"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-18 01:10:56 +00:00
parent 9dd0daeb96
commit 717a0f0ed5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
48 changed files with 3380 additions and 3380 deletions

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-2086", "ID": "CVE-2007-2086",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple PHP remote file inclusion vulnerabilities in CNStats 2.9 allow remote attackers to execute arbitrary PHP code via a URL in the bj parameter to (1) who_r.php or (2) who_s.php in reports/."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "3741", "description_data": [
"refsource" : "EXPLOIT-DB", {
"url" : "https://www.exploit-db.com/exploits/3741" "lang": "eng",
}, "value": "Multiple PHP remote file inclusion vulnerabilities in CNStats 2.9 allow remote attackers to execute arbitrary PHP code via a URL in the bj parameter to (1) who_r.php or (2) who_s.php in reports/."
{ }
"name" : "23501", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/23501" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "24902", "description": [
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/24902" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "cnstats-whor-file-include(33672)", ]
"refsource" : "XF", }
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33672" ]
} },
] "references": {
} "reference_data": [
{
"name": "24902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24902"
},
{
"name": "3741",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/3741"
},
{
"name": "cnstats-whor-file-include(33672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33672"
},
{
"name": "23501",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23501"
}
]
}
} }

View File

@ -1,102 +1,102 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID" : "CVE-2007-2241", "ID": "CVE-2007-2241",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in query.c in ISC BIND 9.4.0, and 9.5.0a1 through 9.5.0a3, when recursion is enabled, allows remote attackers to cause a denial of service (daemon exit) via a sequence of queries processed by the query_addsoa function."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.isc.org/index.pl?/sw/bind/bind-security.php" "lang": "eng",
}, "value": "Unspecified vulnerability in query.c in ISC BIND 9.4.0, and 9.5.0a1 through 9.5.0a3, when recursion is enabled, allows remote attackers to cause a denial of service (daemon exit) via a sequence of queries processed by the query_addsoa function."
{ }
"name" : "MDKSA-2007:100", ]
"refsource" : "MANDRIVA", },
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:100" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "VU#718460", "description": [
"refsource" : "CERT-VN", {
"url" : "http://www.kb.cert.org/vuls/id/718460" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "23738", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/23738" ]
}, },
{ "references": {
"name" : "ADV-2007-1593", "reference_data": [
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2007/1593" "name": "MDKSA-2007:100",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:100"
"name" : "34748", },
"refsource" : "OSVDB", {
"url" : "http://osvdb.org/34748" "name": "VU#718460",
}, "refsource": "CERT-VN",
{ "url": "http://www.kb.cert.org/vuls/id/718460"
"name" : "1017985", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id?1017985" "name": "25070",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/25070"
"name" : "25070", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/25070" "name": "bind-queryaddsoa-dos(33988)",
}, "refsource": "XF",
{ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33988"
"name" : "bind-queryaddsoa-dos(33988)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33988" "name": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
} "refsource": "CONFIRM",
] "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
} },
{
"name": "23738",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23738"
},
{
"name": "1017985",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017985"
},
{
"name": "34748",
"refsource": "OSVDB",
"url": "http://osvdb.org/34748"
},
{
"name": "ADV-2007-1593",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1593"
}
]
}
} }

View File

@ -1,147 +1,147 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2007-3381", "ID": "CVE-2007-3381",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The GDM daemon in GNOME Display Manager (GDM) before 2.14.13, 2.16.x before 2.16.7, 2.18.x before 2.18.4, and 2.19.x before 2.19.5 does not properly handle NULL return values from the g_strsplit function, which allows local users to cause a denial of service (persistent daemon crash) via a crafted command to the daemon's socket, related to (1) gdm.c and (2) gdmconfig.c in daemon/, and (3) gdmconfig.c and (4) gdmflexiserver.c in gui/."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20070803 FLEA-2007-0041-1 gdm", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/475451/30/5550/threaded" "lang": "eng",
}, "value": "The GDM daemon in GNOME Display Manager (GDM) before 2.14.13, 2.16.x before 2.16.7, 2.18.x before 2.18.4, and 2.19.x before 2.19.5 does not properly handle NULL return values from the g_strsplit function, which allows local users to cause a denial of service (persistent daemon crash) via a crafted command to the daemon's socket, related to (1) gdm.c and (2) gdmconfig.c in daemon/, and (3) gdmconfig.c and (4) gdmflexiserver.c in gui/."
{ }
"name" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes", ]
"refsource" : "CONFIRM", },
"url" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news", "description": [
"refsource" : "CONFIRM", {
"url" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news", ]
"refsource" : "CONFIRM", }
"url" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news" ]
}, },
{ "references": {
"name" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news", "reference_data": [
"refsource" : "CONFIRM", {
"url" : "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news" "name": "GLSA-200709-11",
}, "refsource": "GENTOO",
{ "url": "http://security.gentoo.org/glsa/glsa-200709-11.xml"
"name" : "https://issues.rpath.com/browse/RPL-1599", },
"refsource" : "CONFIRM", {
"url" : "https://issues.rpath.com/browse/RPL-1599" "name": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes",
}, "refsource": "CONFIRM",
{ "url": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes"
"name" : "GLSA-200709-11", },
"refsource" : "GENTOO", {
"url" : "http://security.gentoo.org/glsa/glsa-200709-11.xml" "name": "26313",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/26313"
"name" : "MDKSA-2007:169", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:169" "name": "ADV-2007-2781",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2007/2781"
"name" : "RHSA-2007:0777", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0777.html" "name": "25191",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/25191"
"name" : "25191", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/25191" "name": "26879",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/26879"
"name" : "oval:org.mitre.oval:def:10887", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887" "name": "oval:org.mitre.oval:def:10887",
}, "refsource": "OVAL",
{ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887"
"name" : "ADV-2007-2781", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2007/2781" "name": "https://issues.rpath.com/browse/RPL-1599",
}, "refsource": "CONFIRM",
{ "url": "https://issues.rpath.com/browse/RPL-1599"
"name" : "1018523", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id?1018523" "name": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news",
}, "refsource": "CONFIRM",
{ "url": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news"
"name" : "26313", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/26313" "name": "26368",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/26368"
"name" : "26368", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/26368" "name": "MDKSA-2007:169",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:169"
"name" : "26520", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/26520" "name": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news",
}, "refsource": "CONFIRM",
{ "url": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news"
"name" : "26900", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/26900" "name": "20070803 FLEA-2007-0041-1 gdm",
}, "refsource": "BUGTRAQ",
{ "url": "http://www.securityfocus.com/archive/1/475451/30/5550/threaded"
"name" : "26879", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/26879" "name": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news",
} "refsource": "CONFIRM",
] "url": "http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news"
} },
{
"name": "RHSA-2007:0777",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0777.html"
},
{
"name": "1018523",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018523"
},
{
"name": "26900",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26900"
},
{
"name": "26520",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26520"
}
]
}
} }

