diff --git a/2010/2xxx/CVE-2010-2232.json b/2010/2xxx/CVE-2010-2232.json index 199d52ec18e..f6338104d88 100644 --- a/2010/2xxx/CVE-2010-2232.json +++ b/2010/2xxx/CVE-2010-2232.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache Derby", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "10.1.2.1, 10.2.2.0, 10.3.1.4, 10.4.1.3" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2012/3xxx/CVE-2012-3353.json b/2012/3xxx/CVE-2012-3353.json index f7d9005c281..5eeccd8a07e 100644 --- a/2012/3xxx/CVE-2012-3353.json +++ b/2012/3xxx/CVE-2012-3353.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Sling", + "product_name" : "Apache Sling", "version" : { "version_data" : [ { diff --git a/2013/4xxx/CVE-2013-4317.json b/2013/4xxx/CVE-2013-4317.json index 2bd1913aaa2..be3501f0703 100644 --- a/2013/4xxx/CVE-2013-4317.json +++ b/2013/4xxx/CVE-2013-4317.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CloudStack", + "product_name" : "Apache CloudStack", "version" : { "version_data" : [ { diff --git a/2014/0xxx/CVE-2014-0043.json b/2014/0xxx/CVE-2014-0043.json index 6b38a1f13c7..690a0e771ba 100644 --- a/2014/0xxx/CVE-2014-0043.json +++ b/2014/0xxx/CVE-2014-0043.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Wicket", + "product_name" : "Apache Wicket", "version" : { "version_data" : [ { diff --git a/2015/5xxx/CVE-2015-5241.json b/2015/5xxx/CVE-2015-5241.json index 4730b5c479f..0ed5808c8bd 100644 --- a/2015/5xxx/CVE-2015-5241.json +++ b/2015/5xxx/CVE-2015-5241.json @@ -11,11 +11,11 @@ "product" : { "product_data" : [ { - "product_name" : "jUDDI", + "product_name" : "Apache jUDDI", "version" : { "version_data" : [ { - "version_value" : "3.1.2, 3.1.3, 3.1.4, and 3.1.5 utilize the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'" + "version_value" : "3.1.2, 3.1.3, 3.1.4, and 3.1.5" } ] } diff --git a/2016/0xxx/CVE-2016-0762.json b/2016/0xxx/CVE-2016-0762.json index 014bd14fc26..b63f6f3a977 100644 --- a/2016/0xxx/CVE-2016-0762.json +++ b/2016/0xxx/CVE-2016-0762.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2016/3xxx/CVE-2016-3083.json b/2016/3xxx/CVE-2016-3083.json index 9d600c1d851..f3b2f1729c4 100644 --- a/2016/3xxx/CVE-2016-3083.json +++ b/2016/3xxx/CVE-2016-3083.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hive", + "product_name" : "Apache Hive", "version" : { "version_data" : [ { diff --git a/2016/3xxx/CVE-2016-3086.json b/2016/3xxx/CVE-2016-3086.json index ac7b251f069..f579fbe5a1b 100644 --- a/2016/3xxx/CVE-2016-3086.json +++ b/2016/3xxx/CVE-2016-3086.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2016/4xxx/CVE-2016-4462.json b/2016/4xxx/CVE-2016-4462.json index 57461745261..dbd8597d5d4 100644 --- a/2016/4xxx/CVE-2016-4462.json +++ b/2016/4xxx/CVE-2016-4462.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OFBiz", + "product_name" : "Apache OFBiz", "version" : { "version_data" : [ { diff --git a/2016/5xxx/CVE-2016-5001.json b/2016/5xxx/CVE-2016-5001.json index 97908a63e62..db13c8ef6f4 100644 --- a/2016/5xxx/CVE-2016-5001.json +++ b/2016/5xxx/CVE-2016-5001.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2016/5xxx/CVE-2016-5018.json b/2016/5xxx/CVE-2016-5018.json index 088943e6bef..388fc9fb983 100644 --- a/2016/5xxx/CVE-2016-5018.json +++ b/2016/5xxx/CVE-2016-5018.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2016/5xxx/CVE-2016-5394.json b/2016/5xxx/CVE-2016-5394.json index c3462de27a6..42b9111d336 100644 --- a/2016/5xxx/CVE-2016-5394.json +++ b/2016/5xxx/CVE-2016-5394.json @@ -12,18 +12,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache Sling", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "prior to 1.0.12" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2016/5xxx/CVE-2016-5397.json b/2016/5xxx/CVE-2016-5397.json index e9e8a8aab92..4939268c948 100644 --- a/2016/5xxx/CVE-2016-5397.json +++ b/2016/5xxx/CVE-2016-5397.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Thrift", + "product_name" : "Apache Thrift", "version" : { "version_data" : [ { - "version_value" : "0.9.3 and older, Fixed in Apache Thrift 0.10.0" + "version_value" : "versions prior to 0.10.0" } ] } diff --git a/2016/6xxx/CVE-2016-6794.json b/2016/6xxx/CVE-2016-6794.json index f3af5cafbd9..9cdc48fba67 100644 --- a/2016/6xxx/CVE-2016-6794.json +++ b/2016/6xxx/CVE-2016-6794.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6795.json b/2016/6xxx/CVE-2016-6795.json index 6fe30b5b4ac..af96ac2cf74 100644 --- a/2016/6xxx/CVE-2016-6795.json +++ b/2016/6xxx/CVE-2016-6795.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6796.json b/2016/6xxx/CVE-2016-6796.json index 9336d0f19ea..f1cabf02e56 100644 --- a/2016/6xxx/CVE-2016-6796.json +++ b/2016/6xxx/CVE-2016-6796.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6797.json b/2016/6xxx/CVE-2016-6797.json index d638ccc0444..c6f46311d76 100644 --- a/2016/6xxx/CVE-2016-6797.json +++ b/2016/6xxx/CVE-2016-6797.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6798.json b/2016/6xxx/CVE-2016-6798.json index 9ebfed1f303..ec870e9cb4d 100644 --- a/2016/6xxx/CVE-2016-6798.json +++ b/2016/6xxx/CVE-2016-6798.json @@ -12,18 +12,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache Sling", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "prior to 1.0.12" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2016/6xxx/CVE-2016-6799.json b/2016/6xxx/CVE-2016-6799.json index 2f3553472bf..8491eaec0fa 100644 --- a/2016/6xxx/CVE-2016-6799.json +++ b/2016/6xxx/CVE-2016-6799.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Cordova Android", + "product_name" : "Apache Cordova Android", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6800.json b/2016/6xxx/CVE-2016-6800.json index 5ea10f4a855..8fc6cb462f4 100644 --- a/2016/6xxx/CVE-2016-6800.json +++ b/2016/6xxx/CVE-2016-6800.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OFBiz", + "product_name" : "Apache OFBiz", "version" : { "version_data" : [ { @@ -41,7 +41,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "The default configuration of the OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01." + "value" : "The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01." } ] }, diff --git a/2016/6xxx/CVE-2016-6803.json b/2016/6xxx/CVE-2016-6803.json index 658ecff705c..e6d79725799 100644 --- a/2016/6xxx/CVE-2016-6803.json +++ b/2016/6xxx/CVE-2016-6803.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenOffice", + "product_name" : "Apache OpenOffice", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6806.json b/2016/6xxx/CVE-2016-6806.json index e3cbcbcb30b..5e1f8dcbfef 100644 --- a/2016/6xxx/CVE-2016-6806.json +++ b/2016/6xxx/CVE-2016-6806.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Wicket", + "product_name" : "Apache Wicket", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6810.json b/2016/6xxx/CVE-2016-6810.json index 93a2a2733ac..7171315f9bd 100644 --- a/2016/6xxx/CVE-2016-6810.json +++ b/2016/6xxx/CVE-2016-6810.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "ActiveMQ", + "product_name" : "Apache ActiveMQ", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6813.json b/2016/6xxx/CVE-2016-6813.json index 746d3ecdedd..de5339baceb 100644 --- a/2016/6xxx/CVE-2016-6813.json +++ b/2016/6xxx/CVE-2016-6813.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CloudStack", + "product_name" : "Apache CloudStack", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6815.json b/2016/6xxx/CVE-2016-6815.json index 71340b0819d..1bae621e38b 100644 --- a/2016/6xxx/CVE-2016-6815.json +++ b/2016/6xxx/CVE-2016-6815.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Ranger", + "product_name" : "Apache Ranger", "version" : { "version_data" : [ { diff --git a/2016/6xxx/CVE-2016-6817.json b/2016/6xxx/CVE-2016-6817.json index d6c16bec440..a7af26fa392 100644 --- a/2016/6xxx/CVE-2016-6817.json +++ b/2016/6xxx/CVE-2016-6817.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8734.json b/2016/8xxx/CVE-2016-8734.json index 20425cdabf8..cb6809579ab 100644 --- a/2016/8xxx/CVE-2016-8734.json +++ b/2016/8xxx/CVE-2016-8734.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Subversion", + "product_name" : "Apache Subversion", "version" : { "version_data" : [ { @@ -38,7 +38,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory." + "value" : "Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory." } ] }, diff --git a/2016/8xxx/CVE-2016-8735.json b/2016/8xxx/CVE-2016-8735.json index 31f1162121b..487d612dcc5 100644 --- a/2016/8xxx/CVE-2016-8735.json +++ b/2016/8xxx/CVE-2016-8735.json @@ -15,14 +15,26 @@ "version" : { "version_data" : [ { - "version_value" : "Apache Tomcat" + "version_value" : "before 6.0.48" + }, + { + "version_value" : "7.x before 7.0.73" + }, + { + "version_value" : "8.x before 8.0.39" + }, + { + "version_value" : "8.5.x before 8.5.7" + }, + { + "version_value" : "9.x before 9.0.0.M12" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2016/8xxx/CVE-2016-8736.json b/2016/8xxx/CVE-2016-8736.json index 0dfa4e6a051..2849cc2b730 100644 --- a/2016/8xxx/CVE-2016-8736.json +++ b/2016/8xxx/CVE-2016-8736.