017-16339.json index 3616a0750ef..5e3d6a8505e 100644 --- a/2017/16xxx/CVE-2017-16339.json +++ b/2017/16xxx/CVE-2017-16339.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16340.json b/2017/16xxx/CVE-2017-16340.json index d8d82186f3d..204df9140f3 100644 --- a/2017/16xxx/CVE-2017-16340.json +++ b/2017/16xxx/CVE-2017-16340.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16341.json b/2017/16xxx/CVE-2017-16341.json index 3cde96fee0c..9953af0ed3f 100644 --- a/2017/16xxx/CVE-2017-16341.json +++ b/2017/16xxx/CVE-2017-16341.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16342.json b/2017/16xxx/CVE-2017-16342.json index 84ccdb3f090..02cafffa8b1 100644 --- a/2017/16xxx/CVE-2017-16342.json +++ b/2017/16xxx/CVE-2017-16342.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16343.json b/2017/16xxx/CVE-2017-16343.json index a4c067a7f76..fd473da1ff0 100644 --- a/2017/16xxx/CVE-2017-16343.json +++ b/2017/16xxx/CVE-2017-16343.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16344.json b/2017/16xxx/CVE-2017-16344.json index aa33667a5a6..6b1426e2295 100644 --- a/2017/16xxx/CVE-2017-16344.json +++ b/2017/16xxx/CVE-2017-16344.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16345.json b/2017/16xxx/CVE-2017-16345.json index 170954904b0..e308db4b987 100644 --- a/2017/16xxx/CVE-2017-16345.json +++ b/2017/16xxx/CVE-2017-16345.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16346.json b/2017/16xxx/CVE-2017-16346.json index 200614ac044..db4bc85fce9 100644 --- a/2017/16xxx/CVE-2017-16346.json +++ b/2017/16xxx/CVE-2017-16346.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16347.json b/2017/16xxx/CVE-2017-16347.json index 34d3297c8b2..4bfd076992c 100644 --- a/2017/16xxx/CVE-2017-16347.json +++ b/2017/16xxx/CVE-2017-16347.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1012" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Buffer overflow" } ] } diff --git a/2017/16xxx/CVE-2017-16349.json b/2017/16xxx/CVE-2017-16349.json index b368daa2b7b..ee138e2a991 100644 --- a/2017/16xxx/CVE-2017-16349.json +++ b/2017/16xxx/CVE-2017-16349.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "SAP", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "SAP BPC" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Improper Restriction of XML External Entity Reference" } ] } diff --git a/2018/3xxx/CVE-2018-3834.json b/2018/3xxx/CVE-2018-3834.json index abeef49b972..e03ec43a24b 100644 --- a/2018/3xxx/CVE-2018-3834.json +++ b/2018/3xxx/CVE-2018-3834.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Insteon", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "Insteon Hub 2245-222 - Firmware version 1013" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Insteon" } ] } @@ -44,7 +44,7 @@ "description" : [ { "lang" : "eng", - "value" : "n/a" + "value" : "Improper Access Control" } ] }