View File

@ -1,162 +1,162 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-3389", "ID": "CVE-2007-3389",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html" "lang": "eng",
}, "value": "Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload."
{ }
"name" : "http://www.wireshark.org/security/wnpa-sec-2007-02.html", ]
"refsource" : "CONFIRM", },
"url" : "http://www.wireshark.org/security/wnpa-sec-2007-02.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "https://issues.rpath.com/browse/RPL-1498", "description": [
"refsource" : "CONFIRM", {
"url" : "https://issues.rpath.com/browse/RPL-1498" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "GLSA-200708-12", ]
"refsource" : "GENTOO", }
"url" : "http://security.gentoo.org/glsa/glsa-200708-12.xml" ]
}, },
{ "references": {
"name" : "MDKSA-2007:145", "reference_data": [
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:145" "name": "25833",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/25833"
"name" : "RHSA-2007:0710", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0710.html" "name": "37643",
}, "refsource": "OSVDB",
{ "url": "http://osvdb.org/37643"
"name" : "RHSA-2007:0709", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0709.html" "name": "RHSA-2008:0059",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2008-0059.html"
"name" : "RHSA-2008:0059", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0059.html" "name": "http://www.wireshark.org/security/wnpa-sec-2007-02.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.wireshark.org/security/wnpa-sec-2007-02.html"
"name" : "SUSE-SR:2007:015", },
"refsource" : "SUSE", {
"url" : "http://www.novell.com/linux/security/advisories/2007_15_sr.html" "name": "RHSA-2007:0710",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2007-0710.html"
"name" : "24662", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/24662" "name": "26499",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/26499"
"name" : "37643", },
"refsource" : "OSVDB", {
"url" : "http://osvdb.org/37643" "name": "25987",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/25987"
"name" : "oval:org.mitre.oval:def:9964", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9964" "name": "26004",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/26004"
"name" : "ADV-2007-2353", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2007/2353" "name": "GLSA-200708-12",
}, "refsource": "GENTOO",
{ "url": "http://security.gentoo.org/glsa/glsa-200708-12.xml"
"name" : "1018315", },
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id?1018315" "name": "wireshark-chunkedhttp-dos(35207)",
}, "refsource": "XF",
{ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35207"
"name" : "26004", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/26004" "name": "RHSA-2007:0709",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2007-0709.html"
"name" : "25833", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/25833" "name": "MDKSA-2007:145",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:145"
"name" : "25987", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/25987" "name": "27592",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/27592"
"name" : "26499", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/26499" "name": "oval:org.mitre.oval:def:9964",
}, "refsource": "OVAL",
{ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9964"
"name" : "27592", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/27592" "name": "1018315",
}, "refsource": "SECTRACK",
{ "url": "http://www.securitytracker.com/id?1018315"
"name" : "28583", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28583" "name": "https://issues.rpath.com/browse/RPL-1498",
}, "refsource": "CONFIRM",
{ "url": "https://issues.rpath.com/browse/RPL-1498"
"name" : "wireshark-chunkedhttp-dos(35207)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35207" "name": "24662",
} "refsource": "BID",
] "url": "http://www.securityfocus.com/bid/24662"
} },
{
"name": "28583",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28583"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html",
"refsource": "CONFIRM",
"url": "http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html"
},
{
"name": "ADV-2007-2353",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2353"
},
{
"name": "SUSE-SR:2007:015",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
}
]
}
} }

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-3667", "ID": "CVE-2007-3667",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in EXCLEXPT.DLL in ActiveReportsExcelReport allows remote attackers to cause a denial of service via the DDRow Height variable."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20070707 [Eleytt] 7LIPIEC2007", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/473187" "lang": "eng",
}, "value": "Unspecified vulnerability in EXCLEXPT.DLL in ActiveReportsExcelReport allows remote attackers to cause a denial of service via the DDRow Height variable."
{ }
"name" : "24815", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/24815" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "activereports-exclexpt-dos(35866)", "description": [
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35866" "lang": "eng",
} "value": "n/a"
] }
} ]
}
]
},
"references": {
"reference_data": [
{
"name": "20070707 [Eleytt] 7LIPIEC2007",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/473187"
},
{
"name": "activereports-exclexpt-dos(35866)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35866"
},
{
"name": "24815",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24815"
}
]
}
} }

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-6414", "ID": "CVE-2007-6414",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "admin/administrator.php in Adult Script 1.6 and earlier sends a redirect to the web browser but does not exit, which allows remote attackers to bypass authentication and obtain administrative credentials via a direct request. NOTE: this can be leveraged for arbitrary code execution through a request to admin/videolinks_view.php."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "4731", "description_data": [
"refsource" : "EXPLOIT-DB", {
"url" : "https://www.exploit-db.com/exploits/4731" "lang": "eng",
}, "value": "admin/administrator.php in Adult Script 1.6 and earlier sends a redirect to the web browser but does not exit, which allows remote attackers to bypass authentication and obtain administrative credentials via a direct request. NOTE: this can be leveraged for arbitrary code execution through a request to admin/videolinks_view.php."
{ }
"name" : "26870", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/26870" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "28064", "description": [
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28064" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "adultscript-administrator-security-bypass(39034)", ]
"refsource" : "XF", }
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39034" ]
} },
] "references": {
} "reference_data": [
{
"name": "adultscript-administrator-security-bypass(39034)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39034"
},
{
"name": "4731",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/4731"
},
{
"name": "28064",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28064"
},
{
"name": "26870",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26870"
}
]
}
} }