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "before 3.1.12" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Apache Openmeetings before 3.1.2 is vulnerable to Remote Code Execution via RMI deserialization attack." + "value" : "Apache OpenMeetings before 3.1.2 is vulnerable to Remote Code Execution via RMI deserialization attack." } ] }, diff --git a/2016/8xxx/CVE-2016-8737.json b/2016/8xxx/CVE-2016-8737.json index c63773e8544..2782fd2c7e6 100644 --- a/2016/8xxx/CVE-2016-8737.json +++ b/2016/8xxx/CVE-2016-8737.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Brooklyn", + "product_name" : "Apache Brooklyn", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8738.json b/2016/8xxx/CVE-2016-8738.json index d93053bcfe0..0cdace2f50c 100644 --- a/2016/8xxx/CVE-2016-8738.json +++ b/2016/8xxx/CVE-2016-8738.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8739.json b/2016/8xxx/CVE-2016-8739.json index b7e6609fdf7..cc5a12a558a 100644 --- a/2016/8xxx/CVE-2016-8739.json +++ b/2016/8xxx/CVE-2016-8739.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CXF", + "product_name" : "Apache CXF", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8740.json b/2016/8xxx/CVE-2016-8740.json index 0dd9eb9e6e5..328256a9490 100644 --- a/2016/8xxx/CVE-2016-8740.json +++ b/2016/8xxx/CVE-2016-8740.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache HTTP Server", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "2.4.17 - 2.4.23" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2016/8xxx/CVE-2016-8741.json b/2016/8xxx/CVE-2016-8741.json index dbfb22d14e1..382a4a2c938 100644 --- a/2016/8xxx/CVE-2016-8741.json +++ b/2016/8xxx/CVE-2016-8741.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Apache Qpid Broker for Java", + "product_name" : "Apache Qpid Broker-J", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8742.json b/2016/8xxx/CVE-2016-8742.json index af45d6a1ca4..092474171d9 100644 --- a/2016/8xxx/CVE-2016-8742.json +++ b/2016/8xxx/CVE-2016-8742.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CouchDB", + "product_name" : "Apache CouchDB", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8744.json b/2016/8xxx/CVE-2016-8744.json index 3dd243eb01e..81934a35f2a 100644 --- a/2016/8xxx/CVE-2016-8744.json +++ b/2016/8xxx/CVE-2016-8744.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Brooklyn", + "product_name" : "Apache Brooklyn", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8745.json b/2016/8xxx/CVE-2016-8745.json index 27de3ee52fc..978c791927c 100644 --- a/2016/8xxx/CVE-2016-8745.json +++ b/2016/8xxx/CVE-2016-8745.json @@ -12,11 +12,23 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { - "version_value" : "9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73, 6.0.16 to 6.0.48" + "version_value" : "9.0.0.M1 to 9.0.0.M13" + }, + { + "version_value" : "8.5.0 to 8.5.8" + }, + { + "version_value" : "8.0.0.RC1 to 8.0.39" + }, + { + "version_value" : "7.0.0 to 7.0.73" + }, + { + "version_value" : "6.0.16 to 6.0.48" } ] } diff --git a/2016/8xxx/CVE-2016-8746.json b/2016/8xxx/CVE-2016-8746.json index 000171e2d74..36a0fc783d7 100644 --- a/2016/8xxx/CVE-2016-8746.json +++ b/2016/8xxx/CVE-2016-8746.json @@ -11,11 +11,11 @@ "product" : { "product_data" : [ { - "product_name" : "Ranger", + "product_name" : "Apache Ranger", "version" : { "version_data" : [ { - "version_value" : "0.6.0/0.6.1/0.6.2" + "version_value" : "0.6.0 - 0.6.2" } ] } diff --git a/2016/8xxx/CVE-2016-8747.json b/2016/8xxx/CVE-2016-8747.json index 33d7ab07db7..0949a6fde6b 100644 --- a/2016/8xxx/CVE-2016-8747.json +++ b/2016/8xxx/CVE-2016-8747.json @@ -15,14 +15,17 @@ "version" : { "version_data" : [ { - "version_value" : "Apache Tomcat" + "version_value" : "8.5.7 to 8.5.9" + }, + { + "version_value" : "9.0.0.M11 to 9.0.0.M15" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2016/8xxx/CVE-2016-8748.json b/2016/8xxx/CVE-2016-8748.json index 0c384309415..957fc921cca 100644 --- a/2016/8xxx/CVE-2016-8748.json +++ b/2016/8xxx/CVE-2016-8748.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8750.json b/2016/8xxx/CVE-2016-8750.json index 276938efd89..f840f02c3b8 100644 --- a/2016/8xxx/CVE-2016-8750.json +++ b/2016/8xxx/CVE-2016-8750.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Karaf", + "product_name" : "Apache Karaf", "version" : { "version_data" : [ { diff --git a/2016/8xxx/CVE-2016-8751.json b/2016/8xxx/CVE-2016-8751.json index 15828388615..081584c6205 100644 --- a/2016/8xxx/CVE-2016-8751.json +++ b/2016/8xxx/CVE-2016-8751.json @@ -11,11 +11,14 @@ "product" : { "product_data" : [ { - "product_name" : "Ranger", + "product_name" : "Apache Ranger", "version" : { "version_data" : [ { - "version_value" : "0.5.x and 0.6.0/0.6.1/0.6.2" + "version_value" : "0.5.x" + }, + { + "version_value" : "0.6.0 - 0.6.2" } ] } @@ -34,7 +37,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Apache Ranger before 0.6.is vulnerable to a Stored Cross-Site Scripting in when entering custom policy conditions. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies." + "value" : "Apache Ranger before 0.6.3 is vulnerable to a Stored Cross-Site Scripting in when entering custom policy conditions. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies." } ] }, diff --git a/2016/8xxx/CVE-2016-8752.json b/2016/8xxx/CVE-2016-8752.json index f317f6197a0..16a273a1ebb 100644 --- a/2016/8xxx/CVE-2016-8752.json +++ b/2016/8xxx/CVE-2016-8752.json @@ -12,17 +12,17 @@ "product" : { "product_data" : [ { - "product_name" : "Atlas", + "product_name" : "Apache Atlas", "version" : { "version_data" : [ { - "version_value" : "0.6.0" + "version_value" : "0.6.0-incubating" }, { - "version_value" : "0.7.0" + "version_value" : "0.7.0-incubating" }, { - "version_value" : "0.7.1" + "version_value" : "0.7.1-incubating" } ] } diff --git a/2017/12xxx/CVE-2017-12610.json b/2017/12xxx/CVE-2017-12610.json index 470ada713ec..f27d796ff2c 100644 --- a/2017/12xxx/CVE-2017-12610.json +++ b/2017/12xxx/CVE-2017-12610.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Kafka", + "product_name" : "Apache Kafka", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12611.json b/2017/12xxx/CVE-2017-12611.json index 6ba0edc6324..eb69f970496 100644 --- a/2017/12xxx/CVE-2017-12611.json +++ b/2017/12xxx/CVE-2017-12611.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12613.json b/2017/12xxx/CVE-2017-12613.json index f0b91c3fba9..95510e3a868 100644 --- a/2017/12xxx/CVE-2017-12613.json +++ b/2017/12xxx/CVE-2017-12613.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache Portable Runtime", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "1.6.2 and prior" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2017/12xxx/CVE-2017-12614.json b/2017/12xxx/CVE-2017-12614.json index 90b1085879a..42b53dde5fb 100644 --- a/2017/12xxx/CVE-2017-12614.json +++ b/2017/12xxx/CVE-2017-12614.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Airflow", + "product_name" : "Apache Airflow", "version" : { "version_data" : [ { - "version_value" : "< 1.9" + "version_value" : "< 1.9.0" } ] } diff --git a/2017/12xxx/CVE-2017-12615.json b/2017/12xxx/CVE-2017-12615.json index 40d39fc067d..f10094566d4 100644 --- a/2017/12xxx/CVE-2017-12615.json +++ b/2017/12xxx/CVE-2017-12615.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12616.json b/2017/12xxx/CVE-2017-12616.json index f51e0a29351..ba7049acc48 100644 --- a/2017/12xxx/CVE-2017-12616.json +++ b/2017/12xxx/CVE-2017-12616.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12617.json b/2017/12xxx/CVE-2017-12617.json index db04b044348..3523118d91f 100644 --- a/2017/12xxx/CVE-2017-12617.json +++ b/2017/12xxx/CVE-2017-12617.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12618.json b/2017/12xxx/CVE-2017-12618.json index 5ba727d0973..dc97871780b 100644 --- a/2017/12xxx/CVE-2017-12618.json +++ b/2017/12xxx/CVE-2017-12618.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache Portable Runtime", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "1.6.0 and prior" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2017/12xxx/CVE-2017-12620.json b/2017/12xxx/CVE-2017-12620.json index c2775583249..e8b2600f18c 100644 --- a/2017/12xxx/CVE-2017-12620.json +++ b/2017/12xxx/CVE-2017-12620.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenNLP", + "product_name" : "Apache OpenNLP", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12621.json b/2017/12xxx/CVE-2017-12621.json index 3e523d08086..9559e7d7780 100644 --- a/2017/12xxx/CVE-2017-12621.json +++ b/2017/12xxx/CVE-2017-12621.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Commons Jelly", + "product_name" : "Apache Commons Jelly", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12622.json b/2017/12xxx/CVE-2017-12622.json index ddb04a1de65..09ce9c19f4e 100644 --- a/2017/12xxx/CVE-2017-12622.json +++ b/2017/12xxx/CVE-2017-12622.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12623.json b/2017/12xxx/CVE-2017-12623.json index bac0c7de98c..b22a45bab3e 100644 --- a/2017/12xxx/CVE-2017-12623.json +++ b/2017/12xxx/CVE-2017-12623.