View File

@ -1,377 +1,377 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-6428", "ID": "CVE-2007-6428",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20080117 Multiple Vendor X Server TOG-CUP Extension Information Disclosure Vulnerability", "description_data": [
"refsource" : "IDEFENSE", {
"url" : "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=644" "lang": "eng",
}, "value": "The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index."
{ }
"name" : "20080130 rPSA-2008-0032-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", ]
"refsource" : "BUGTRAQ", },
"url" : "http://www.securityfocus.com/archive/1/487335/100/0/threaded" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "[xorg] 20080117 X.Org security advisory: multiple vulnerabilities in the X server", "description": [
"refsource" : "MLIST", {
"url" : "http://lists.freedesktop.org/archives/xorg/2008-January/031918.html" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=204362", ]
"refsource" : "CONFIRM", }
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=204362" ]
}, },
{ "references": {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-039.htm", "reference_data": [
"refsource" : "CONFIRM", {
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-039.htm" "name": "28542",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28542"
"name" : "https://issues.rpath.com/browse/RPL-2010", },
"refsource" : "CONFIRM", {
"url" : "https://issues.rpath.com/browse/RPL-2010" "name": "29139",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/29139"
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2008-078.htm", },
"refsource" : "CONFIRM", {
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2008-078.htm" "name": "27336",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/27336"
"name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX61&path=/200802/SECURITY/20080227/datafile112539&label=AIX%20X%20server%20multiple%20vulnerabilities", },
"refsource" : "CONFIRM", {
"url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX61&path=/200802/SECURITY/20080227/datafile112539&label=AIX%20X%20server%20multiple%20vulnerabilities" "name": "oval:org.mitre.oval:def:11754",
}, "refsource": "OVAL",
{ "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11754"
"name" : "http://docs.info.apple.com/article.html?artnum=307562", },
"refsource" : "CONFIRM", {
"url" : "http://docs.info.apple.com/article.html?artnum=307562" "name": "ADV-2008-0184",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2008/0184"
"name" : "APPLE-SA-2008-03-18", },
"refsource" : "APPLE", {
"url" : "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" "name": "29622",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/29622"
"name" : "DSA-1466", },
"refsource" : "DEBIAN", {
"url" : "http://www.debian.org/security/2008/dsa-1466" "name": "FEDORA-2008-0831",
}, "refsource": "FEDORA",
{ "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00704.html"
"name" : "FEDORA-2008-0760", },
"refsource" : "FEDORA", {
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00641.html" "name": "SUSE-SA:2008:003",
}, "refsource": "SUSE",
{ "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00004.html"
"name" : "FEDORA-2008-0831", },
"refsource" : "FEDORA", {
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00704.html" "name": "SUSE-SR:2008:008",
}, "refsource": "SUSE",
{ "url": "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html"
"name" : "GLSA-200801-09", },
"refsource" : "GENTOO", {
"url" : "http://security.gentoo.org/glsa/glsa-200801-09.xml" "name": "28532",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28532"
"name" : "GLSA-200804-05", },
"refsource" : "GENTOO", {
"url" : "http://security.gentoo.org/glsa/glsa-200804-05.xml" "name": "29707",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/29707"
"name" : "GLSA-200805-07", },
"refsource" : "GENTOO", {
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml" "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-078.htm",
}, "refsource": "CONFIRM",
{ "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-078.htm"
"name" : "MDVSA-2008:021", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:021" "name": "28843",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28843"
"name" : "MDVSA-2008:022", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:022" "name": "DSA-1466",
}, "refsource": "DEBIAN",
{ "url": "http://www.debian.org/security/2008/dsa-1466"
"name" : "MDVSA-2008:023", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:023" "name": "28540",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28540"
"name" : "MDVSA-2008:025", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:025" "name": "20080130 rPSA-2008-0032-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs",
}, "refsource": "BUGTRAQ",
{ "url": "http://www.securityfocus.com/archive/1/487335/100/0/threaded"
"name" : "[4.1] 20080208 012: SECURITY FIX: February 8, 2008", },
"refsource" : "OPENBSD", {
"url" : "http://www.openbsd.org/errata41.html#012_xorg" "name": "ADV-2008-0703",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2008/0703"
"name" : "[4.2] 20080208 006: SECURITY FIX: February 8, 2008", },
"refsource" : "OPENBSD", {
"url" : "http://www.openbsd.org/errata42.html#006_xorg" "name": "MDVSA-2008:021",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:021"
"name" : "RHSA-2008:0029", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0029.html" "name": "ADV-2008-0924",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2008/0924/references"
"name" : "RHSA-2008:0030", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0030.html" "name": "28718",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28718"
"name" : "RHSA-2008:0031", },
"refsource" : "REDHAT", {
"url" : "http://www.redhat.com/support/errata/RHSA-2008-0031.html" "name": "200153",
}, "refsource": "SUNALERT",
{ "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-200153-1"
"name" : "103200", },
"refsource" : "SUNALERT", {
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103200-1" "name": "RHSA-2008:0029",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2008-0029.html"
"name" : "200153", },
"refsource" : "SUNALERT", {
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-200153-1" "name": "28584",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28584"
"name" : "SUSE-SA:2008:003", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00004.html" "name": "[4.1] 20080208 012: SECURITY FIX: February 8, 2008",
}, "refsource": "OPENBSD",
{ "url": "http://www.openbsd.org/errata41.html#012_xorg"
"name" : "SUSE-SR:2008:003", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" "name": "28941",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28941"
"name" : "SUSE-SR:2008:008", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html" "name": "28592",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28592"
"name" : "USN-571-1", },
"refsource" : "UBUNTU", {
"url" : "https://usn.ubuntu.com/571-1/" "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-039.htm",
}, "refsource": "CONFIRM",
{ "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-039.htm"
"name" : "27336", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/27336" "name": "29420",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/29420"
"name" : "27355", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/27355" "name": "MDVSA-2008:022",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:022"
"name" : "oval:org.mitre.oval:def:11754", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11754" "name": "APPLE-SA-2008-03-18",
}, "refsource": "APPLE",
{ "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
"name" : "ADV-2008-0179", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2008/0179" "name": "30161",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/30161"
"name" : "ADV-2008-0184", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2008/0184" "name": "GLSA-200805-07",
}, "refsource": "GENTOO",
{ "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
"name" : "ADV-2008-0497", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2008/0497/references" "name": "RHSA-2008:0030",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2008-0030.html"
"name" : "ADV-2008-0703", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2008/0703" "name": "28543",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28543"
"name" : "ADV-2008-0924", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2008/0924/references" "name": "28273",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28273"
"name" : "1019232", },
"refsource" : "SECTRACK", {
"url" : "http://securitytracker.com/id?1019232" "name": "RHSA-2008:0031",
}, "refsource": "REDHAT",
{ "url": "http://www.redhat.com/support/errata/RHSA-2008-0031.html"
"name" : "28532", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28532" "name": "28550",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28550"
"name" : "28535", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28535" "name": "ADV-2008-0497",
}, "refsource": "VUPEN",
{ "url": "http://www.vupen.com/english/advisories/2008/0497/references"
"name" : "28536", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28536" "name": "http://bugs.gentoo.org/show_bug.cgi?id=204362",
}, "refsource": "CONFIRM",
{ "url": "http://bugs.gentoo.org/show_bug.cgi?id=204362"
"name" : "28539", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28539" "name": "MDVSA-2008:023",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:023"
"name" : "28540", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28540" "name": "28885",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28885"
"name" : "28542", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28542" "name": "103200",
}, "refsource": "SUNALERT",
{ "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103200-1"
"name" : "28543", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28543" "name": "MDVSA-2008:025",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:025"
"name" : "28550", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28550" "name": "USN-571-1",
}, "refsource": "UBUNTU",
{ "url": "https://usn.ubuntu.com/571-1/"
"name" : "28273", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28273" "name": "GLSA-200804-05",
}, "refsource": "GENTOO",
{ "url": "http://security.gentoo.org/glsa/glsa-200804-05.xml"
"name" : "28592", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28592" "name": "28535",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28535"
"name" : "28616", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28616" "name": "http://docs.info.apple.com/article.html?artnum=307562",
}, "refsource": "CONFIRM",
{ "url": "http://docs.info.apple.com/article.html?artnum=307562"
"name" : "28584", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28584" "name": "[xorg] 20080117 X.Org security advisory: multiple vulnerabilities in the X server",
}, "refsource": "MLIST",
{ "url": "http://lists.freedesktop.org/archives/xorg/2008-January/031918.html"
"name" : "28693", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28693" "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX61&path=/200802/SECURITY/20080227/datafile112539&label=AIX%20X%20server%20multiple%20vulnerabilities",
}, "refsource": "CONFIRM",
{ "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=7&heading=AIX61&path=/200802/SECURITY/20080227/datafile112539&label=AIX%20X%20server%20multiple%20vulnerabilities"
"name" : "28718", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28718" "name": "27355",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/27355"
"name" : "28838", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28838" "name": "xorg-togcup-information-disclosure(39761)",
}, "refsource": "XF",
{ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39761"
"name" : "28843", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28843" "name": "28838",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28838"
"name" : "28885", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28885" "name": "1019232",
}, "refsource": "SECTRACK",
{ "url": "http://securitytracker.com/id?1019232"
"name" : "28941", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28941" "name": "https://issues.rpath.com/browse/RPL-2010",
}, "refsource": "CONFIRM",
{ "url": "https://issues.rpath.com/browse/RPL-2010"
"name" : "29139", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/29139" "name": "[4.2] 20080208 006: SECURITY FIX: February 8, 2008",
}, "refsource": "OPENBSD",
{ "url": "http://www.openbsd.org/errata42.html#006_xorg"
"name" : "29420", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/29420" "name": "28539",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28539"
"name" : "29622", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/29622" "name": "20080117 Multiple Vendor X Server TOG-CUP Extension Information Disclosure Vulnerability",
}, "refsource": "IDEFENSE",
{ "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=644"
"name" : "29707", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/29707" "name": "SUSE-SR:2008:003",
}, "refsource": "SUSE",
{ "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"
"name" : "30161", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/30161" "name": "28616",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28616"
"name" : "xorg-togcup-information-disclosure(39761)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39761" "name": "FEDORA-2008-0760",
} "refsource": "FEDORA",
] "url": "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00641.html"
} },
{
"name": "28536",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28536"
},
{
"name": "28693",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28693"
},
{
"name": "GLSA-200801-09",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200801-09.xml"
},
{
"name": "ADV-2008-0179",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0179"
}
]
}
} }

View File

@ -1,92 +1,92 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2007-6610", "ID": "CVE-2007-6610",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437" "lang": "eng",
}, "value": "unp 1.0.12, and other versions before 1.0.14, does not properly escape file names, which might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument. NOTE: this might only be a vulnerability when unp is invoked by a third party product."
{ }
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=203106", ]
"refsource" : "CONFIRM", },
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=203106" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "GLSA-200801-01", "description": [
"refsource" : "GENTOO", {
"url" : "http://security.gentoo.org/glsa/glsa-200801-01.xml" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "27182", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/27182" ]
}, },
{ "references": {
"name" : "42759", "reference_data": [
"refsource" : "OSVDB", {
"url" : "http://osvdb.org/42759" "name": "28388",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/28388"
"name" : "28282", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28282" "name": "http://bugs.gentoo.org/show_bug.cgi?id=203106",
}, "refsource": "CONFIRM",
{ "url": "http://bugs.gentoo.org/show_bug.cgi?id=203106"
"name" : "28388", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/28388" "name": "28282",
} "refsource": "SECUNIA",
] "url": "http://secunia.com/advisories/28282"
} },
{
"name": "27182",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27182"
},
{
"name": "GLSA-200801-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200801-01.xml"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448437"
},
{
"name": "42759",
"refsource": "OSVDB",
"url": "http://osvdb.org/42759"
}
]
}
} }

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "hp-security-alert@hp.com",
"ID" : "CVE-2010-0448", "ID": "CVE-2010-0448",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in HP SOA Registry Foundation 6.63 and 6.64 allows remote attackers to obtain \"unauthorized access to data\" via unknown vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "HPSBMA02490", "description_data": [
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=126996774125378&w=2" "lang": "eng",
}, "value": "Unspecified vulnerability in HP SOA Registry Foundation 6.63 and 6.64 allows remote attackers to obtain \"unauthorized access to data\" via unknown vectors."
{ }
"name" : "SSRT090222", ]
"refsource" : "HP", },
"url" : "http://marc.info/?l=bugtraq&m=126996774125378&w=2" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "39059", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/39059" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "1023765", ]
"refsource" : "SECTRACK", }
"url" : "http://www.securitytracker.com/id?1023765" ]
}, },
{ "references": {
"name" : "39187", "reference_data": [
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/39187" "name": "HPSBMA02490",
} "refsource": "HP",
] "url": "http://marc.info/?l=bugtraq&m=126996774125378&w=2"
} },
{
"name": "1023765",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023765"
},
{
"name": "SSRT090222",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=126996774125378&w=2"
},
{
"name": "39187",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39187"
},
{
"name": "39059",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/39059"
}
]
}
} }

View File

@ -1,62 +1,62 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID" : "CVE-2010-0907", "ID": "CVE-2010-0907",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in Oracle Secure Backup 10.3.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0898, CVE-2010-0899, CVE-2010-0904, and CVE-2010-0906."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html" "lang": "eng",
} "value": "Unspecified vulnerability in Oracle Secure Backup 10.3.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0898, CVE-2010-0899, CVE-2010-0904, and CVE-2010-0906."
] }
} ]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
}
]
}
} }

View File

@ -1,102 +1,102 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-1333", "ID": "CVE-2010-1333",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in Almas Inc. Compiere J300_A02 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.compiere-japan.com/products/release/patch.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.compiere-japan.com/products/release/patch.html" "lang": "eng",
}, "value": "Multiple cross-site scripting (XSS) vulnerabilities in Almas Inc. Compiere J300_A02 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
{ }
"name" : "JVN#38687002", ]
"refsource" : "JVN", },
"url" : "http://jvn.jp/en/jp/JVN38687002/index.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "JVN#57963254", "description": [
"refsource" : "JVN", {
"url" : "http://jvn.jp/en/jp/JVN57963254/index.html" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "JVNDB-2010-000008", ]
"refsource" : "JVNDB", }
"url" : "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000008.html" ]
}, },
{ "references": {
"name" : "JVNDB-2010-000009", "reference_data": [
"refsource" : "JVNDB", {
"url" : "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000009.html" "name": "http://www.compiere-japan.com/products/release/patch.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.compiere-japan.com/products/release/patch.html"
"name" : "63419", },
"refsource" : "OSVDB", {
"url" : "http://osvdb.org/63419" "name": "JVNDB-2010-000009",
}, "refsource": "JVNDB",
{ "url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000009.html"
"name" : "39177", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/39177" "name": "JVN#38687002",
}, "refsource": "JVN",
{ "url": "http://jvn.jp/en/jp/JVN38687002/index.html"
"name" : "compiere-unspec-xss(57494)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57494" "name": "JVNDB-2010-000008",
}, "refsource": "JVNDB",
{ "url": "http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000008.html"
"name" : "compiere-unspecified-xss(57493)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/57493" "name": "63419",
} "refsource": "OSVDB",
] "url": "http://osvdb.org/63419"
} },
{
"name": "compiere-unspec-xss(57494)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57494"
},
{
"name": "JVN#57963254",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN57963254/index.html"
},
{
"name": "compiere-unspecified-xss(57493)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57493"
},
{
"name": "39177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39177"
}
]
}
} }

View File

@ -1,67 +1,67 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2010-1383", "ID": "CVE-2010-1383",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "CFNetwork in Apple Safari before 5.0.6 on Windows allows remote web servers to execute arbitrary code by replaying the NTLM credentials of a client user, related to a \"credential reflection\" issue."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://support.apple.com/kb/HT4808", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://support.apple.com/kb/HT4808" "lang": "eng",
}, "value": "CFNetwork in Apple Safari before 5.0.6 on Windows allows remote web servers to execute arbitrary code by replaying the NTLM credentials of a client user, related to a \"credential reflection\" issue."
{ }
"name" : "APPLE-SA-2011-07-20-1", ]
"refsource" : "APPLE", },
"url" : "http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" "problemtype": {
} "problemtype_data": [
] {
} "description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT4808",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4808"
},
{
"name": "APPLE-SA-2011-07-20-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html"
}
]
}
} }

View File

@ -1,102 +1,102 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-1728", "ID": "CVE-2010-1728",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Opera before 10.53 on Windows and Mac OS X does not properly handle a series of document modifications that occur asynchronously, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop, leading to attempted use of uninitialized memory. NOTE: this might overlap CVE-2006-6955."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://h.ackack.net/?p=258", "description_data": [
"refsource" : "MISC", {
"url" : "http://h.ackack.net/?p=258" "lang": "eng",
}, "value": "Opera before 10.53 on Windows and Mac OS X does not properly handle a series of document modifications that occur asynchronously, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop, leading to attempted use of uninitialized memory. NOTE: this might overlap CVE-2006-6955."
{ }
"name" : "http://my.opera.com/desktopteam/blog/2010/04/28/opera-10-53-rc1-for-windows-and-mac", ]
"refsource" : "CONFIRM", },
"url" : "http://my.opera.com/desktopteam/blog/2010/04/28/opera-10-53-rc1-for-windows-and-mac" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://www.opera.com/docs/changelogs/mac/1053/", "description": [
"refsource" : "CONFIRM", {
"url" : "http://www.opera.com/docs/changelogs/mac/1053/" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://www.opera.com/docs/changelogs/windows/1053/", ]
"refsource" : "CONFIRM", }
"url" : "http://www.opera.com/docs/changelogs/windows/1053/" ]
}, },
{ "references": {
"name" : "http://www.opera.com/support/kb/view/953/", "reference_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.opera.com/support/kb/view/953/" "name": "http://www.opera.com/docs/changelogs/mac/1053/",
}, "refsource": "CONFIRM",
{ "url": "http://www.opera.com/docs/changelogs/mac/1053/"
"name" : "oval:org.mitre.oval:def:11927", },
"refsource" : "OVAL", {
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11927" "name": "http://www.opera.com/docs/changelogs/windows/1053/",
}, "refsource": "CONFIRM",
{ "url": "http://www.opera.com/docs/changelogs/windows/1053/"
"name" : "39590", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/39590" "name": "http://www.opera.com/support/kb/view/953/",
}, "refsource": "CONFIRM",
{ "url": "http://www.opera.com/support/kb/view/953/"
"name" : "ADV-2010-0999", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/0999" "name": "http://h.ackack.net/?p=258",
}, "refsource": "MISC",
{ "url": "http://h.ackack.net/?p=258"
"name" : "opera-documentwrite-code-execution(58231)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/58231" "name": "ADV-2010-0999",
} "refsource": "VUPEN",
] "url": "http://www.vupen.com/english/advisories/2010/0999"
} },
{
"name": "oval:org.mitre.oval:def:11927",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11927"
},
{
"name": "39590",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39590"
},
{
"name": "opera-documentwrite-code-execution(58231)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58231"
},
{
"name": "http://my.opera.com/desktopteam/blog/2010/04/28/opera-10-53-rc1-for-windows-and-mac",
"refsource": "CONFIRM",
"url": "http://my.opera.com/desktopteam/blog/2010/04/28/opera-10-53-rc1-for-windows-and-mac"
}
]
}
} }