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12624.json b/2017/12xxx/CVE-2017-12624.json index e19d8bd4b5e..a28efb9ff79 100644 --- a/2017/12xxx/CVE-2017-12624.json +++ b/2017/12xxx/CVE-2017-12624.json @@ -12,11 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "CXF", + "product_name" : "Apache CXF", "version" : { "version_data" : [ { - "version_value" : "All versions of Apache CXF prior to 3.2.1 and 3.1.14." + "version_value" : "prior to 3.1.14" + }, + { + "version_value" : "3.2.x prior to 3.2.1" } ] } diff --git a/2017/12xxx/CVE-2017-12625.json b/2017/12xxx/CVE-2017-12625.json index d502093e68f..5e8865744ca 100644 --- a/2017/12xxx/CVE-2017-12625.json +++ b/2017/12xxx/CVE-2017-12625.json @@ -12,11 +12,17 @@ "product" : { "product_data" : [ { - "product_name" : "Hive", + "product_name" : "Apache Hive", "version" : { "version_data" : [ { - "version_value" : "2.1.0 to 2.3.0" + "version_value" : "2.1.x before 2.1.2" + }, + { + "version_value" : "2.2.x before 2.2.1" + }, + { + "version_value" : "2.3.0" } ] } diff --git a/2017/12xxx/CVE-2017-12626.json b/2017/12xxx/CVE-2017-12626.json index e6e47f389cd..badc764937f 100644 --- a/2017/12xxx/CVE-2017-12626.json +++ b/2017/12xxx/CVE-2017-12626.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "POI", + "product_name" : "Apache POI", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12627.json b/2017/12xxx/CVE-2017-12627.json index 1c13ac156fd..0bcbb8e198a 100644 --- a/2017/12xxx/CVE-2017-12627.json +++ b/2017/12xxx/CVE-2017-12627.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Xerces-C", + "product_name" : "Apache Xerces C++", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12628.json b/2017/12xxx/CVE-2017-12628.json index e45631a0591..de6039e0bdb 100644 --- a/2017/12xxx/CVE-2017-12628.json +++ b/2017/12xxx/CVE-2017-12628.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "James Server", + "product_name" : "Apache James", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12629.json b/2017/12xxx/CVE-2017-12629.json index 994ebc28c07..160bdcdca5b 100644 --- a/2017/12xxx/CVE-2017-12629.json +++ b/2017/12xxx/CVE-2017-12629.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Solr", + "product_name" : "Apache Solr", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12630.json b/2017/12xxx/CVE-2017-12630.json index 5eb456fb15d..2a9d7c25a97 100644 --- a/2017/12xxx/CVE-2017-12630.json +++ b/2017/12xxx/CVE-2017-12630.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Drill", + "product_name" : "Apache Drill", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12631.json b/2017/12xxx/CVE-2017-12631.json index a205aa3e80a..5e372f4b405 100644 --- a/2017/12xxx/CVE-2017-12631.json +++ b/2017/12xxx/CVE-2017-12631.json @@ -12,11 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "CXF Fediz", + "product_name" : "Apache CXF Fediz", "version" : { "version_data" : [ { - "version_value" : "prior to 1.4.3 and 1.3.3" + "version_value" : "1.4.x prior to 1.4.3" + }, + { + "version_value" : "prior to 1.3.3" } ] } diff --git a/2017/12xxx/CVE-2017-12632.json b/2017/12xxx/CVE-2017-12632.json index ab34c1b222a..72d8fc56c0c 100644 --- a/2017/12xxx/CVE-2017-12632.json +++ b/2017/12xxx/CVE-2017-12632.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12633.json b/2017/12xxx/CVE-2017-12633.json index e2fed10521f..95a81e55ceb 100644 --- a/2017/12xxx/CVE-2017-12633.json +++ b/2017/12xxx/CVE-2017-12633.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Camel", + "product_name" : "Apache Camel", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12634.json b/2017/12xxx/CVE-2017-12634.json index ccd8d5e19c1..14df88ccfe1 100644 --- a/2017/12xxx/CVE-2017-12634.json +++ b/2017/12xxx/CVE-2017-12634.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Camel", + "product_name" : "Apache Camel", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12635.json b/2017/12xxx/CVE-2017-12635.json index c20c3fc8f04..448422189a3 100644 --- a/2017/12xxx/CVE-2017-12635.json +++ b/2017/12xxx/CVE-2017-12635.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CouchDB", + "product_name" : "Apache CouchDB", "version" : { "version_data" : [ { diff --git a/2017/12xxx/CVE-2017-12636.json b/2017/12xxx/CVE-2017-12636.json index 91bd6fc39ad..dd7a2fb34dc 100644 --- a/2017/12xxx/CVE-2017-12636.json +++ b/2017/12xxx/CVE-2017-12636.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CouchDB", + "product_name" : "Apache CouchDB", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15691.json b/2017/15xxx/CVE-2017-15691.json index e3afd3f7d00..bf893a01550 100644 --- a/2017/15xxx/CVE-2017-15691.json +++ b/2017/15xxx/CVE-2017-15691.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "UIMA", + "product_name" : "Apache UIMA", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15692.json b/2017/15xxx/CVE-2017-15692.json index b2c85aab69e..3fe450fd466 100644 --- a/2017/15xxx/CVE-2017-15692.json +++ b/2017/15xxx/CVE-2017-15692.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15693.json b/2017/15xxx/CVE-2017-15693.json index faa28a75678..56f29632263 100644 --- a/2017/15xxx/CVE-2017-15693.json +++ b/2017/15xxx/CVE-2017-15693.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15695.json b/2017/15xxx/CVE-2017-15695.json index 3125063d17f..b87cdcfbc7c 100644 --- a/2017/15xxx/CVE-2017-15695.json +++ b/2017/15xxx/CVE-2017-15695.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15697.json b/2017/15xxx/CVE-2017-15697.json index 293eda210e9..fb62e7ff50e 100644 --- a/2017/15xxx/CVE-2017-15697.json +++ b/2017/15xxx/CVE-2017-15697.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15698.json b/2017/15xxx/CVE-2017-15698.json index be0ad7c9908..1e60ab015c8 100644 --- a/2017/15xxx/CVE-2017-15698.json +++ b/2017/15xxx/CVE-2017-15698.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat Native Connector", + "product_name" : "Apache Tomcat Native", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15700.json b/2017/15xxx/CVE-2017-15700.json index ebc2e913729..50597ad26d6 100644 --- a/2017/15xxx/CVE-2017-15700.json +++ b/2017/15xxx/CVE-2017-15700.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Sling", + "product_name" : "Apache Sling", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15701.json b/2017/15xxx/CVE-2017-15701.json index c8e9b170181..8d99dfb0e17 100644 --- a/2017/15xxx/CVE-2017-15701.json +++ b/2017/15xxx/CVE-2017-15701.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Qpid Broker-J", + "product_name" : "Apache Qpid Broker-J", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15702.json b/2017/15xxx/CVE-2017-15702.json index 540100023e3..937d2f38f9f 100644 --- a/2017/15xxx/CVE-2017-15702.json +++ b/2017/15xxx/CVE-2017-15702.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Qpid Broker-J", + "product_name" : "Apache Qpid Broker-J", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15703.json b/2017/15xxx/CVE-2017-15703.json index 068185a4aa6..37aa7de6156 100644 --- a/2017/15xxx/CVE-2017-15703.json +++ b/2017/15xxx/CVE-2017-15703.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15705.json b/2017/15xxx/CVE-2017-15705.json index 07fe3c85857..ec2d5fa0df8 100644 --- a/2017/15xxx/CVE-2017-15705.json +++ b/2017/15xxx/CVE-2017-15705.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "SpamAssassin", + "product_name" : "Apache SpamAssassin", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15706.json b/2017/15xxx/CVE-2017-15706.json index 3e82658d793..07f66a011a3 100644 --- a/2017/15xxx/CVE-2017-15706.json +++ b/2017/15xxx/CVE-2017-15706.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15707.json b/2017/15xxx/CVE-2017-15707.json index bf6ed29d5e2..ec2990a8686 100644 --- a/2017/15xxx/CVE-2017-15707.json +++ b/2017/15xxx/CVE-2017-15707.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15708.json b/2017/15xxx/CVE-2017-15708.json index ec4f1310679..cbfae58daa2 100644 --- a/2017/15xxx/CVE-2017-15708.json +++ b/2017/15xxx/CVE-2017-15708.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Synapse", + "product_name" : "Apache Synapse", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15712.json b/2017/15xxx/CVE-2017-15712.json index ec4300f2448..2c96b2f6459 100644 --- a/2017/15xxx/CVE-2017-15712.json +++ b/2017/15xxx/CVE-2017-15712.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Oozie", + "product_name" : "Apache Oozie", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15713.json b/2017/15xxx/CVE-2017-15713.json index 4c583fdef28..5e7d5ede99d 100644 --- a/2017/15xxx/CVE-2017-15713.json +++ b/2017/15xxx/CVE-2017-15713.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15714.json b/2017/15xxx/CVE-2017-15714.json index c10d954f73a..8cf57c49dc8 100644 --- a/2017/15xxx/CVE-2017-15714.json +++ b/2017/15xxx/CVE-2017-15714.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OFBiz", + "product_name" : "Apache OFBiz", "version" : { "version_data" : [ { diff --git a/2017/15xxx/CVE-2017-15717.json b/2017/15xxx/CVE-2017-15717.json index 2c5fc41db02..d05bc88a4bb 100644 --- a/2017/15xxx/CVE-2017-15717.json +++ b/2017/15xxx/CVE-2017-15717.json @@ -12,17 +12,17 @@ "product" : { "product_data" : [ { - "product_name" : "Sling XSS Protection API", + "product_name" : "Apache Sling", "version" : { "version_data" : [ { - "version_value" : "1.0.4 to 1.0.18" + "version_value" : "XSS Protection API 1.0.4 to 1.0.18" }, { - "version_value" : "Compat 1.1.0" + "version_value" : "XSS Protection API Compat 1.1.0" }, { - "version_value" : "2.0.0" + "version_value" : "XSS Protection API 2.0.0" } ] } diff --git a/2017/15xxx/CVE-2017-15718.json b/2017/15xxx/CVE-2017-15718.json index 8f61698d010..6d7a6cb9e1d 100644 --- a/2017/15xxx/CVE-2017-15718.json +++ b/2017/15xxx/CVE-2017-15718.