View File

@ -1,92 +1,92 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2010-1853", "ID": "CVE-2010-1853",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple stack-based buffer overflows in the tr_magnetParse function in libtransmission/magnet.c in Transmission 1.91 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted magnet URL with a large number of (1) tr or (2) ws links."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://trac.transmissionbt.com/changeset/10279", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://trac.transmissionbt.com/changeset/10279" "lang": "eng",
}, "value": "Multiple stack-based buffer overflows in the tr_magnetParse function in libtransmission/magnet.c in Transmission 1.91 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted magnet URL with a large number of (1) tr or (2) ws links."
{ }
"name" : "http://trac.transmissionbt.com/ticket/2965", ]
"refsource" : "CONFIRM", },
"url" : "http://trac.transmissionbt.com/ticket/2965" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://trac.transmissionbt.com/wiki/Changes", "description": [
"refsource" : "CONFIRM", {
"url" : "http://trac.transmissionbt.com/wiki/Changes" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "38814", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/38814" ]
}, },
{ "references": {
"name" : "63066", "reference_data": [
"refsource" : "OSVDB", {
"url" : "http://www.osvdb.org/63066" "name": "38814",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/38814"
"name" : "39031", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/39031" "name": "63066",
}, "refsource": "OSVDB",
{ "url": "http://www.osvdb.org/63066"
"name" : "ADV-2010-0655", },
"refsource" : "VUPEN", {
"url" : "http://www.vupen.com/english/advisories/2010/0655" "name": "http://trac.transmissionbt.com/wiki/Changes",
} "refsource": "CONFIRM",
] "url": "http://trac.transmissionbt.com/wiki/Changes"
} },
{
"name": "ADV-2010-0655",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0655"
},
{
"name": "http://trac.transmissionbt.com/ticket/2965",
"refsource": "CONFIRM",
"url": "http://trac.transmissionbt.com/ticket/2965"
},
{
"name": "39031",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39031"
},
{
"name": "http://trac.transmissionbt.com/changeset/10279",
"refsource": "CONFIRM",
"url": "http://trac.transmissionbt.com/changeset/10279"
}
]
}
} }

View File

@ -1,97 +1,97 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2010-5100", "ID": "CVE-2010-5100",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in the Install Tool in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2011/01/13/2" "lang": "eng",
}, "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Install Tool in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."
{ }
"name" : "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE", ]
"refsource" : "MLIST", },
"url" : "http://www.openwall.com/lists/oss-security/2012/05/11/3" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE", "description": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2012/05/10/7" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/", ]
"refsource" : "CONFIRM", }
"url" : "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/" ]
}, },
{ "references": {
"name" : "45470", "reference_data": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/45470" "name": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/",
}, "refsource": "CONFIRM",
{ "url": "http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022/"
"name" : "70120", },
"refsource" : "OSVDB", {
"url" : "http://www.osvdb.org/70120" "name": "45470",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/45470"
"name" : "35770", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/35770" "name": "35770",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/35770"
"name" : "typo3-install-tool-xss(64181)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/64181" "name": "70120",
} "refsource": "OSVDB",
] "url": "http://www.osvdb.org/70120"
} },
{
"name": "[oss-security] 20110113 CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/01/13/2"
},
{
"name": "[oss-security] 20120510 Re: CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/11/3"
},
{
"name": "typo3-install-tool-xss(64181)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64181"
},
{
"name": "[oss-security] 20120511 CVE-request: TYPO3 TYPO3-SA-2010-022 still without CVE",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/10/7"
}
]
}
} }

View File

@ -1,267 +1,267 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2014-0075", "ID": "CVE-2014-0075",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "description_data": [
"refsource" : "BUGTRAQ", {
"url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded" "lang": "eng",
}, "value": "Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data."
{ }
"name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", ]
"refsource" : "FULLDISC", },
"url" : "http://seclists.org/fulldisclosure/2014/Dec/23" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1578337", "description": [
"refsource" : "CONFIRM", {
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1578337" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1578341", ]
"refsource" : "CONFIRM", }
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1578341" ]
}, },
{ "references": {
"name" : "http://svn.apache.org/viewvc?view=revision&revision=1579262", "reference_data": [
"refsource" : "CONFIRM", {
"url" : "http://svn.apache.org/viewvc?view=revision&revision=1579262" "name": "http://svn.apache.org/viewvc?view=revision&revision=1578337",
}, "refsource": "CONFIRM",
{ "url": "http://svn.apache.org/viewvc?view=revision&revision=1578337"
"name" : "http://tomcat.apache.org/security-6.html", },
"refsource" : "CONFIRM", {
"url" : "http://tomcat.apache.org/security-6.html" "name": "http://advisories.mageia.org/MGASA-2014-0268.html",
}, "refsource": "CONFIRM",
{ "url": "http://advisories.mageia.org/MGASA-2014-0268.html"
"name" : "http://tomcat.apache.org/security-7.html", },
"refsource" : "CONFIRM", {
"url" : "http://tomcat.apache.org/security-7.html" "name": "http://www.novell.com/support/kb/doc.php?id=7010166",
}, "refsource": "CONFIRM",
{ "url": "http://www.novell.com/support/kb/doc.php?id=7010166"
"name" : "http://tomcat.apache.org/security-8.html", },
"refsource" : "CONFIRM", {
"url" : "http://tomcat.apache.org/security-8.html" "name": "59121",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/59121"
"name" : "http://www.novell.com/support/kb/doc.php?id=7010166", },
"refsource" : "CONFIRM", {
"url" : "http://www.novell.com/support/kb/doc.php?id=7010166" "name": "RHSA-2015:0765",
}, "refsource": "REDHAT",
{ "url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678231", },
"refsource" : "CONFIRM", {
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678231" "name": "59732",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/59732"
"name" : "http://linux.oracle.com/errata/ELSA-2014-0865.html", },
"refsource" : "CONFIRM", {
"url" : "http://linux.oracle.com/errata/ELSA-2014-0865.html" "name": "59835",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/59835"
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", },
"refsource" : "CONFIRM", {
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" "name": "RHSA-2015:0675",
}, "refsource": "REDHAT",
{ "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21680603", },
"refsource" : "CONFIRM", {
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21680603" "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681528", },
"refsource" : "CONFIRM", {
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21681528" "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21681528",
}, "refsource": "CONFIRM",
{ "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681528"
"name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", },
"refsource" : "CONFIRM", {
"url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" "name": "MDVSA-2015:052",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052"
"name" : "http://advisories.mageia.org/MGASA-2014-0268.html", },
"refsource" : "CONFIRM", {
"url" : "http://advisories.mageia.org/MGASA-2014-0268.html" "name": "RHSA-2015:0720",
}, "refsource": "REDHAT",
{ "url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", },
"refsource" : "CONFIRM", {
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" "name": "59849",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/59849"
"name" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013", },
"refsource" : "CONFIRM", {
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013" "name": "http://linux.oracle.com/errata/ELSA-2014-0865.html",
}, "refsource": "CONFIRM",
{ "url": "http://linux.oracle.com/errata/ELSA-2014-0865.html"
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", },
"refsource" : "CONFIRM", {
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" "name": "MDVSA-2015:084",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084"
"name" : "DSA-3530", },
"refsource" : "DEBIAN", {
"url" : "http://www.debian.org/security/2016/dsa-3530" "name": "DSA-3530",
}, "refsource": "DEBIAN",
{ "url": "http://www.debian.org/security/2016/dsa-3530"
"name" : "DSA-3447", },
"refsource" : "DEBIAN", {
"url" : "http://www.debian.org/security/2016/dsa-3447" "name": "59678",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/59678"
"name" : "FEDORA-2015-2109", },
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html" "name": "http://svn.apache.org/viewvc?view=revision&revision=1578341",
}, "refsource": "CONFIRM",
{ "url": "http://svn.apache.org/viewvc?view=revision&revision=1578341"
"name" : "HPSBUX03150", },
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=141390017113542&w=2" "name": "HPSBUX03102",
}, "refsource": "HP",
{ "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
"name" : "HPSBOV03503", },
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=144498216801440&w=2" "name": "http://tomcat.apache.org/security-7.html",
}, "refsource": "CONFIRM",
{ "url": "http://tomcat.apache.org/security-7.html"
"name" : "HPSBUX03102", },
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2" "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
}, "refsource": "BUGTRAQ",
{ "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
"name" : "SSRT101681", },
"refsource" : "HP", {
"url" : "http://marc.info/?l=bugtraq&m=141017844705317&w=2" "name": "http://svn.apache.org/viewvc?view=revision&revision=1579262",
}, "refsource": "CONFIRM",
{ "url": "http://svn.apache.org/viewvc?view=revision&revision=1579262"
"name" : "MDVSA-2015:052", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:052" "name": "MDVSA-2015:053",
}, "refsource": "MANDRIVA",
{ "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:053"
"name" : "MDVSA-2015:053", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:053" "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
"name" : "MDVSA-2015:084", },
"refsource" : "MANDRIVA", {
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:084" "name": "HPSBUX03150",
}, "refsource": "HP",
{ "url": "http://marc.info/?l=bugtraq&m=141390017113542&w=2"
"name" : "RHSA-2015:0675", },
"refsource" : "REDHAT", {
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0675.html" "name": "FEDORA-2015-2109",
}, "refsource": "FEDORA",
{ "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html"
"name" : "RHSA-2015:0720", },
"refsource" : "REDHAT", {
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0720.html" "name": "67671",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/67671"
"name" : "RHSA-2015:0765", },
"refsource" : "REDHAT", {
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0765.html" "name": "http://tomcat.apache.org/security-8.html",
}, "refsource": "CONFIRM",
{ "url": "http://tomcat.apache.org/security-8.html"
"name" : "67671", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/67671" "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231",
}, "refsource": "CONFIRM",
{ "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231"
"name" : "59616", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59616" "name": "59616",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/59616"
"name" : "59678", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59678" "name": "http://tomcat.apache.org/security-6.html",
}, "refsource": "CONFIRM",
{ "url": "http://tomcat.apache.org/security-6.html"
"name" : "59835", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59835" "name": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013",
}, "refsource": "CONFIRM",
{ "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013"
"name" : "59873", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59873" "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
}, "refsource": "CONFIRM",
{ "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
"name" : "59732", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59732" "name": "59873",
}, "refsource": "SECUNIA",
{ "url": "http://secunia.com/advisories/59873"
"name" : "59849", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59849" "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
}, "refsource": "FULLDISC",
{ "url": "http://seclists.org/fulldisclosure/2014/Dec/23"
"name" : "60729", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/60729" "name": "HPSBOV03503",
}, "refsource": "HP",
{ "url": "http://marc.info/?l=bugtraq&m=144498216801440&w=2"
"name" : "60793", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/60793" "name": "SSRT101681",
}, "refsource": "HP",
{ "url": "http://marc.info/?l=bugtraq&m=141017844705317&w=2"
"name" : "59121", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/59121" "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
} "refsource": "CONFIRM",
] "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
} },
{
"name": "DSA-3447",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3447"
},
{
"name": "60729",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60729"
},
{
"name": "60793",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60793"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21680603",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680603"
}
]
}
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2014-0291", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
}, "ID": "CVE-2014-0291",
"data_format" : "MITRE", "ASSIGNER": "cve@mitre.org",
"data_type" : "CVE", "STATE": "REJECT"
"data_version" : "4.0", },
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none."
} }
] ]
} }
} }