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2017/17xxx/CVE-2017-17837.json b/2017/17xxx/CVE-2017-17837.json index d87924ce8a3..ffe905da71c 100644 --- a/2017/17xxx/CVE-2017-17837.json +++ b/2017/17xxx/CVE-2017-17837.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "DeltaSpike", + "product_name" : "Apache DeltaSpike", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3150.json b/2017/3xxx/CVE-2017-3150.json index 9b48a3e8c8a..af49c34f147 100644 --- a/2017/3xxx/CVE-2017-3150.json +++ b/2017/3xxx/CVE-2017-3150.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Atlas", + "product_name" : "Apache Atlas", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3151.json b/2017/3xxx/CVE-2017-3151.json index d27a3e0940a..a70ec1e049c 100644 --- a/2017/3xxx/CVE-2017-3151.json +++ b/2017/3xxx/CVE-2017-3151.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Atlas", + "product_name" : "Apache Atlas", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3152.json b/2017/3xxx/CVE-2017-3152.json index 2a650759e8f..29552ff8e90 100644 --- a/2017/3xxx/CVE-2017-3152.json +++ b/2017/3xxx/CVE-2017-3152.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Atlas", + "product_name" : "Apache Atlas", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3153.json b/2017/3xxx/CVE-2017-3153.json index 8a321a7b53e..111d15622c9 100644 --- a/2017/3xxx/CVE-2017-3153.json +++ b/2017/3xxx/CVE-2017-3153.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Atlas", + "product_name" : "Apache Atlas", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3154.json b/2017/3xxx/CVE-2017-3154.json index 569cbb9a18e..a918355b142 100644 --- a/2017/3xxx/CVE-2017-3154.json +++ b/2017/3xxx/CVE-2017-3154.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Atlas", + "product_name" : "Apache Atlas", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3155.json b/2017/3xxx/CVE-2017-3155.json index f7768b12312..be57329e5e0 100644 --- a/2017/3xxx/CVE-2017-3155.json +++ b/2017/3xxx/CVE-2017-3155.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Atlas", + "product_name" : "Apache Atlas", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3156.json b/2017/3xxx/CVE-2017-3156.json index 8f116e5cb8a..22252206f72 100644 --- a/2017/3xxx/CVE-2017-3156.json +++ b/2017/3xxx/CVE-2017-3156.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CXF", + "product_name" : "Apache CXF", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3161.json b/2017/3xxx/CVE-2017-3161.json index bfa56f373a7..14d68c08cf6 100644 --- a/2017/3xxx/CVE-2017-3161.json +++ b/2017/3xxx/CVE-2017-3161.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3162.json b/2017/3xxx/CVE-2017-3162.json index 077588431bd..0d253da52a6 100644 --- a/2017/3xxx/CVE-2017-3162.json +++ b/2017/3xxx/CVE-2017-3162.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3163.json b/2017/3xxx/CVE-2017-3163.json index 89f2593ffee..f1434b13922 100644 --- a/2017/3xxx/CVE-2017-3163.json +++ b/2017/3xxx/CVE-2017-3163.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Solr", + "product_name" : "Apache Solr", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3165.json b/2017/3xxx/CVE-2017-3165.json index bd5353df496..98cb95f83e2 100644 --- a/2017/3xxx/CVE-2017-3165.json +++ b/2017/3xxx/CVE-2017-3165.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Brooklyn", + "product_name" : "Apache Brooklyn", "version" : { "version_data" : [ { diff --git a/2017/3xxx/CVE-2017-3166.json b/2017/3xxx/CVE-2017-3166.json index 1cb327b466d..1bec20ac155 100644 --- a/2017/3xxx/CVE-2017-3166.json +++ b/2017/3xxx/CVE-2017-3166.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5635.json b/2017/5xxx/CVE-2017-5635.json index f0bfdc88e0f..3eb994266d1 100644 --- a/2017/5xxx/CVE-2017-5635.json +++ b/2017/5xxx/CVE-2017-5635.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5636.json b/2017/5xxx/CVE-2017-5636.json index ae55fbe3934..98888d69e1e 100644 --- a/2017/5xxx/CVE-2017-5636.json +++ b/2017/5xxx/CVE-2017-5636.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5637.json b/2017/5xxx/CVE-2017-5637.json index 15e8db47328..9c6fc9d6ec5 100644 --- a/2017/5xxx/CVE-2017-5637.json +++ b/2017/5xxx/CVE-2017-5637.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "ZooKeeper", + "product_name" : "Apache ZooKeeper", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5638.json b/2017/5xxx/CVE-2017-5638.json index 4f77f721515..b8b91b88d20 100644 --- a/2017/5xxx/CVE-2017-5638.json +++ b/2017/5xxx/CVE-2017-5638.json @@ -11,18 +11,21 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "2.3.x before 2.3.32" + }, + { + "version_value" : "2.5.x before 2.5.10.1" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2017/5xxx/CVE-2017-5640.json b/2017/5xxx/CVE-2017-5640.json index 46cf9d07e75..97326091e9f 100644 --- a/2017/5xxx/CVE-2017-5640.json +++ b/2017/5xxx/CVE-2017-5640.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Impala (incubating)", + "product_name" : "Apache Impala", "version" : { "version_data" : [ { - "version_value" : "2.7.0 to 2.8.0" + "version_value" : "2.7.0 to 2.8.0 incubating" } ] } diff --git a/2017/5xxx/CVE-2017-5641.json b/2017/5xxx/CVE-2017-5641.json index bec9877ac5c..065442ad930 100644 --- a/2017/5xxx/CVE-2017-5641.json +++ b/2017/5xxx/CVE-2017-5641.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Flex BlazeDS", + "product_name" : "Apache Flex Blaze DS", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5646.json b/2017/5xxx/CVE-2017-5646.json index e99e1b53310..a333b396913 100644 --- a/2017/5xxx/CVE-2017-5646.json +++ b/2017/5xxx/CVE-2017-5646.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Knox", + "product_name" : "Apache Knox", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5652.json b/2017/5xxx/CVE-2017-5652.json index fe18cec34eb..b9823e8f8b1 100644 --- a/2017/5xxx/CVE-2017-5652.json +++ b/2017/5xxx/CVE-2017-5652.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Impala (incubating)", + "product_name" : "Apache Impala", "version" : { "version_data" : [ { - "version_value" : "2.7.0 to 2.8.0" + "version_value" : "2.7.0 to 2.8.0 incubating" } ] } diff --git a/2017/5xxx/CVE-2017-5653.json b/2017/5xxx/CVE-2017-5653.json index 871af02eb9f..dc4cee2f38b 100644 --- a/2017/5xxx/CVE-2017-5653.json +++ b/2017/5xxx/CVE-2017-5653.json @@ -11,18 +11,21 @@ "product" : { "product_data" : [ { - "product_name" : "CXF", + "product_name" : "Apache CXF", "version" : { "version_data" : [ { - "version_value" : "All versions prior to 3.1.11 and 3.0.13." + "version_value" : "prior to 3.0.13" + }, + { + "version_value" : "3.1.x prior to 3.1.11" } ] } } ] }, - "vendor_name" : "Apache" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2017/5xxx/CVE-2017-5656.json b/2017/5xxx/CVE-2017-5656.json index c897c39c8ce..b0e1a324289 100644 --- a/2017/5xxx/CVE-2017-5656.json +++ b/2017/5xxx/CVE-2017-5656.json @@ -15,14 +15,17 @@ "version" : { "version_data" : [ { - "version_value" : "All versions prior to 3.1.11 and 3.0.13." + "version_value" : "3.1.x before 3.1.11" + }, + { + "version_value" : "versions before 3.0.13" } ] } } ] }, - "vendor_name" : "Apache" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2017/5xxx/CVE-2017-5658.json b/2017/5xxx/CVE-2017-5658.json index 7ec2930bfa7..5b58a14961e 100644 --- a/2017/5xxx/CVE-2017-5658.json +++ b/2017/5xxx/CVE-2017-5658.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Pony Mail", + "product_name" : "Apache Pony Mail", "version" : { "version_data" : [ { - "version_value" : "0.7 to 0.9" + "version_value" : "0.7 to 0.9 (incubating)" } ] } diff --git a/2017/5xxx/CVE-2017-5660.json b/2017/5xxx/CVE-2017-5660.json index a1c454bea71..df3cc73e054 100644 --- a/2017/5xxx/CVE-2017-5660.json +++ b/2017/5xxx/CVE-2017-5660.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Traffic Server", + "product_name" : "Apache Traffic Server", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5661.json b/2017/5xxx/CVE-2017-5661.json index 7cd469b495f..22626183cd0 100644 --- a/2017/5xxx/CVE-2017-5661.json +++ b/2017/5xxx/CVE-2017-5661.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Apache XML Graphics FOP", + "product_name" : "Apache FOP", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5663.json b/2017/5xxx/CVE-2017-5663.json index b8ab0c1d24b..7bd2c8ae59b 100644 --- a/2017/5xxx/CVE-2017-5663.json +++ b/2017/5xxx/CVE-2017-5663.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Fineract", + "product_name" : "Apache Fineract", "version" : { "version_data" : [ { diff --git a/2017/5xxx/CVE-2017-5664.json b/2017/5xxx/CVE-2017-5664.json index 6087edb9b5a..402764cc01f 100644 --- a/2017/5xxx/CVE-2017-5664.json +++ b/2017/5xxx/CVE-2017-5664.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7659.json b/2017/7xxx/CVE-2017-7659.json index ba478b676b3..495520807a9 100644 --- a/2017/7xxx/CVE-2017-7659.json +++ b/2017/7xxx/CVE-2017-7659.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache HTTP Server", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "2.4.24, 2.4.25" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A maliciously constructed HTTP/2 request could cause mod_http2 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process." + "value" : "A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process." } ] }, diff --git a/2017/7xxx/CVE-2017-7660.json b/2017/7xxx/CVE-2017-7660.json index e38999574d2..bb8a8ffb239 100644 --- a/2017/7xxx/CVE-2017-7660.json +++ b/2017/7xxx/CVE-2017-7660.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Solr", + "product_name" : "Apache Solr", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7663.json b/2017/7xxx/CVE-2017-7663.json index 1a2c0ed205d..61e2072c0b0 100644 --- a/2017/7xxx/CVE-2017-7663.json +++ b/2017/7xxx/CVE-2017-7663.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7664.json b/2017/7xxx/CVE-2017-7664.json index 8e6f5f6dd9e..f514a16792e 100644 --- a/2017/7xxx/CVE-2017-7664.json +++ b/2017/7xxx/CVE-2017-7664.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7665.json b/2017/7xxx/CVE-2017-7665.json index 84b01536224..63ecae53492 100644 --- a/2017/7xxx/CVE-2017-7665.json +++ b/2017/7xxx/CVE-2017-7665.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7666.json b/2017/7xxx/CVE-2017-7666.json index cf61b383df8..9e6c8368358 100644 --- a/2017/7xxx/CVE-2017-7666.json +++ b/2017/7xxx/CVE-2017-7666.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7667.json b/2017/7xxx/CVE-2017-7667.json index c9a48c982e3..5c3def1832d 100644 --- a/2017/7xxx/CVE-2017-7667.json +++ b/2017/7xxx/CVE-2017-7667.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7669.json b/2017/7xxx/CVE-2017-7669.json index 0b95b139483..658b14dd57e 100644 --- a/2017/7xxx/CVE-2017-7669.json +++ b/2017/7xxx/CVE-2017-7669.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hadoop", + "product_name" : "Apache Hadoop", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7670.json b/2017/7xxx/CVE-2017-7670.json index c2d58a2e8c4..20d0cf9a25b 100644 --- a/2017/7xxx/CVE-2017-7670.json +++ b/2017/7xxx/CVE-2017-7670.json @@ -12,14 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "Traffic Control Traffic Router", + "product_name" : "Apache Traffic Control", "version" : { "version_data" : [ { - "version_value" : "1.8.0" + "version_value" : "1.8.0 incubating" }, { - "version_value" : "2.0.0 RC0" + "version_value" : "2.0.0 RC0 incubating" } ] } diff --git a/2017/7xxx/CVE-2017-7671.json b/2017/7xxx/CVE-2017-7671.json index c195bbf728c..1c1b189afc8 100644 --- a/2017/7xxx/CVE-2017-7671.json +++ b/2017/7xxx/CVE-2017-7671.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Traffic Server", + "product_name" : "Apache Traffic Server", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7672.json b/2017/7xxx/CVE-2017-7672.json index 8d4738e86d4..cc19be1d998 100644 --- a/2017/7xxx/CVE-2017-7672.json +++ b/2017/7xxx/CVE-2017-7672.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7673.json b/2017/7xxx/CVE-2017-7673.json index 002e75b1b9e..5af421dbf67 100644 --- a/2017/7xxx/CVE-2017-7673.json +++ b/2017/7xxx/CVE-2017-7673.json @@ -11,18 +11,18 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "1.0.0" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2017/7xxx/CVE-2017-7674.json b/2017/7xxx/CVE-2017-7674.json index 78b366f5fed..a260edec16c 100644 --- a/2017/7xxx/CVE-2017-7674.json +++ b/2017/7xxx/CVE-2017-7674.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7675.json b/2017/7xxx/CVE-2017-7675.json index cdef1027383..428713722f7 100644 --- a/2017/7xxx/CVE-2017-7675.json +++ b/2017/7xxx/CVE-2017-7675.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7676.json b/2017/7xxx/CVE-2017-7676.json index b540258bb0f..7401aecdf06 100644 --- a/2017/7xxx/CVE-2017-7676.json +++ b/2017/7xxx/CVE-2017-7676.json @@ -11,11 +11,17 @@ "product" : { "product_data" : [ { - "product_name" : "Ranger", + "product_name" : "Apache Ranger", "version" : { "version_data" : [ { - "version_value" : "0.5.x/0.6.x/0.7.0" + "version_value" : "0.5.x" + }, + { + "version_value" : "0.6.x" + }, + { + "version_value" : "0.7.0" } ] } diff --git a/2017/7xxx/CVE-2017-7677.json b/2017/7xxx/CVE-2017-7677.json index 068bd1322d2..a46e17ed4b1 100644 --- a/2017/7xxx/CVE-2017-7677.json +++ b/2017/7xxx/CVE-2017-7677.json @@ -11,11 +11,17 @@ "product" : { "product_data" : [ { - "product_name" : "Ranger", + "product_name" : "Apache Ranger", "version" : { "version_data" : [ { - "version_value" : "0.5.x/0.6.x/0.7.0" + "version_value" : "0.5.x" + }, + { + "version_value" : "0.6.x" + }, + { + "version_value" : "0.7.0" } ] } diff --git a/2017/7xxx/CVE-2017-7678.json b/2017/7xxx/CVE-2017-7678.json index 5c0dfd320f6..38ae7c3f0b0 100644 --- a/2017/7xxx/CVE-2017-7678.json +++ b/2017/7xxx/CVE-2017-7678.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Spark", + "product_name" : "Apache Spark", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7680.json b/2017/7xxx/CVE-2017-7680.json index 65e1f99f90e..17bebaac4bf 100644 --- a/2017/7xxx/CVE-2017-7680.json +++ b/2017/7xxx/CVE-2017-7680.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7681.json b/2017/7xxx/CVE-2017-7681.json index 64fafcb6588..bb616f21a83 100644 --- a/2017/7xxx/CVE-2017-7681.json +++ b/2017/7xxx/CVE-2017-7681.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7682.json b/2017/7xxx/CVE-2017-7682.json index 40c26309acc..3d57401e059 100644 --- a/2017/7xxx/CVE-2017-7682.json +++ b/2017/7xxx/CVE-2017-7682.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7683.json b/2017/7xxx/CVE-2017-7683.json index 100157d0cb4..02e03896f2e 100644 --- a/2017/7xxx/CVE-2017-7683.json +++ b/2017/7xxx/CVE-2017-7683.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7684.json b/2017/7xxx/CVE-2017-7684.json index 3c4145b63fd..7c3b6d2ba52 100644 --- a/2017/7xxx/CVE-2017-7684.json +++ b/2017/7xxx/CVE-2017-7684.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7685.json b/2017/7xxx/CVE-2017-7685.json index d71481a1096..bdf73b029b2 100644 --- a/2017/7xxx/CVE-2017-7685.json +++ b/2017/7xxx/CVE-2017-7685.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7686.json b/2017/7xxx/CVE-2017-7686.json index 591dc2eacb5..06851c91385 100644 --- a/2017/7xxx/CVE-2017-7686.json +++ b/2017/7xxx/CVE-2017-7686.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Ignite", + "product_name" : "Apache Ignite", "version" : { "version_data" : [ { diff --git a/2017/7xxx/CVE-2017-7687.json b/2017/7xxx/CVE-2017-7687.json index 79fdfbf9a6e..9d3eafec554 100644 --- a/2017/7xxx/CVE-2017-7687.json +++ b/2017/7xxx/CVE-2017-7687.json @@ -12,17 +12,20 @@ "product" : { "product_data" : [ { - "product_name" : "Mesos", + "product_name" : "Apache Mesos", "version" : { "version_data" : [ { - "version_value" : "1.1.0 to 1.3.0" + "version_value" : "versions prior to 1.1.3" }, { - "version_value" : "1.0.x" + "version_value" : "1.2.x before 1.2.2" }, { - "version_value" : "0.x" + "version_value" : "1.3.x before 1.3.1" + }, + { + "version_value" : "1.4.0-dev" } ] } diff --git a/2017/7xxx/CVE-2017-7688.json b/2017/7xxx/CVE-2017-7688.json index 80ac5e4a20b..d8de251f211 100644 --- a/2017/7xxx/CVE-2017-7688.json +++ b/2017/7xxx/CVE-2017-7688.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2017/9xxx/CVE-2017-9787.json b/2017/9xxx/CVE-2017-9787.json index beefa0da961..60142be7f89 100644 --- a/2017/9xxx/CVE-2017-9787.json +++ b/2017/9xxx/CVE-2017-9787.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { - "version_value" : "2.3.x series" + "version_value" : "2.3.x prior to 2.3.33" }, { "version_value" : "2.5 to 2.5.10.1" diff --git a/2017/9xxx/CVE-2017-9788.json b/2017/9xxx/CVE-2017-9788.json index a241a3ea0b8..db31f5ac557 100644 --- a/2017/9xxx/CVE-2017-9788.json +++ b/2017/9xxx/CVE-2017-9788.json @@ -12,11 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "HTTP Server", + "product_name" : "Apache HTTP Server", "version" : { "version_data" : [ { - "version_value" : "All through 2.2.33 and 2.4.26" + "version_value" : "2.2.0 to 2.2.33" + }, + { + "version_value" : "2.4.1 to 2.4.26" } ] } diff --git a/2017/9xxx/CVE-2017-9789.json b/2017/9xxx/CVE-2017-9789.json index 81a0763c2e0..4699b7303cd 100644 --- a/2017/9xxx/CVE-2017-9789.json +++ b/2017/9xxx/CVE-2017-9789.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "HTTP Server", + "product_name" : "Apache HTTP Server", "version" : { "version_data" : [ { diff --git a/2017/9xxx/CVE-2017-9790.json b/2017/9xxx/CVE-2017-9790.json index bfd42840eec..139c6e401ee 100644 --- a/2017/9xxx/CVE-2017-9790.json +++ b/2017/9xxx/CVE-2017-9790.json @@ -12,17 +12,20 @@ "product" : { "product_data" : [ { - "product_name" : "Mesos", + "product_name" : "APache Mesos", "version" : { "version_data" : [ { - "version_value" : "1.1.0 to 1.3.0" + "version_value" : "versions prior to 1.1.3" }, { - "version_value" : "1.0.x" + "version_value" : "1.2.x before 1.2.2" }, { - "version_value" : "0.x" + "version_value" : "1.3.x before 1.3.1" + }, + { + "version_value" : "1.4.0-dev" } ] } diff --git a/2017/9xxx/CVE-2017-9792.json b/2017/9xxx/CVE-2017-9792.json index 6badd44d9b9..c57ba472cdf 100644 --- a/2017/9xxx/CVE-2017-9792.json +++ b/2017/9xxx/CVE-2017-9792.json @@ -12,14 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "Impala (incubating)", + "product_name" : "Apache Impala", "version" : { "version_data" : [ { - "version_value" : "2.8.0" + "version_value" : "2.8.0 incubating" }, { - "version_value" : "2.9.0" + "version_value" : "2.9.0 incubating" } ] } diff --git a/2017/9xxx/CVE-2017-9793.json b/2017/9xxx/CVE-2017-9793.json index c417ed5aade..a85ea7d8056 100644 --- a/2017/9xxx/CVE-2017-9793.json +++ b/2017/9xxx/CVE-2017-9793.