View File

@ -1,67 +1,67 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID" : "CVE-2014-0361", "ID": "CVE-2014-0361",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The default configuration of IBM 4690 OS, as used in Toshiba Global Commerce Solutions 4690 POS and other products, hashes passwords with the ADXCRYPT algorithm, which makes it easier for context-dependent attackers to obtain sensitive information via unspecified cryptanalysis of an ADXCSOUF.DAT file."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=pos1R1005054", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www-01.ibm.com/support/docview.wss?uid=pos1R1005054" "lang": "eng",
}, "value": "The default configuration of IBM 4690 OS, as used in Toshiba Global Commerce Solutions 4690 POS and other products, hashes passwords with the ADXCRYPT algorithm, which makes it easier for context-dependent attackers to obtain sensitive information via unspecified cryptanalysis of an ADXCSOUF.DAT file."
{ }
"name" : "VU#622950", ]
"refsource" : "CERT-VN", },
"url" : "http://www.kb.cert.org/vuls/id/622950" "problemtype": {
} "problemtype_data": [
] {
} "description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#622950",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/622950"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=pos1R1005054",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=pos1R1005054"
}
]
}
} }

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert_us@oracle.com",
"ID" : "CVE-2014-0391", "ID": "CVE-2014-0391",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.1.5, 11.1.1.7, 11.1.2.0, and 11.1.2.1 allows remote attackers to affect confidentiality via unknown vectors related to End User Self Service."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" "lang": "eng",
}, "value": "Unspecified vulnerability in the Oracle Identity Manager component in Oracle Fusion Middleware 11.1.1.5, 11.1.1.7, 11.1.2.0, and 11.1.2.1 allows remote attackers to affect confidentiality via unknown vectors related to End User Self Service."
{ }
"name" : "64758", ]
"refsource" : "BID", },
"url" : "http://www.securityfocus.com/bid/64758" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "64829", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/64829" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "102099", ]
"refsource" : "OSVDB", }
"url" : "http://osvdb.org/102099" ]
}, },
{ "references": {
"name" : "1029613", "reference_data": [
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1029613" "name": "64829",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/64829"
"name" : "56459", },
"refsource" : "SECUNIA", {
"url" : "http://secunia.com/advisories/56459" "name": "1029613",
} "refsource": "SECTRACK",
] "url": "http://www.securitytracker.com/id/1029613"
} },
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "56459",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/56459"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "102099",
"refsource": "OSVDB",
"url": "http://osvdb.org/102099"
}
]
}
} }

View File

@ -1,62 +1,62 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID" : "CVE-2014-0900", "ID": "CVE-2014-0900",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Device Administrator code in Android before 4.4.1_r1 might allow attackers to spoof device administrators and consequently bypass MDM restrictions by leveraging failure to update the mAdminMap data structure."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://securityintelligence.com/how-to-cheat-your-mdm-compliance-without-a-password/", "description_data": [
"refsource" : "MISC", {
"url" : "https://securityintelligence.com/how-to-cheat-your-mdm-compliance-without-a-password/" "lang": "eng",
} "value": "The Device Administrator code in Android before 4.4.1_r1 might allow attackers to spoof device administrators and consequently bypass MDM restrictions by leveraging failure to update the mAdminMap data structure."
] }
} ]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securityintelligence.com/how-to-cheat-your-mdm-compliance-without-a-password/",
"refsource": "MISC",
"url": "https://securityintelligence.com/how-to-cheat-your-mdm-compliance-without-a-password/"
}
]
}
} }

View File

@ -1,92 +1,92 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-1398", "ID": "CVE-2014-1398",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The entity wrapper access API in the Entity API module 7.x-1.x before 7.x-1.3 for Drupal might allow remote authenticated users to bypass intended access restrictions on comment, user and node statistics properties via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20140109 Re: CVE Request: drupal7-entity: multiple access bypass vulnerabilities", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2014/01/09/3" "lang": "eng",
}, "value": "The entity wrapper access API in the Entity API module 7.x-1.x before 7.x-1.3 for Drupal might allow remote authenticated users to bypass intended access restrictions on comment, user and node statistics properties via unspecified vectors."
{ }
"name" : "https://www.drupal.org/node/2169595", ]
"refsource" : "MISC", },
"url" : "https://www.drupal.org/node/2169595" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1050802", "description": [
"refsource" : "CONFIRM", {
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1050802" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "FEDORA-2014-0508", ]
"refsource" : "FEDORA", }
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126811.html" ]
}, },
{ "references": {
"name" : "FEDORA-2014-0509", "reference_data": [
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126816.html" "name": "64729",
}, "refsource": "BID",
{ "url": "http://www.securityfocus.com/bid/64729"
"name" : "64729", },
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/64729" "name": "drupal-entityapi-cve20141398-security-bypass(90215)",
}, "refsource": "XF",
{ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90215"
"name" : "drupal-entityapi-cve20141398-security-bypass(90215)", },
"refsource" : "XF", {
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90215" "name": "FEDORA-2014-0508",
} "refsource": "FEDORA",
] "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126811.html"
} },
{
"name": "FEDORA-2014-0509",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-January/126816.html"
},
{
"name": "[oss-security] 20140109 Re: CVE Request: drupal7-entity: multiple access bypass vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/01/09/3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1050802",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050802"
},
{
"name": "https://www.drupal.org/node/2169595",
"refsource": "MISC",
"url": "https://www.drupal.org/node/2169595"
}
]
}
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2014-1433", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
}, "ID": "CVE-2014-1433",
"data_format" : "MITRE", "ASSIGNER": "cve@mitre.org",
"data_type" : "CVE", "STATE": "REJECT"
"data_version" : "4.0", },
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2014. Notes: none."
} }
] ]
} }
} }