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2017/9xxx/CVE-2017-9794.json b/2017/9xxx/CVE-2017-9794.json index bd9b9844336..991b01bc763 100644 --- a/2017/9xxx/CVE-2017-9794.json +++ b/2017/9xxx/CVE-2017-9794.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/9xxx/CVE-2017-9795.json b/2017/9xxx/CVE-2017-9795.json index 06f4ea25f68..02565f13878 100644 --- a/2017/9xxx/CVE-2017-9795.json +++ b/2017/9xxx/CVE-2017-9795.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/9xxx/CVE-2017-9796.json b/2017/9xxx/CVE-2017-9796.json index 691f1e77c3b..720f1194cc4 100644 --- a/2017/9xxx/CVE-2017-9796.json +++ b/2017/9xxx/CVE-2017-9796.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/9xxx/CVE-2017-9797.json b/2017/9xxx/CVE-2017-9797.json index b67140d6a60..99f3121e73f 100644 --- a/2017/9xxx/CVE-2017-9797.json +++ b/2017/9xxx/CVE-2017-9797.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Geode", + "product_name" : "Apache Geode", "version" : { "version_data" : [ { diff --git a/2017/9xxx/CVE-2017-9802.json b/2017/9xxx/CVE-2017-9802.json index 34b84e83529..5f837ae0cbc 100644 --- a/2017/9xxx/CVE-2017-9802.json +++ b/2017/9xxx/CVE-2017-9802.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Sling Servlets Post", + "product_name" : "Apache Sling", "version" : { "version_data" : [ { - "version_value" : "2.3.20 or older" + "version_value" : "Servlets Post 2.3.20 or older" } ] } diff --git a/2017/9xxx/CVE-2017-9803.json b/2017/9xxx/CVE-2017-9803.json index ad185377843..e315d1ce801 100644 --- a/2017/9xxx/CVE-2017-9803.json +++ b/2017/9xxx/CVE-2017-9803.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Solr", + "product_name" : "Apache Solr", "version" : { "version_data" : [ { @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e.g. SaslZkACLProvider). Firstly, access to the security configuration can be leaked to users other than the solr super user. Secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the Solr cluster. The vulnerability is fixed from Solr 6.6.1 onwards." + "value" : "Apache Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e.g. SaslZkACLProvider). Firstly, access to the security configuration can be leaked to users other than the solr super user. Secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the Solr cluster. The vulnerability is fixed from Apache Solr 6.6.1 onwards." } ] }, diff --git a/2017/9xxx/CVE-2017-9804.json b/2017/9xxx/CVE-2017-9804.json index 35790606a8e..b40004a3396 100644 --- a/2017/9xxx/CVE-2017-9804.json +++ b/2017/9xxx/CVE-2017-9804.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11758.json b/2018/11xxx/CVE-2018-11758.json index b5982ab0ebb..46b1e864172 100644 --- a/2018/11xxx/CVE-2018-11758.json +++ b/2018/11xxx/CVE-2018-11758.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Cayenne", + "product_name" : "Apache Cayenne", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11759.json b/2018/11xxx/CVE-2018-11759.json index 2671e18c28e..78e468d238f 100644 --- a/2018/11xxx/CVE-2018-11759.json +++ b/2018/11xxx/CVE-2018-11759.json @@ -11,7 +11,7 @@ "product" : { "product_data" : [ { - "product_name" : "Apache Tomcat JK (mod_jk) Connector", + "product_name" : "Apache Tomcat Connectors", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11761.json b/2018/11xxx/CVE-2018-11761.json index 61fab8e85f0..a0672d01bb4 100644 --- a/2018/11xxx/CVE-2018-11761.json +++ b/2018/11xxx/CVE-2018-11761.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tika", + "product_name" : "Apache Tika", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11762.json b/2018/11xxx/CVE-2018-11762.json index 0a4da7c4bde..011d0139413 100644 --- a/2018/11xxx/CVE-2018-11762.json +++ b/2018/11xxx/CVE-2018-11762.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tika", + "product_name" : "Apache Tika", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11763.json b/2018/11xxx/CVE-2018-11763.json index ed8b3edebf7..5cdb7f052bb 100644 --- a/2018/11xxx/CVE-2018-11763.json +++ b/2018/11xxx/CVE-2018-11763.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "HTTP Server", + "product_name" : "Apache HTTP Server", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11770.json b/2018/11xxx/CVE-2018-11770.json index 724de9cae69..72d60946988 100644 --- a/2018/11xxx/CVE-2018-11770.json +++ b/2018/11xxx/CVE-2018-11770.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Spark", + "product_name" : "Apache Spark", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11771.json b/2018/11xxx/CVE-2018-11771.json index d832993f4b9..01917206676 100644 --- a/2018/11xxx/CVE-2018-11771.json +++ b/2018/11xxx/CVE-2018-11771.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Commons Compress", + "product_name" : "Apache Commons Compress", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11775.json b/2018/11xxx/CVE-2018-11775.json index 80f3c0c94f4..270690224dd 100644 --- a/2018/11xxx/CVE-2018-11775.json +++ b/2018/11xxx/CVE-2018-11775.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "ActiveMQ", + "product_name" : "Apache ActiveMQ", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11776.json b/2018/11xxx/CVE-2018-11776.json index 2890b79f5cb..b5320850e3e 100644 --- a/2018/11xxx/CVE-2018-11776.json +++ b/2018/11xxx/CVE-2018-11776.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Struts", + "product_name" : "Apache Struts", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11778.json b/2018/11xxx/CVE-2018-11778.json index 22884cfee71..63ddb49acd6 100644 --- a/2018/11xxx/CVE-2018-11778.json +++ b/2018/11xxx/CVE-2018-11778.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Ranger", + "product_name" : "Apache Ranger", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11780.json b/2018/11xxx/CVE-2018-11780.json index 42abc591ae7..9c526c8a5bd 100644 --- a/2018/11xxx/CVE-2018-11780.json +++ b/2018/11xxx/CVE-2018-11780.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "SpamAssassin", + "product_name" : "Apache SpamAssassin", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11781.json b/2018/11xxx/CVE-2018-11781.json index 959d130e8f6..52c20d725f4 100644 --- a/2018/11xxx/CVE-2018-11781.json +++ b/2018/11xxx/CVE-2018-11781.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "SpamAssassin", + "product_name" : "Apache SpamAssassin", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11784.json b/2018/11xxx/CVE-2018-11784.json index e2d9a648306..fc486a72d84 100644 --- a/2018/11xxx/CVE-2018-11784.json +++ b/2018/11xxx/CVE-2018-11784.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11786.json b/2018/11xxx/CVE-2018-11786.json index d7e19a8d351..0fb9cd985dc 100644 --- a/2018/11xxx/CVE-2018-11786.json +++ b/2018/11xxx/CVE-2018-11786.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Karaf", + "product_name" : "Apache Karaf", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11787.json b/2018/11xxx/CVE-2018-11787.json index ce70f4676c4..511f879b09b 100644 --- a/2018/11xxx/CVE-2018-11787.json +++ b/2018/11xxx/CVE-2018-11787.json @@ -12,11 +12,17 @@ "product" : { "product_data" : [ { - "product_name" : "Karaf", + "product_name" : "Apache Karaf", "version" : { "version_data" : [ { - "version_value" : "prior to 3.0.9, 4.0.9, 4.1.1" + "version_value" : "prior to 3.0.9" + }, + { + "version_value" : "4.0.x prior to 4.0.9" + }, + { + "version_value" : "4.1.x prior to 4.1.1" } ] } diff --git a/2018/11xxx/CVE-2018-11797.json b/2018/11xxx/CVE-2018-11797.json index 2712e11e001..d9efa43b9fc 100644 --- a/2018/11xxx/CVE-2018-11797.json +++ b/2018/11xxx/CVE-2018-11797.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "PDFBox", + "product_name" : "Apache PDFBox", "version" : { "version_data" : [ { diff --git a/2018/11xxx/CVE-2018-11804.json b/2018/11xxx/CVE-2018-11804.json index 4d8ed28aaa7..11c4a66e0b2 100644 --- a/2018/11xxx/CVE-2018-11804.json +++ b/2018/11xxx/CVE-2018-11804.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Spark", + "product_name" : "Apache Spark", "version" : { "version_data" : [ { diff --git a/2018/17xxx/CVE-2018-17191.json b/2018/17xxx/CVE-2018-17191.json index 21542ddec2c..014fc6ef03b 100644 --- a/2018/17xxx/CVE-2018-17191.json +++ b/2018/17xxx/CVE-2018-17191.json @@ -11,11 +11,11 @@ "product" : { "product_data" : [ { - "product_name" : "Apache NetBeans (incubating)", + "product_name" : "Apache NetBeans", "version" : { "version_data" : [ { - "version_value" : "Apache NetBeans (incubating) 9.0" + "version_value" : "9.0 incubating" } ] } diff --git a/2018/1xxx/CVE-2018-1281.json b/2018/1xxx/CVE-2018-1281.json index b7077bef589..9eec61c99dc 100644 --- a/2018/1xxx/CVE-2018-1281.json +++ b/2018/1xxx/CVE-2018-1281.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "MXNet", + "product_name" : "Apache MXNet", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1282.json b/2018/1xxx/CVE-2018-1282.json index c3b9bf69214..5fa8a03cd14 100644 --- a/2018/1xxx/CVE-2018-1282.json +++ b/2018/1xxx/CVE-2018-1282.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hive", + "product_name" : "Apache Hive", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1284.json b/2018/1xxx/CVE-2018-1284.json index 5ff80834065..4639e4df9f7 100644 --- a/2018/1xxx/CVE-2018-1284.json +++ b/2018/1xxx/CVE-2018-1284.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hive", + "product_name" : "Apache Hive", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1286.json b/2018/1xxx/CVE-2018-1286.json index de9b39c60fc..a664ef70ab9 100644 --- a/2018/1xxx/CVE-2018-1286.json +++ b/2018/1xxx/CVE-2018-1286.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "OpenMeetings", + "product_name" : "Apache OpenMeetings", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1287.json b/2018/1xxx/CVE-2018-1287.json index 4033f6d46ad..8a805e73cde 100644 --- a/2018/1xxx/CVE-2018-1287.json +++ b/2018/1xxx/CVE-2018-1287.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "JMeter", + "product_name" : "Apache JMeter", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1288.json b/2018/1xxx/CVE-2018-1288.json index 76a599f674f..501af2d27dd 100644 --- a/2018/1xxx/CVE-2018-1288.json +++ b/2018/1xxx/CVE-2018-1288.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Kafka", + "product_name" : "Apache Kafka", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1289.json b/2018/1xxx/CVE-2018-1289.json index eaea004a103..eefb7718569 100644 --- a/2018/1xxx/CVE-2018-1289.json +++ b/2018/1xxx/CVE-2018-1289.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Fineract", + "product_name" : "Apache Fineract", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1290.json b/2018/1xxx/CVE-2018-1290.json index d7da59c8791..2b5e4752a0c 100644 --- a/2018/1xxx/CVE-2018-1290.json +++ b/2018/1xxx/CVE-2018-1290.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Fineract", + "product_name" : "Apache Fineract", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1291.json b/2018/1xxx/CVE-2018-1291.json index a4d10971ee7..5faaa770a24 100644 --- a/2018/1xxx/CVE-2018-1291.json +++ b/2018/1xxx/CVE-2018-1291.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Fineract", + "product_name" : "Apache Fineract", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1292.json b/2018/1xxx/CVE-2018-1292.json index 791f6f88bd8..8f50a625036 100644 --- a/2018/1xxx/CVE-2018-1292.json +++ b/2018/1xxx/CVE-2018-1292.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Fineract", + "product_name" : "Apache Fineract", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1294.json b/2018/1xxx/CVE-2018-1294.json index aca1b99cbad..ee24dd72c15 100644 --- a/2018/1xxx/CVE-2018-1294.json +++ b/2018/1xxx/CVE-2018-1294.json @@ -16,7 +16,7 @@ "version" : { "version_data" : [ { - "version_value" : "All Versions of Commons-Email, from 1.0, to 1.4, inclusive. The current version 1.5 is not affected." + "version_value" : "versions prior to 1.5" } ] } @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "If a user of Commons-Email (typically an application programmer) passes unvalidated input as the so-called \"Bounce Address\", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String)." + "value" : "If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called \"Bounce Address\", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String)." } ] }, diff --git a/2018/1xxx/CVE-2018-1295.json b/2018/1xxx/CVE-2018-1295.json index f7e6fd28b62..869ae4a0b75 100644 --- a/2018/1xxx/CVE-2018-1295.json +++ b/2018/1xxx/CVE-2018-1295.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Ignite", + "product_name" : "Apache Ignite", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1297.json b/2018/1xxx/CVE-2018-1297.json index 4adf23c89b3..b8cce18fedb 100644 --- a/2018/1xxx/CVE-2018-1297.json +++ b/2018/1xxx/CVE-2018-1297.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "JMeter", + "product_name" : "Apache JMeter", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1298.json b/2018/1xxx/CVE-2018-1298.json index b78daf33f49..71daf275caf 100644 --- a/2018/1xxx/CVE-2018-1298.json +++ b/2018/1xxx/CVE-2018-1298.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Qpid Broker-J", + "product_name" : "Apache Qpid Broker-J", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1299.json b/2018/1xxx/CVE-2018-1299.json index 50fef1247d9..885b9b9c333 100644 --- a/2018/1xxx/CVE-2018-1299.json +++ b/2018/1xxx/CVE-2018-1299.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Allura", + "product_name" : "Apache Allura", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1306.json b/2018/1xxx/CVE-2018-1306.json index 862521845ec..3f71c5ea678 100644 --- a/2018/1xxx/CVE-2018-1306.json +++ b/2018/1xxx/CVE-2018-1306.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "Apache Portals Pluto", + "product_name" : "Apache Pluto", "version" : { "version_data" : [ { - "version_value" : "Apache Portals Pluto version 3.0.0" + "version_value" : "3.0.0" } ] } @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information." + "value" : "The PortletV3AnnotatedDemo Multipart Portlet war file code provided in Apache Pluto version 3.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to restrict path information provided during a file upload. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information." } ] }, diff --git a/2018/1xxx/CVE-2018-1307.json b/2018/1xxx/CVE-2018-1307.json index 0d40ecd4c86..43ad791e8d2 100644 --- a/2018/1xxx/CVE-2018-1307.json +++ b/2018/1xxx/CVE-2018-1307.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "jUDDI", + "product_name" : "Apache jUDDI", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1308.json b/2018/1xxx/CVE-2018-1308.json index 4dd4768fce1..26e025211b8 100644 --- a/2018/1xxx/CVE-2018-1308.json +++ b/2018/1xxx/CVE-2018-1308.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Solr", + "product_name" : "Apache Solr", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1309.json b/2018/1xxx/CVE-2018-1309.json index 209e2420a1c..0b7116d8857 100644 --- a/2018/1xxx/CVE-2018-1309.json +++ b/2018/1xxx/CVE-2018-1309.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1310.json b/2018/1xxx/CVE-2018-1310.json index 03709a70f7a..a8af23f2f1b 100644 --- a/2018/1xxx/CVE-2018-1310.json +++ b/2018/1xxx/CVE-2018-1310.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "NiFi", + "product_name" : "Apache NiFi", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1313.json b/2018/1xxx/CVE-2018-1313.json index 89c63bf35d8..fd53ff11010 100644 --- a/2018/1xxx/CVE-2018-1313.json +++ b/2018/1xxx/CVE-2018-1313.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Derby", + "product_name" : "Apache Derby", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1315.json b/2018/1xxx/CVE-2018-1315.json index f53da602b57..4e3faeca3ed 100644 --- a/2018/1xxx/CVE-2018-1315.json +++ b/2018/1xxx/CVE-2018-1315.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Hive", + "product_name" : "Apache Hive", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1316.json b/2018/1xxx/CVE-2018-1316.json index c1075fb16b3..aed80baa2d5 100644 --- a/2018/1xxx/CVE-2018-1316.json +++ b/2018/1xxx/CVE-2018-1316.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "ODE", + "product_name" : "Apache ODE", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1319.json b/2018/1xxx/CVE-2018-1319.json index 905949cb423..61df799f2fe 100644 --- a/2018/1xxx/CVE-2018-1319.json +++ b/2018/1xxx/CVE-2018-1319.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Allura", + "product_name" : "Apache Allura", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1323.json b/2018/1xxx/CVE-2018-1323.json index 31409f4e806..306c6d17b53 100644 --- a/2018/1xxx/CVE-2018-1323.json +++ b/2018/1xxx/CVE-2018-1323.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Apache Tomcat JK ISAPI Connector", + "product_name" : "Apache Tomcat Connectors", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1324.json b/2018/1xxx/CVE-2018-1324.json index 971a57b5f46..21bb0cc04ee 100644 --- a/2018/1xxx/CVE-2018-1324.json +++ b/2018/1xxx/CVE-2018-1324.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Commons Compress", + "product_name" : "Apache Commons Compress", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1331.json b/2018/1xxx/CVE-2018-1331.json index a7fdae9f978..63fc3319aff 100644 --- a/2018/1xxx/CVE-2018-1331.json +++ b/2018/1xxx/CVE-2018-1331.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Storm", + "product_name" : "Apache Storm", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1334.json b/2018/1xxx/CVE-2018-1334.json index d13891311bc..793d1414e5a 100644 --- a/2018/1xxx/CVE-2018-1334.json +++ b/2018/1xxx/CVE-2018-1334.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Spark", + "product_name" : "Apache Spark", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1335.json b/2018/1xxx/CVE-2018-1335.json index d661b80a53c..005ea983762 100644 --- a/2018/1xxx/CVE-2018-1335.json +++ b/2018/1xxx/CVE-2018-1335.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tika", + "product_name" : "Apache Tika", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1336.json b/2018/1xxx/CVE-2018-1336.json index 6a18d1e5323..7fc1dabfcf5 100644 --- a/2018/1xxx/CVE-2018-1336.json +++ b/2018/1xxx/CVE-2018-1336.