View File

@ -1,87 +1,87 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID" : "CVE-2014-1721", "ID": "CVE-2014-1721",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Google V8, as used in Google Chrome before 34.0.1847.116, does not properly implement lazy deoptimization, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by improper handling of a heap allocation of a number outside the Small Integer (aka smi) range."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html" "lang": "eng",
}, "value": "Google V8, as used in Google Chrome before 34.0.1847.116, does not properly implement lazy deoptimization, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code, as demonstrated by improper handling of a heap allocation of a number outside the Small Integer (aka smi) range."
{ }
"name" : "https://code.google.com/p/chromium/issues/detail?id=350434", ]
"refsource" : "CONFIRM", },
"url" : "https://code.google.com/p/chromium/issues/detail?id=350434" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "https://code.google.com/p/v8/source/detail?r=19834", "description": [
"refsource" : "CONFIRM", {
"url" : "https://code.google.com/p/v8/source/detail?r=19834" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "DSA-2905", ]
"refsource" : "DEBIAN", }
"url" : "http://www.debian.org/security/2014/dsa-2905" ]
}, },
{ "references": {
"name" : "GLSA-201408-16", "reference_data": [
"refsource" : "GENTOO", {
"url" : "http://security.gentoo.org/glsa/glsa-201408-16.xml" "name": "https://code.google.com/p/v8/source/detail?r=19834",
}, "refsource": "CONFIRM",
{ "url": "https://code.google.com/p/v8/source/detail?r=19834"
"name" : "openSUSE-SU-2014:0601", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html" "name": "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html",
} "refsource": "CONFIRM",
] "url": "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html"
} },
{
"name": "openSUSE-SU-2014:0601",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html"
},
{
"name": "GLSA-201408-16",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201408-16.xml"
},
{
"name": "DSA-2905",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2905"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=350434",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=350434"
}
]
}
} }

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2014-1816", "ID": "CVE-2014-1816",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka \"MSXML Entity URI Vulnerability.\""
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx" "lang": "eng",
}, "value": "Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka \"MSXML Entity URI Vulnerability.\""
{ }
"name" : "MS14-033", ]
"refsource" : "MS", },
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-033" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "67895", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/67895" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "58538", ]
"refsource" : "SECUNIA", }
"url" : "http://secunia.com/advisories/58538" ]
} },
] "references": {
} "reference_data": [
{
"name": "MS14-033",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-033"
},
{
"name": "67895",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67895"
},
{
"name": "http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx",
"refsource": "CONFIRM",
"url": "http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx"
},
{
"name": "58538",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58538"
}
]
}
} }

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID" : "CVE-2014-4898", "ID": "CVE-2014-4898",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Harivijay (aka com.upasanhar.marathi.harivijay) application 4.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "description_data": [
"refsource" : "MISC", {
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "lang": "eng",
}, "value": "The Harivijay (aka com.upasanhar.marathi.harivijay) application 4.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
{ }
"name" : "VU#439409", ]
"refsource" : "CERT-VN", },
"url" : "http://www.kb.cert.org/vuls/id/439409" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "VU#582497", "description": [
"refsource" : "CERT-VN", {
"url" : "http://www.kb.cert.org/vuls/id/582497" "lang": "eng",
} "value": "n/a"
] }
} ]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#439409",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/439409"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2014-4984", "ID": "CVE-2014-4984",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID" : "CVE-2014-5959", "ID": "CVE-2014-5959",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The tx Smart (aka com.wooriwm.txsmart) application 7.05 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "description_data": [
"refsource" : "MISC", {
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "lang": "eng",
}, "value": "The tx Smart (aka com.wooriwm.txsmart) application 7.05 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
{ }
"name" : "VU#447329", ]
"refsource" : "CERT-VN", },
"url" : "http://www.kb.cert.org/vuls/id/447329" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "VU#582497", "description": [
"refsource" : "CERT-VN", {
"url" : "http://www.kb.cert.org/vuls/id/582497" "lang": "eng",
} "value": "n/a"
] }
} ]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#447329",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/447329"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}
} }

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID" : "CVE-2014-5971", "ID": "CVE-2014-5971",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Fiksu library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "description_data": [
"refsource" : "MISC", {
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "lang": "eng",
}, "value": "The Fiksu library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
{ }
"name" : "VU#582497", ]
"refsource" : "CERT-VN", },
"url" : "http://www.kb.cert.org/vuls/id/582497" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "VU#849577", "description": [
"refsource" : "CERT-VN", {
"url" : "http://www.kb.cert.org/vuls/id/849577" "lang": "eng",
} "value": "n/a"
] }
} ]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#849577",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/849577"
},
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
}
]
}
} }

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cert@cert.org",
"ID" : "CVE-2014-5997", "ID": "CVE-2014-5997",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Auto Trader (aka za.co.autotrader.android.app) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", "description_data": [
"refsource" : "MISC", {
"url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" "lang": "eng",
}, "value": "The Auto Trader (aka za.co.autotrader.android.app) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
{ }
"name" : "VU#319465", ]
"refsource" : "CERT-VN", },
"url" : "http://www.kb.cert.org/vuls/id/319465" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "VU#582497", "description": [
"refsource" : "CERT-VN", {
"url" : "http://www.kb.cert.org/vuls/id/582497" "lang": "eng",
} "value": "n/a"
] }
} ]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#582497",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/582497"
},
{
"name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing",
"refsource": "MISC",
"url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing"
},
{
"name": "VU#319465",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/319465"
}
]
}
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-10500", "ID": "CVE-2016-10500",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2016-3314", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
}, "ID": "CVE-2016-3314",
"data_format" : "MITRE", "ASSIGNER": "cve@mitre.org",
"data_type" : "CVE", "STATE": "REJECT"
"data_version" : "4.0", },
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
} }
] ]
} }
} }

View File

@ -1,92 +1,92 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2016-3698", "ID": "CVE-2016-3698",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[oss-security] 20160517 RHSA-2016:1086 libndp: denial of service due to insufficient validation of source of NDP messages", "description_data": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2016/05/17/9" "lang": "eng",
}, "value": "libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network."
{ }
"name" : "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839", ]
"refsource" : "CONFIRM", },
"url" : "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f", "description": [
"refsource" : "CONFIRM", {
"url" : "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", ]
"refsource" : "CONFIRM", }
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" ]
}, },
{ "references": {
"name" : "DSA-3581", "reference_data": [
"refsource" : "DEBIAN", {
"url" : "http://www.debian.org/security/2016/dsa-3581" "name": "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f",
}, "refsource": "CONFIRM",
{ "url": "https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f"
"name" : "RHSA-2016:1086", },
"refsource" : "REDHAT", {
"url" : "https://rhn.redhat.com/errata/RHSA-2016-1086.html" "name": "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839",
}, "refsource": "CONFIRM",
{ "url": "https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839"
"name" : "USN-2980-1", },
"refsource" : "UBUNTU", {
"url" : "http://www.ubuntu.com/usn/USN-2980-1" "name": "DSA-3581",
} "refsource": "DEBIAN",
] "url": "http://www.debian.org/security/2016/dsa-3581"
} },
{
"name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
},
{
"name": "[oss-security] 20160517 RHSA-2016:1086 libndp: denial of service due to insufficient validation of source of NDP messages",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/05/17/9"
},
{
"name": "USN-2980-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2980-1"
},
{
"name": "RHSA-2016:1086",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1086.html"
}
]
}
} }

View File

@ -1,77 +1,77 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@android.com",
"ID" : "CVE-2016-3886", "ID": "CVE-2016-3886",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "systemui/statusbar/phone/QuickStatusBarHeader.java in the System UI Tuner in Android 7.0 before 2016-09-01 does not prevent tuner changes on the lockscreen, which allows physically proximate attackers to gain privileges by modifying a setting, aka internal bug 30107438."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "http://source.android.com/security/bulletin/2016-09-01.html", "description_data": [
"refsource" : "CONFIRM", {
"url" : "http://source.android.com/security/bulletin/2016-09-01.html" "lang": "eng",
}, "value": "systemui/statusbar/phone/QuickStatusBarHeader.java in the System UI Tuner in Android 7.0 before 2016-09-01 does not prevent tuner changes on the lockscreen, which allows physically proximate attackers to gain privileges by modifying a setting, aka internal bug 30107438."
{ }
"name" : "https://android.googlesource.com/platform/frameworks/base/+/6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5", ]
"refsource" : "CONFIRM", },
"url" : "https://android.googlesource.com/platform/frameworks/base/+/6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "92860", "description": [
"refsource" : "BID", {
"url" : "http://www.securityfocus.com/bid/92860" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "1036763", ]
"refsource" : "SECTRACK", }
"url" : "http://www.securitytracker.com/id/1036763" ]
} },
] "references": {
} "reference_data": [
{
"name": "https://android.googlesource.com/platform/frameworks/base/+/6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5",
"refsource": "CONFIRM",
"url": "https://android.googlesource.com/platform/frameworks/base/+/6ca6cd5a50311d58a1b7bf8fbef3f9aa29eadcd5"
},
{
"name": "http://source.android.com/security/bulletin/2016-09-01.html",
"refsource": "CONFIRM",
"url": "http://source.android.com/security/bulletin/2016-09-01.html"
},
{
"name": "92860",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92860"
},
{
"name": "1036763",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036763"
}
]
}
} }

View File

@ -1,102 +1,102 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-3959", "ID": "CVE-2016-3959",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "[golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released", "description_data": [
"refsource" : "MLIST", {
"url" : "https://groups.google.com/forum/#!topic/golang-announce/9eqIHqaWvck" "lang": "eng",
}, "value": "The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries."
{ }
"name" : "[oss-security] 20160405 CVE request - Go - DLL loading, Big int", ]
"refsource" : "MLIST", },
"url" : "http://www.openwall.com/lists/oss-security/2016/04/05/1" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "[oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int", "description": [
"refsource" : "MLIST", {
"url" : "http://www.openwall.com/lists/oss-security/2016/04/05/2" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "https://go-review.googlesource.com/#/c/21533/", ]
"refsource" : "CONFIRM", }
"url" : "https://go-review.googlesource.com/#/c/21533/" ]
}, },
{ "references": {
"name" : "FEDORA-2016-2940ad5550", "reference_data": [
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182526.html" "name": "[oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int",
}, "refsource": "MLIST",
{ "url": "http://www.openwall.com/lists/oss-security/2016/04/05/2"
"name" : "FEDORA-2016-2fcfc7670f", },
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183137.html" "name": "https://go-review.googlesource.com/#/c/21533/",
}, "refsource": "CONFIRM",
{ "url": "https://go-review.googlesource.com/#/c/21533/"
"name" : "FEDORA-2016-59c5e405e3", },
"refsource" : "FEDORA", {
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183106.html" "name": "RHSA-2016:1538",
}, "refsource": "REDHAT",
{ "url": "http://rhn.redhat.com/errata/RHSA-2016-1538.html"
"name" : "RHSA-2016:1538", },
"refsource" : "REDHAT", {
"url" : "http://rhn.redhat.com/errata/RHSA-2016-1538.html" "name": "FEDORA-2016-2940ad5550",
}, "refsource": "FEDORA",
{ "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182526.html"
"name" : "openSUSE-SU-2016:1331", },
"refsource" : "SUSE", {
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00077.html" "name": "[golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released",
} "refsource": "MLIST",
] "url": "https://groups.google.com/forum/#!topic/golang-announce/9eqIHqaWvck"
} },
{
"name": "FEDORA-2016-59c5e405e3",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183106.html"
},
{
"name": "openSUSE-SU-2016:1331",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00077.html"
},
{
"name": "[oss-security] 20160405 CVE request - Go - DLL loading, Big int",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/04/05/1"
},
{
"name": "FEDORA-2016-2fcfc7670f",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183137.html"
}
]
}
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2016-8077", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
}, "ID": "CVE-2016-8077",
"data_format" : "MITRE", "ASSIGNER": "cve@mitre.org",
"data_type" : "CVE", "STATE": "REJECT"
"data_version" : "4.0", },
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-8979", "ID": "CVE-2016-8979",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-8988", "ID": "CVE-2016-8988",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,63 +1,63 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "talos-cna@cisco.com", "ASSIGNER": "talos-cna@cisco.com",
"DATE_PUBLIC" : "2017-07-19T00:00:00", "DATE_PUBLIC": "2017-07-19T00:00:00",
"ID" : "CVE-2016-9044", "ID": "CVE-2016-9044",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "WebFOCUS", "product_name": "WebFOCUS",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "WebFOCUS Business Intelligence Portal 8.1" "version_value": "WebFOCUS Business Intelligence Portal 8.1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Information Builders" "vendor_name": "Information Builders"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An exploitable command execution vulnerability exists in Information Builders WebFOCUS Business Intelligence Portal 8.1 . A specially crafted web parameter can cause a command injection. An authenticated attacker can send a crafted web request to trigger this vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "command injection"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0315", "description_data": [
"refsource" : "MISC", {
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0315" "lang": "eng",
} "value": "An exploitable command execution vulnerability exists in Information Builders WebFOCUS Business Intelligence Portal 8.1 . A specially crafted web parameter can cause a command injection. An authenticated attacker can send a crafted web request to trigger this vulnerability."
] }
} ]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "command injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0315",
"refsource": "MISC",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0315"
}
]
}
} }

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-9111", "ID": "CVE-2016-9111",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Incorrect access control mechanisms in Citrix Receiver Desktop Lock 4.5 allow an attacker to bypass the authentication requirement by leveraging physical access to a VDI for temporary disconnection of a LAN cable. NOTE: as of 20161208, the vendor could not reproduce the issue, stating \"the researcher was unable to provide us with information that would allow us to confirm the behaviour and, despite extensive investigation on test deployments of supported products, we were unable to reproduce the behaviour as he described. The researcher has also, despite additional requests for information, ceased to respond to us.\""
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
] ]
} }
] },
}, "data_format": "MITRE",
"references" : { "data_type": "CVE",
"reference_data" : [ "data_version": "4.0",
{ "description": {
"name" : "40686", "description_data": [
"refsource" : "EXPLOIT-DB", {
"url" : "https://www.exploit-db.com/exploits/40686/" "lang": "eng",
}, "value": "Incorrect access control mechanisms in Citrix Receiver Desktop Lock 4.5 allow an attacker to bypass the authentication requirement by leveraging physical access to a VDI for temporary disconnection of a LAN cable. NOTE: as of 20161208, the vendor could not reproduce the issue, stating \"the researcher was unable to provide us with information that would allow us to confirm the behaviour and, despite extensive investigation on test deployments of supported products, we were unable to reproduce the behaviour as he described. The researcher has also, despite additional requests for information, ceased to respond to us.\""
{ }
"name" : "https://packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.html", ]
"refsource" : "MISC", },
"url" : "https://packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.html" "problemtype": {
}, "problemtype_data": [
{ {
"name" : "https://vuldb.com/?id.93250", "description": [
"refsource" : "MISC", {
"url" : "https://vuldb.com/?id.93250" "lang": "eng",
}, "value": "n/a"
{ }
"name" : "94229", ]
"refsource" : "BID", }
"url" : "http://www.securityfocus.com/bid/94229" ]
}, },
{ "references": {
"name" : "1037176", "reference_data": [
"refsource" : "SECTRACK", {
"url" : "http://www.securitytracker.com/id/1037176" "name": "https://vuldb.com/?id.93250",
} "refsource": "MISC",
] "url": "https://vuldb.com/?id.93250"
} },
{
"name": "1037176",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037176"
},
{
"name": "40686",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40686/"
},
{
"name": "https://packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/139493/Citrix-Receiver-Receiver-Desktop-Lock-4.5-Authentication-Bypass.html"
},
{
"name": "94229",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94229"
}
]
}
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2016-9943", "ID": "CVE-2016-9943",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-2351", "ID": "CVE-2019-2351",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-2678", "ID": "CVE-2019-2678",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-2933", "ID": "CVE-2019-2933",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-6018", "ID": "CVE-2019-6018",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-6367", "ID": "CVE-2019-6367",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-6437", "ID": "CVE-2019-6437",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-6584", "ID": "CVE-2019-6584",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }

View File

@ -1,18 +1,18 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2019-6688", "ID": "CVE-2019-6688",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }
} }