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1337.json b/2018/1xxx/CVE-2018-1337.json index a722c32da7c..c6d06cfd1c1 100644 --- a/2018/1xxx/CVE-2018-1337.json +++ b/2018/1xxx/CVE-2018-1337.json @@ -12,11 +12,11 @@ "product" : { "product_data" : [ { - "product_name" : "LDAP API", + "product_name" : "Apache Directory", "version" : { "version_data" : [ { - "version_value" : "1.0.2" + "version_value" : "LDAP API prior to 1.0.2" } ] } @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request)." + "value" : "In Apache Directory LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request)." } ] }, diff --git a/2018/1xxx/CVE-2018-1338.json b/2018/1xxx/CVE-2018-1338.json index 99cac55e3ad..a56cb12ff90 100644 --- a/2018/1xxx/CVE-2018-1338.json +++ b/2018/1xxx/CVE-2018-1338.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tika", + "product_name" : "Apache Tika", "version" : { "version_data" : [ { diff --git a/2018/1xxx/CVE-2018-1339.json b/2018/1xxx/CVE-2018-1339.json index 1a6ddeb7079..dc7d523091a 100644 --- a/2018/1xxx/CVE-2018-1339.json +++ b/2018/1xxx/CVE-2018-1339.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tika", + "product_name" : "Apache Tika", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8006.json b/2018/8xxx/CVE-2018-8006.json index 4f26829570e..701b898c4a0 100644 --- a/2018/8xxx/CVE-2018-8006.json +++ b/2018/8xxx/CVE-2018-8006.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "ActiveMQ", + "product_name" : "Apache ActiveMQ", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8007.json b/2018/8xxx/CVE-2018-8007.json index cf1da6f9161..a54c27c0c2f 100644 --- a/2018/8xxx/CVE-2018-8007.json +++ b/2018/8xxx/CVE-2018-8007.json @@ -12,11 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "CouchDB", + "product_name" : "Apache CouchDB", "version" : { "version_data" : [ { - "version_value" : "versions up to and including 1.7.1, and 2.1.1" + "version_value" : "< 1.7.2" + }, + { + "version_value" : "2.0.0 to 2.1.1" } ] } diff --git a/2018/8xxx/CVE-2018-8013.json b/2018/8xxx/CVE-2018-8013.json index 6dec0024556..de612e76fc1 100644 --- a/2018/8xxx/CVE-2018-8013.json +++ b/2018/8xxx/CVE-2018-8013.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Batik", + "product_name" : "Apache Batik", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8014.json b/2018/8xxx/CVE-2018-8014.json index 34b8acdc1d0..130feea719b 100644 --- a/2018/8xxx/CVE-2018-8014.json +++ b/2018/8xxx/CVE-2018-8014.json @@ -11,18 +11,27 @@ "product" : { "product_data" : [ { - "product_name" : "n/a", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { - "version_value" : "n/a" + "version_value" : "9.0.0.M1 to 9.0.8" + }, + { + "version_value" : "8.5.0 to 8.5.31" + }, + { + "version_value" : "8.0.0.RC1 to 8.0.52" + }, + { + "version_value" : "7.0.41 to 7.0.88" } ] } } ] }, - "vendor_name" : "n/a" + "vendor_name" : "Apache Software Foundation" } ] } diff --git a/2018/8xxx/CVE-2018-8015.json b/2018/8xxx/CVE-2018-8015.json index fea2f2f1e50..ed4f35fd07d 100644 --- a/2018/8xxx/CVE-2018-8015.json +++ b/2018/8xxx/CVE-2018-8015.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "ORC", + "product_name" : "Apache ORC", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8017.json b/2018/8xxx/CVE-2018-8017.json index f38d3c7ef52..31fd377a3a1 100644 --- a/2018/8xxx/CVE-2018-8017.json +++ b/2018/8xxx/CVE-2018-8017.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tika", + "product_name" : "Apache Tika", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8018.json b/2018/8xxx/CVE-2018-8018.json index e4ab8162059..61d8f4f2353 100644 --- a/2018/8xxx/CVE-2018-8018.json +++ b/2018/8xxx/CVE-2018-8018.json @@ -12,11 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "Ignite", + "product_name" : "Apache Ignite", "version" : { "version_data" : [ { - "version_value" : "2.5 and earlier" + "version_value" : "2.5.x before 2.5.3" + }, + { + "version_value" : "2.4.x before 2.4.8" } ] } diff --git a/2018/8xxx/CVE-2018-8019.json b/2018/8xxx/CVE-2018-8019.json index c3e2e227403..481807d1dd5 100644 --- a/2018/8xxx/CVE-2018-8019.json +++ b/2018/8xxx/CVE-2018-8019.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat Native Connector", + "product_name" : "Apache Tomcat Native", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8020.json b/2018/8xxx/CVE-2018-8020.json index 9e37063d8a4..a64e3107eab 100644 --- a/2018/8xxx/CVE-2018-8020.json +++ b/2018/8xxx/CVE-2018-8020.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat Native Connector", + "product_name" : "Apache Tomcat Native", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8021.json b/2018/8xxx/CVE-2018-8021.json index 07f0f3ad346..fff9cdac524 100644 --- a/2018/8xxx/CVE-2018-8021.json +++ b/2018/8xxx/CVE-2018-8021.json @@ -15,14 +15,14 @@ "version" : { "version_data" : [ { - "version_value" : "Superset prior to 0.23" + "version_value" : "prior to 0.23" } ] } } ] }, - "vendor_name" : "Apache Software Foundation" + "vendor_name" : "" } ] } diff --git a/2018/8xxx/CVE-2018-8023.json b/2018/8xxx/CVE-2018-8023.json index 2edf4eeb766..b1cb265fc49 100644 --- a/2018/8xxx/CVE-2018-8023.json +++ b/2018/8xxx/CVE-2018-8023.json @@ -12,11 +12,17 @@ "product" : { "product_data" : [ { - "product_name" : "Mesos", + "product_name" : "Apache Mesos", "version" : { "version_data" : [ { - "version_value" : "1.4.0 to 1.6.0" + "version_value" : "versions prior to 1.4.2" + }, + { + "version_value" : "1.5.0, 1.5.1" + }, + { + "version_value" : "1.6.0" } ] } diff --git a/2018/8xxx/CVE-2018-8024.json b/2018/8xxx/CVE-2018-8024.json index 2158280c4b9..6be1d59db1d 100644 --- a/2018/8xxx/CVE-2018-8024.json +++ b/2018/8xxx/CVE-2018-8024.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Spark", + "product_name" : "Apache Spark", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8026.json b/2018/8xxx/CVE-2018-8026.json index ccfff5953bf..848bb41992c 100644 --- a/2018/8xxx/CVE-2018-8026.json +++ b/2018/8xxx/CVE-2018-8026.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Solr", + "product_name" : "Apache Solr", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8027.json b/2018/8xxx/CVE-2018-8027.json index d6c13ff882b..73881684d2f 100644 --- a/2018/8xxx/CVE-2018-8027.json +++ b/2018/8xxx/CVE-2018-8027.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Camel", + "product_name" : "Apache Camel", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8030.json b/2018/8xxx/CVE-2018-8030.json index f8bdc052e98..ba68e497dff 100644 --- a/2018/8xxx/CVE-2018-8030.json +++ b/2018/8xxx/CVE-2018-8030.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Qpid Broker-J", + "product_name" : "Apache Qpid Broker-J", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8031.json b/2018/8xxx/CVE-2018-8031.json index 4fc2d99403f..c3d90a4da5e 100644 --- a/2018/8xxx/CVE-2018-8031.json +++ b/2018/8xxx/CVE-2018-8031.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "TomEE", + "product_name" : "Apache TomEE", "version" : { "version_data" : [ { @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "The TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863." + "value" : "The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigated by removing the application after TomEE is setup (if using the application to install TomEE), using one of the provided pre-configured bundles, or by upgrading to TomEE 7.0.5. This issue is resolve in this commit: b8bbf50c23ce97dd64f3a5d77f78f84e47579863." } ] }, diff --git a/2018/8xxx/CVE-2018-8032.json b/2018/8xxx/CVE-2018-8032.json index f2fc3b8355f..ab78db279e2 100644 --- a/2018/8xxx/CVE-2018-8032.json +++ b/2018/8xxx/CVE-2018-8032.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Axis", + "product_name" : "Apache Axis", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8034.json b/2018/8xxx/CVE-2018-8034.json index 6f4ce74a797..dd24111a992 100644 --- a/2018/8xxx/CVE-2018-8034.json +++ b/2018/8xxx/CVE-2018-8034.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8036.json b/2018/8xxx/CVE-2018-8036.json index 34d46a43ba3..2b971b485be 100644 --- a/2018/8xxx/CVE-2018-8036.json +++ b/2018/8xxx/CVE-2018-8036.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "PDFBox", + "product_name" : "Apache PDFBox", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8037.json b/2018/8xxx/CVE-2018-8037.json index ccd4637bade..8fe293cd814 100644 --- a/2018/8xxx/CVE-2018-8037.json +++ b/2018/8xxx/CVE-2018-8037.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Tomcat", + "product_name" : "Apache Tomcat", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8038.json b/2018/8xxx/CVE-2018-8038.json index e06aa4246e4..53c67cc3f82 100644 --- a/2018/8xxx/CVE-2018-8038.json +++ b/2018/8xxx/CVE-2018-8038.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "CXF Fediz", + "product_name" : "Apache CXF Fediz", "version" : { "version_data" : [ { diff --git a/2018/8xxx/CVE-2018-8039.json b/2018/8xxx/CVE-2018-8039.json index e37c4165a99..136e880d612 100644 --- a/2018/8xxx/CVE-2018-8039.json +++ b/2018/8xxx/CVE-2018-8039.json @@ -12,11 +12,14 @@ "product" : { "product_data" : [ { - "product_name" : "CXF", + "product_name" : "Apache CXF", "version" : { "version_data" : [ { - "version_value" : "prior to 3.2.5 and 3.1.16" + "version_value" : "prior to 3.1.16" + }, + { + "version_value" : "3.2.x prior to 3.2.5" } ] } diff --git a/2018/8xxx/CVE-2018-8042.json b/2018/8xxx/CVE-2018-8042.json index a655ea09087..49e910fefe5 100644 --- a/2018/8xxx/CVE-2018-8042.json +++ b/2018/8xxx/CVE-2018-8042.json @@ -12,7 +12,7 @@ "product" : { "product_data" : [ { - "product_name" : "Ambari", + "product_name" : "Apache Ambari", "version" : { "version_data" : [ {