From 7ab39a14841655e943231eeeba14a32d352fa3e8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 23 Apr 2019 20:00:49 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/0xxx/CVE-2014-0107.json | 253 +++++++++--------- 2014/0xxx/CVE-2014-0114.json | 469 +++++++++++++++++---------------- 2014/7xxx/CVE-2014-7923.json | 175 ++++++------ 2014/7xxx/CVE-2014-7926.json | 175 ++++++------ 2014/7xxx/CVE-2014-7940.json | 163 ++++++------ 2014/8xxx/CVE-2014-8146.json | 169 ++++++------ 2014/8xxx/CVE-2014-8147.json | 145 +++++----- 2019/10xxx/CVE-2019-10710.json | 56 +++- 2019/7xxx/CVE-2019-7727.json | 58 +++- 2019/9xxx/CVE-2019-9210.json | 5 + 10 files changed, 889 insertions(+), 779 deletions(-) diff --git a/2014/0xxx/CVE-2014-0107.json b/2014/0xxx/CVE-2014-0107.json index 9911cf31ffa..42983ef6f06 100644 --- a/2014/0xxx/CVE-2014-0107.json +++ b/2014/0xxx/CVE-2014-0107.json @@ -1,220 +1,221 @@ - { - "CVE_data_meta":{ - "ASSIGNER":"secalert@redhat.com", - "ID":"CVE-2014-0107", - "STATE":"PUBLIC" + "CVE_data_meta": { + "ASSIGNER": "secalert@redhat.com", + "ID": "CVE-2014-0107", + "STATE": "PUBLIC" }, - "affects":{ - "vendor":{ - "vendor_data":[ + "affects": { + "vendor": { + "vendor_data": [ { - "product":{ - "product_data":[ + "product": { + "product_data": [ { - "product_name":"n/a", - "version":{ - "version_data":[ + "product_name": "n/a", + "version": { + "version_data": [ { - "version_value":"n/a" + "version_value": "n/a" } ] } } ] }, - "vendor_name":"n/a" + "vendor_name": "n/a" } ] } }, - "data_format":"MITRE", - "data_type":"CVE", - "data_version":"4.0", - "description":{ - "description_data":[ + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ { - "lang":"eng", - "value":"The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function." + "lang": "eng", + "value": "The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function." } ] }, - "problemtype":{ - "problemtype_data":[ + "problemtype": { + "problemtype_data": [ { - "description":[ + "description": [ { - "lang":"eng", - "value":"n/a" + "lang": "eng", + "value": "n/a" } ] } ] }, - "references":{ - "reference_data":[ + "references": { + "reference_data": [ { - "name":"https://issues.apache.org/jira/browse/XALANJ-2435", - "refsource":"CONFIRM", - "url":"https://issues.apache.org/jira/browse/XALANJ-2435" + "name": "https://issues.apache.org/jira/browse/XALANJ-2435", + "refsource": "CONFIRM", + "url": "https://issues.apache.org/jira/browse/XALANJ-2435" }, { - "name":"GLSA-201604-02", - "refsource":"GENTOO", - "url":"https://security.gentoo.org/glsa/201604-02" + "name": "GLSA-201604-02", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201604-02" }, { - "name":"59291", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59291" + "name": "59291", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59291" }, { - "name":"59290", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59290" + "name": "59290", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59290" }, { - "name":"RHSA-2015:1888", - "refsource":"REDHAT", - "url":"http://rhn.redhat.com/errata/RHSA-2015-1888.html" + "name": "RHSA-2015:1888", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2015-1888.html" }, { - "name":"59151", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59151" + "name": "59151", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59151" }, { - "name":"59247", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59247" + "name": "59247", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59247" }, { - "name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755", - "refsource":"CONFIRM", - "url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" + "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755", + "refsource": "CONFIRM", + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" }, { - "name":"59515", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59515" + "name": "59515", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59515" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676093", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676093" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676093", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676093" }, { - "name":"http://www.ibm.com/support/docview.wss?uid=swg21677967", - "refsource":"CONFIRM", - "url":"http://www.ibm.com/support/docview.wss?uid=swg21677967" + "name": "http://www.ibm.com/support/docview.wss?uid=swg21677967", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=swg21677967" }, { - "name":"https://www.tenable.com/security/tns-2018-15", - "refsource":"CONFIRM", - "url":"https://www.tenable.com/security/tns-2018-15" + "name": "https://www.tenable.com/security/tns-2018-15", + "refsource": "CONFIRM", + "url": "https://www.tenable.com/security/tns-2018-15" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677145", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677145" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677145", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677145" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21681933", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21681933" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21681933", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681933" }, { - "name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" + "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { - "name":"DSA-2886", - "refsource":"DEBIAN", - "url":"http://www.debian.org/security/2014/dsa-2886" + "name": "DSA-2886", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2014/dsa-2886" }, { - "name":"60502", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/60502" + "name": "60502", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60502" }, { - "name":"59369", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59369" + "name": "59369", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59369" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21674334", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21674334" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674334", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674334" }, { - "name":"59711", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59711" + "name": "59711", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59711" }, { - "name":"http://www.ocert.org/advisories/ocert-2014-002.html", - "refsource":"MISC", - "url":"http://www.ocert.org/advisories/ocert-2014-002.html" + "name": "http://www.ocert.org/advisories/ocert-2014-002.html", + "refsource": "MISC", + "url": "http://www.ocert.org/advisories/ocert-2014-002.html" }, { - "name":"http://svn.apache.org/viewvc?view=revision&revision=1581058", - "refsource":"CONFIRM", - "url":"http://svn.apache.org/viewvc?view=revision&revision=1581058" + "name": "http://svn.apache.org/viewvc?view=revision&revision=1581058", + "refsource": "CONFIRM", + "url": "http://svn.apache.org/viewvc?view=revision&revision=1581058" }, { - "name":"57563", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/57563" + "name": "57563", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/57563" }, { - "name":"66397", - "refsource":"BID", - "url":"http://www.securityfocus.com/bid/66397" + "name": "66397", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/66397" }, { - "name":"1034711", - "refsource":"SECTRACK", - "url":"http://www.securitytracker.com/id/1034711" + "name": "1034711", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1034711" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21680703", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21680703" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21680703", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680703" }, { - "name":"1034716", - "refsource":"SECTRACK", - "url":"http://www.securitytracker.com/id/1034716" + "name": "1034716", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1034716" }, { - "name":"RHSA-2014:1351", - "refsource":"REDHAT", - "url":"http://rhn.redhat.com/errata/RHSA-2014-1351.html" + "name": "RHSA-2014:1351", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-1351.html" }, { - "name":"RHSA-2014:0348", - "refsource":"REDHAT", - "url":"http://rhn.redhat.com/errata/RHSA-2014-0348.html" + "name": "RHSA-2014:0348", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0348.html" }, { - "name":"59036", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59036" + "name": "59036", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59036" }, { - "name":"apache-xalanjava-cve20140107-sec-bypass(92023)", - "refsource":"XF", - "url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/92023" + "name": "apache-xalanjava-cve20140107-sec-bypass(92023)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92023" }, { - "url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "refsource": "MISC", + "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } diff --git a/2014/0xxx/CVE-2014-0114.json b/2014/0xxx/CVE-2014-0114.json index 7b068f532e5..822be1c1852 100644 --- a/2014/0xxx/CVE-2014-0114.json +++ b/2014/0xxx/CVE-2014-0114.json @@ -1,400 +1,401 @@ - { - "CVE_data_meta":{ - "ASSIGNER":"secalert@redhat.com", - "ID":"CVE-2014-0114", - "STATE":"PUBLIC" + "CVE_data_meta": { + "ASSIGNER": "secalert@redhat.com", + "ID": "CVE-2014-0114", + "STATE": "PUBLIC" }, - "affects":{ - "vendor":{ - "vendor_data":[ + "affects": { + "vendor": { + "vendor_data": [ { - "product":{ - "product_data":[ + "product": { + "product_data": [ { - "product_name":"n/a", - "version":{ - "version_data":[ + "product_name": "n/a", + "version": { + "version_data": [ { - "version_value":"n/a" + "version_value": "n/a" } ] } } ] }, - "vendor_name":"n/a" + "vendor_name": "n/a" } ] } }, - "data_format":"MITRE", - "data_type":"CVE", - "data_version":"4.0", - "description":{ - "description_data":[ + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ { - "lang":"eng", - "value":"Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1." + "lang": "eng", + "value": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1." } ] }, - "problemtype":{ - "problemtype_data":[ + "problemtype": { + "problemtype_data": [ { - "description":[ + "description": [ { - "lang":"eng", - "value":"n/a" + "lang": "eng", + "value": "n/a" } ] } ] }, - "references":{ - "reference_data":[ + "references": { + "reference_data": [ { - "name":"[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114", - "refsource":"MLIST", - "url":"http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html" + "name": "[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114", + "refsource": "MLIST", + "url": "http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html" }, { - "name":"57477", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/57477" + "name": "57477", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/57477" }, { - "name":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html", - "refsource":"CONFIRM", - "url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html" + "name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html", + "refsource": "CONFIRM", + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { - "name":"https://issues.apache.org/jira/browse/BEANUTILS-463", - "refsource":"CONFIRM", - "url":"https://issues.apache.org/jira/browse/BEANUTILS-463" + "name": "https://issues.apache.org/jira/browse/BEANUTILS-463", + "refsource": "CONFIRM", + "url": "https://issues.apache.org/jira/browse/BEANUTILS-463" }, { - "name":"58710", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/58710" + "name": "58710", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58710" }, { - "name":"MDVSA-2014:095", - "refsource":"MANDRIVA", - "url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:095" + "name": "MDVSA-2014:095", + "refsource": "MANDRIVA", + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:095" }, { - "name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" + "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { - "name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" + "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { - "name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", - "refsource":"CONFIRM", - "url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" + "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", + "refsource": "CONFIRM", + "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { - "name":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html", - "refsource":"CONFIRM", - "url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html" + "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "refsource": "CONFIRM", + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675689", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675689" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689" }, { - "name":"FEDORA-2014-9380", - "refsource":"FEDORA", - "url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html" + "name": "FEDORA-2014-9380", + "refsource": "FEDORA", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21674812", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21674812" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812" }, { - "name":"https://security.netapp.com/advisory/ntap-20140911-0001/", - "refsource":"CONFIRM", - "url":"https://security.netapp.com/advisory/ntap-20140911-0001/" + "name": "https://security.netapp.com/advisory/ntap-20140911-0001/", + "refsource": "CONFIRM", + "url": "https://security.netapp.com/advisory/ntap-20140911-0001/" }, { - "name":"59464", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59464" + "name": "59464", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59464" }, { - "name":"59118", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59118" + "name": "59118", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59118" }, { - "name":"https://security.netapp.com/advisory/ntap-20180629-0006/", - "refsource":"CONFIRM", - "url":"https://security.netapp.com/advisory/ntap-20180629-0006/" + "name": "https://security.netapp.com/advisory/ntap-20180629-0006/", + "refsource": "CONFIRM", + "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675387", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675387" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387" }, { - "name":"https://access.redhat.com/solutions/869353", - "refsource":"CONFIRM", - "url":"https://access.redhat.com/solutions/869353" + "name": "https://access.redhat.com/solutions/869353", + "refsource": "CONFIRM", + "url": "https://access.redhat.com/solutions/869353" }, { - "name":"https://bugzilla.redhat.com/show_bug.cgi?id=1091938", - "refsource":"CONFIRM", - "url":"https://bugzilla.redhat.com/show_bug.cgi?id=1091938" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938", + "refsource": "CONFIRM", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938" }, { - "name":"http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt", - "refsource":"CONFIRM", - "url":"http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt" + "name": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt", + "refsource": "CONFIRM", + "url": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt" }, { - "name":"http://advisories.mageia.org/MGASA-2014-0219.html", - "refsource":"CONFIRM", - "url":"http://advisories.mageia.org/MGASA-2014-0219.html" + "name": "http://advisories.mageia.org/MGASA-2014-0219.html", + "refsource": "CONFIRM", + "url": "http://advisories.mageia.org/MGASA-2014-0219.html" }, { - "name":"60703", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/60703" + "name": "60703", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60703" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675972", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675972" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972" }, { - "name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755", - "refsource":"CONFIRM", - "url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" + "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755", + "refsource": "CONFIRM", + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676375", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676375" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375" }, { - "name":"[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE", - "refsource":"MLIST", - "url":"http://openwall.com/lists/oss-security/2014/07/08/1" + "name": "[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE", + "refsource": "MLIST", + "url": "http://openwall.com/lists/oss-security/2014/07/08/1" }, { - "name":"RHSA-2018:2669", - "refsource":"REDHAT", - "url":"https://access.redhat.com/errata/RHSA-2018:2669" + "name": "RHSA-2018:2669", + "refsource": "REDHAT", + "url": "https://access.redhat.com/errata/RHSA-2018:2669" }, { - "name":"GLSA-201607-09", - "refsource":"GENTOO", - "url":"https://security.gentoo.org/glsa/201607-09" + "name": "GLSA-201607-09", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201607-09" }, { - "name":"HPSBST03160", - "refsource":"HP", - "url":"http://marc.info/?l=bugtraq&m=141451023707502&w=2" + "name": "HPSBST03160", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=141451023707502&w=2" }, { - "name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", - "refsource":"BUGTRAQ", - "url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded" + "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675898", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675898" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676110", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676110" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110" }, { - "name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" + "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg27042296", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg27042296" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676303", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676303" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303" }, { - "name":"59228", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59228" + "name": "59228", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59228" }, { - "name":"59246", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59246" + "name": "59246", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59246" }, { - "name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" + "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { - "name":"https://bugzilla.redhat.com/show_bug.cgi?id=1116665", - "refsource":"CONFIRM", - "url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116665" + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665", + "refsource": "CONFIRM", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665" }, { - "name":"[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE", - "refsource":"MLIST", - "url":"http://openwall.com/lists/oss-security/2014/06/15/10" + "name": "[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE", + "refsource": "MLIST", + "url": "http://openwall.com/lists/oss-security/2014/06/15/10" }, { - "name":"59245", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59245" + "name": "59245", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59245" }, { - "name":"HPSBMU03090", - "refsource":"HP", - "url":"http://marc.info/?l=bugtraq&m=140801096002766&w=2" + "name": "HPSBMU03090", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140801096002766&w=2" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21674128", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21674128" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676931", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676931" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { - "name":"60177", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/60177" + "name": "60177", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60177" }, { - "name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", - "refsource":"FULLDISC", - "url":"http://seclists.org/fulldisclosure/2014/Dec/23" + "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", + "refsource": "FULLDISC", + "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { - "name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" + "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { - "name":"http://www.ibm.com/support/docview.wss?uid=swg21675496", - "refsource":"CONFIRM", - "url":"http://www.ibm.com/support/docview.wss?uid=swg21675496" + "name": "http://www.ibm.com/support/docview.wss?uid=swg21675496", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=swg21675496" }, { - "name":"DSA-2940", - "refsource":"DEBIAN", - "url":"http://www.debian.org/security/2014/dsa-2940" + "name": "DSA-2940", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2014/dsa-2940" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675266", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675266" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266" }, { - "name":"59014", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59014" + "name": "59014", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59014" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677110", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677110" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110" }, { - "name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676091", - "refsource":"CONFIRM", - "url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676091" + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091" }, { - "name":"67121", - "refsource":"BID", - "url":"http://www.securityfocus.com/bid/67121" + "name": "67121", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/67121" }, { - "name":"59480", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59480" + "name": "59480", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59480" }, { - "name":"HPSBGN03041", - "refsource":"HP", - "url":"http://marc.info/?l=bugtraq&m=140119284401582&w=2" + "name": "HPSBGN03041", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140119284401582&w=2" }, { - "name":"59479", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59479" + "name": "59479", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59479" }, { - "name":"59704", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59704" + "name": "59704", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59704" }, { - "name":"58947", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/58947" + "name": "58947", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58947" }, { - "name":"59718", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59718" + "name": "59718", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59718" }, { - "name":"59430", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/59430" + "name": "59430", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59430" }, { - "name":"58851", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/58851" + "name": "58851", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58851" }, { - "refsource":"MLIST", - "name":"[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities", - "url":"https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E" + "refsource": "MLIST", + "name": "[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities", + "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E" }, { - "refsource":"MLIST", - "name":"[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities", - "url":"https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E" + "refsource": "MLIST", + "name": "[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities", + "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E" }, { - "url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "refsource": "MISC", + "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } diff --git a/2014/7xxx/CVE-2014-7923.json b/2014/7xxx/CVE-2014-7923.json index 674be04bab9..9b45a550ccc 100644 --- a/2014/7xxx/CVE-2014-7923.json +++ b/2014/7xxx/CVE-2014-7923.json @@ -1,155 +1,156 @@ - { - "CVE_data_meta":{ - "ASSIGNER":"security@google.com", - "ID":"CVE-2014-7923", - "STATE":"PUBLIC" + "CVE_data_meta": { + "ASSIGNER": "security@google.com", + "ID": "CVE-2014-7923", + "STATE": "PUBLIC" }, - "affects":{ - "vendor":{ - "vendor_data":[ + "affects": { + "vendor": { + "vendor_data": [ { - "product":{ - "product_data":[ + "product": { + "product_data": [ { - "product_name":"n/a", - "version":{ - "version_data":[ + "product_name": "n/a", + "version": { + "version_data": [ { - "version_value":"n/a" + "version_value": "n/a" } ] } } ] }, - "vendor_name":"n/a" + "vendor_name": "n/a" } ] } }, - "data_format":"MITRE", - "data_type":"CVE", - "data_version":"4.0", - "description":{ - "description_data":[ + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ { - "lang":"eng", - "value":"The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression." + "lang": "eng", + "value": "The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression." } ] }, - "problemtype":{ - "problemtype_data":[ + "problemtype": { + "problemtype_data": [ { - "description":[ + "description": [ { - "lang":"eng", - "value":"n/a" + "lang": "eng", + "value": "n/a" } ] } ] }, - "references":{ - "reference_data":[ + "references": { + "reference_data": [ { - "name":"62665", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62665" + "name": "62665", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62665" }, { - "name":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", - "refsource":"CONFIRM", - "url":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb" + "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", + "refsource": "CONFIRM", + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { - "name":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html", - "refsource":"CONFIRM", - "url":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html" + "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "refsource": "CONFIRM", + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { - "name":"62575", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62575" + "name": "62575", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62575" }, { - "name":"https://codereview.chromium.org/726973003", - "refsource":"CONFIRM", - "url":"https://codereview.chromium.org/726973003" + "name": "https://codereview.chromium.org/726973003", + "refsource": "CONFIRM", + "url": "https://codereview.chromium.org/726973003" }, { - "name":"USN-2476-1", - "refsource":"UBUNTU", - "url":"http://www.ubuntu.com/usn/USN-2476-1" + "name": "USN-2476-1", + "refsource": "UBUNTU", + "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { - "name":"72288", - "refsource":"BID", - "url":"http://www.securityfocus.com/bid/72288" + "name": "72288", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/72288" }, { - "name":"https://code.google.com/p/chromium/issues/detail?id=430353", - "refsource":"CONFIRM", - "url":"https://code.google.com/p/chromium/issues/detail?id=430353" + "name": "https://code.google.com/p/chromium/issues/detail?id=430353", + "refsource": "CONFIRM", + "url": "https://code.google.com/p/chromium/issues/detail?id=430353" }, { - "name":"GLSA-201502-13", - "refsource":"GENTOO", - "url":"http://security.gentoo.org/glsa/glsa-201502-13.xml" + "name": "GLSA-201502-13", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { - "name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" + "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { - "name":"GLSA-201503-06", - "refsource":"GENTOO", - "url":"https://security.gentoo.org/glsa/201503-06" + "name": "GLSA-201503-06", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201503-06" }, { - "name":"1031623", - "refsource":"SECTRACK", - "url":"http://www.securitytracker.com/id/1031623" + "name": "1031623", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1031623" }, { - "name":"openSUSE-SU-2015:0441", - "refsource":"SUSE", - "url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" + "name": "openSUSE-SU-2015:0441", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { - "name":"http://advisories.mageia.org/MGASA-2015-0047.html", - "refsource":"CONFIRM", - "url":"http://advisories.mageia.org/MGASA-2015-0047.html" + "name": "http://advisories.mageia.org/MGASA-2015-0047.html", + "refsource": "CONFIRM", + "url": "http://advisories.mageia.org/MGASA-2015-0047.html" }, { - "name":"http://bugs.icu-project.org/trac/ticket/11370", - "refsource":"CONFIRM", - "url":"http://bugs.icu-project.org/trac/ticket/11370" + "name": "http://bugs.icu-project.org/trac/ticket/11370", + "refsource": "CONFIRM", + "url": "http://bugs.icu-project.org/trac/ticket/11370" }, { - "name":"RHSA-2015:0093", - "refsource":"REDHAT", - "url":"http://rhn.redhat.com/errata/RHSA-2015-0093.html" + "name": "RHSA-2015:0093", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { - "name":"62383", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62383" + "name": "62383", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62383" }, { - "name":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", - "refsource":"CONFIRM", - "url":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c" + "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", + "refsource": "CONFIRM", + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c" }, { - "url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "refsource": "MISC", + "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } diff --git a/2014/7xxx/CVE-2014-7926.json b/2014/7xxx/CVE-2014-7926.json index c4e16dbe5a9..c47d3537c2f 100644 --- a/2014/7xxx/CVE-2014-7926.json +++ b/2014/7xxx/CVE-2014-7926.json @@ -1,155 +1,156 @@ - { - "CVE_data_meta":{ - "ASSIGNER":"security@google.com", - "ID":"CVE-2014-7926", - "STATE":"PUBLIC" + "CVE_data_meta": { + "ASSIGNER": "security@google.com", + "ID": "CVE-2014-7926", + "STATE": "PUBLIC" }, - "affects":{ - "vendor":{ - "vendor_data":[ + "affects": { + "vendor": { + "vendor_data": [ { - "product":{ - "product_data":[ + "product": { + "product_data": [ { - "product_name":"n/a", - "version":{ - "version_data":[ + "product_name": "n/a", + "version": { + "version_data": [ { - "version_value":"n/a" + "version_value": "n/a" } ] } } ] }, - "vendor_name":"n/a" + "vendor_name": "n/a" } ] } }, - "data_format":"MITRE", - "data_type":"CVE", - "data_version":"4.0", - "description":{ - "description_data":[ + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ { - "lang":"eng", - "value":"The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier." + "lang": "eng", + "value": "The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier." } ] }, - "problemtype":{ - "problemtype_data":[ + "problemtype": { + "problemtype_data": [ { - "description":[ + "description": [ { - "lang":"eng", - "value":"n/a" + "lang": "eng", + "value": "n/a" } ] } ] }, - "references":{ - "reference_data":[ + "references": { + "reference_data": [ { - "name":"62665", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62665" + "name": "62665", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62665" }, { - "name":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", - "refsource":"CONFIRM", - "url":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb" + "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", + "refsource": "CONFIRM", + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb" }, { - "name":"https://code.google.com/p/chromium/issues/detail?id=422824", - "refsource":"CONFIRM", - "url":"https://code.google.com/p/chromium/issues/detail?id=422824" + "name": "https://code.google.com/p/chromium/issues/detail?id=422824", + "refsource": "CONFIRM", + "url": "https://code.google.com/p/chromium/issues/detail?id=422824" }, { - "name":"http://bugs.icu-project.org/trac/ticket/11369", - "refsource":"CONFIRM", - "url":"http://bugs.icu-project.org/trac/ticket/11369" + "name": "http://bugs.icu-project.org/trac/ticket/11369", + "refsource": "CONFIRM", + "url": "http://bugs.icu-project.org/trac/ticket/11369" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { - "name":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html", - "refsource":"CONFIRM", - "url":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html" + "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "refsource": "CONFIRM", + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { - "name":"62575", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62575" + "name": "62575", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62575" }, { - "name":"https://codereview.chromium.org/726973003", - "refsource":"CONFIRM", - "url":"https://codereview.chromium.org/726973003" + "name": "https://codereview.chromium.org/726973003", + "refsource": "CONFIRM", + "url": "https://codereview.chromium.org/726973003" }, { - "name":"USN-2476-1", - "refsource":"UBUNTU", - "url":"http://www.ubuntu.com/usn/USN-2476-1" + "name": "USN-2476-1", + "refsource": "UBUNTU", + "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { - "name":"72288", - "refsource":"BID", - "url":"http://www.securityfocus.com/bid/72288" + "name": "72288", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/72288" }, { - "name":"GLSA-201502-13", - "refsource":"GENTOO", - "url":"http://security.gentoo.org/glsa/glsa-201502-13.xml" + "name": "GLSA-201502-13", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { - "name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" + "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { - "name":"GLSA-201503-06", - "refsource":"GENTOO", - "url":"https://security.gentoo.org/glsa/201503-06" + "name": "GLSA-201503-06", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201503-06" }, { - "name":"1031623", - "refsource":"SECTRACK", - "url":"http://www.securitytracker.com/id/1031623" + "name": "1031623", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1031623" }, { - "name":"openSUSE-SU-2015:0441", - "refsource":"SUSE", - "url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" + "name": "openSUSE-SU-2015:0441", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { - "name":"http://advisories.mageia.org/MGASA-2015-0047.html", - "refsource":"CONFIRM", - "url":"http://advisories.mageia.org/MGASA-2015-0047.html" + "name": "http://advisories.mageia.org/MGASA-2015-0047.html", + "refsource": "CONFIRM", + "url": "http://advisories.mageia.org/MGASA-2015-0047.html" }, { - "name":"RHSA-2015:0093", - "refsource":"REDHAT", - "url":"http://rhn.redhat.com/errata/RHSA-2015-0093.html" + "name": "RHSA-2015:0093", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { - "name":"62383", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62383" + "name": "62383", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62383" }, { - "name":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", - "refsource":"CONFIRM", - "url":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c" + "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", + "refsource": "CONFIRM", + "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c" }, { - "url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "refsource": "MISC", + "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } diff --git a/2014/7xxx/CVE-2014-7940.json b/2014/7xxx/CVE-2014-7940.json index aee49efa8a3..4502da84d5e 100644 --- a/2014/7xxx/CVE-2014-7940.json +++ b/2014/7xxx/CVE-2014-7940.json @@ -1,145 +1,146 @@ - { - "CVE_data_meta":{ - "ASSIGNER":"security@google.com", - "ID":"CVE-2014-7940", - "STATE":"PUBLIC" + "CVE_data_meta": { + "ASSIGNER": "security@google.com", + "ID": "CVE-2014-7940", + "STATE": "PUBLIC" }, - "affects":{ - "vendor":{ - "vendor_data":[ + "affects": { + "vendor": { + "vendor_data": [ { - "product":{ - "product_data":[ + "product": { + "product_data": [ { - "product_name":"n/a", - "version":{ - "version_data":[ + "product_name": "n/a", + "version": { + "version_data": [ { - "version_value":"n/a" + "version_value": "n/a" } ] } } ] }, - "vendor_name":"n/a" + "vendor_name": "n/a" } ] } }, - "data_format":"MITRE", - "data_type":"CVE", - "data_version":"4.0", - "description":{ - "description_data":[ + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ { - "lang":"eng", - "value":"The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence." + "lang": "eng", + "value": "The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence." } ] }, - "problemtype":{ - "problemtype_data":[ + "problemtype": { + "problemtype_data": [ { - "description":[ + "description": [ { - "lang":"eng", - "value":"n/a" + "lang": "eng", + "value": "n/a" } ] } ] }, - "references":{ - "reference_data":[ + "references": { + "reference_data": [ { - "name":"62665", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62665" + "name": "62665", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62665" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { - "name":"https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8", - "refsource":"CONFIRM", - "url":"https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8" + "name": "https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8", + "refsource": "CONFIRM", + "url": "https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8" }, { - "name":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html", - "refsource":"CONFIRM", - "url":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html" + "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html", + "refsource": "CONFIRM", + "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html" }, { - "name":"62575", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62575" + "name": "62575", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62575" }, { - "name":"USN-2476-1", - "refsource":"UBUNTU", - "url":"http://www.ubuntu.com/usn/USN-2476-1" + "name": "USN-2476-1", + "refsource": "UBUNTU", + "url": "http://www.ubuntu.com/usn/USN-2476-1" }, { - "name":"72288", - "refsource":"BID", - "url":"http://www.securityfocus.com/bid/72288" + "name": "72288", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/72288" }, { - "name":"GLSA-201502-13", - "refsource":"GENTOO", - "url":"http://security.gentoo.org/glsa/glsa-201502-13.xml" + "name": "GLSA-201502-13", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { - "name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" + "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { - "name":"GLSA-201503-06", - "refsource":"GENTOO", - "url":"https://security.gentoo.org/glsa/201503-06" + "name": "GLSA-201503-06", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201503-06" }, { - "name":"1031623", - "refsource":"SECTRACK", - "url":"http://www.securitytracker.com/id/1031623" + "name": "1031623", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1031623" }, { - "name":"https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075", - "refsource":"CONFIRM", - "url":"https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075" + "name": "https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075", + "refsource": "CONFIRM", + "url": "https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075" }, { - "name":"https://code.google.com/p/chromium/issues/detail?id=433866", - "refsource":"CONFIRM", - "url":"https://code.google.com/p/chromium/issues/detail?id=433866" + "name": "https://code.google.com/p/chromium/issues/detail?id=433866", + "refsource": "CONFIRM", + "url": "https://code.google.com/p/chromium/issues/detail?id=433866" }, { - "name":"openSUSE-SU-2015:0441", - "refsource":"SUSE", - "url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" + "name": "openSUSE-SU-2015:0441", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { - "name":"http://advisories.mageia.org/MGASA-2015-0047.html", - "refsource":"CONFIRM", - "url":"http://advisories.mageia.org/MGASA-2015-0047.html" + "name": "http://advisories.mageia.org/MGASA-2015-0047.html", + "refsource": "CONFIRM", + "url": "http://advisories.mageia.org/MGASA-2015-0047.html" }, { - "name":"RHSA-2015:0093", - "refsource":"REDHAT", - "url":"http://rhn.redhat.com/errata/RHSA-2015-0093.html" + "name": "RHSA-2015:0093", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html" }, { - "name":"62383", - "refsource":"SECUNIA", - "url":"http://secunia.com/advisories/62383" + "name": "62383", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/62383" }, { - "url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "refsource": "MISC", + "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } diff --git a/2014/8xxx/CVE-2014-8146.json b/2014/8xxx/CVE-2014-8146.json index 40dd202999c..48a79da0231 100644 --- a/2014/8xxx/CVE-2014-8146.json +++ b/2014/8xxx/CVE-2014-8146.json @@ -1,150 +1,151 @@ - { - "CVE_data_meta":{ - "ASSIGNER":"secalert@redhat.com", - "ID":"CVE-2014-8146", - "STATE":"PUBLIC" + "CVE_data_meta": { + "ASSIGNER": "secalert@redhat.com", + "ID": "CVE-2014-8146", + "STATE": "PUBLIC" }, - "affects":{ - "vendor":{ - "vendor_data":[ + "affects": { + "vendor": { + "vendor_data": [ { - "product":{ - "product_data":[ + "product": { + "product_data": [ { - "product_name":"n/a", - "version":{ - "version_data":[ + "product_name": "n/a", + "version": { + "version_data": [ { - "version_value":"n/a" + "version_value": "n/a" } ] } } ] }, - "vendor_name":"n/a" + "vendor_name": "n/a" } ] } }, - "data_format":"MITRE", - "data_type":"CVE", - "data_version":"4.0", - "description":{ - "description_data":[ + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ { - "lang":"eng", - "value":"The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text." + "lang": "eng", + "value": "The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text." } ] }, - "problemtype":{ - "problemtype_data":[ + "problemtype": { + "problemtype_data": [ { - "description":[ + "description": [ { - "lang":"eng", - "value":"n/a" + "lang": "eng", + "value": "n/a" } ] } ] }, - "references":{ - "reference_data":[ + "references": { + "reference_data": [ { - "name":"https://support.apple.com/HT205221", - "refsource":"CONFIRM", - "url":"https://support.apple.com/HT205221" + "name": "https://support.apple.com/HT205221", + "refsource": "CONFIRM", + "url": "https://support.apple.com/HT205221" }, { - "name":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", - "refsource":"MISC", - "url":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt" + "name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", + "refsource": "MISC", + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt" }, { - "name":"http://bugs.icu-project.org/trac/changeset/37162", - "refsource":"CONFIRM", - "url":"http://bugs.icu-project.org/trac/changeset/37162" + "name": "http://bugs.icu-project.org/trac/changeset/37162", + "refsource": "CONFIRM", + "url": "http://bugs.icu-project.org/trac/changeset/37162" }, { - "name":"https://support.apple.com/HT205212", - "refsource":"CONFIRM", - "url":"https://support.apple.com/HT205212" + "name": "https://support.apple.com/HT205212", + "refsource": "CONFIRM", + "url": "https://support.apple.com/HT205212" }, { - "name":"APPLE-SA-2015-09-30-3", - "refsource":"APPLE", - "url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" + "name": "APPLE-SA-2015-09-30-3", + "refsource": "APPLE", + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { - "name":"GLSA-201507-04", - "refsource":"GENTOO", - "url":"https://security.gentoo.org/glsa/201507-04" + "name": "GLSA-201507-04", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201507-04" }, { - "name":"VU#602540", - "refsource":"CERT-VN", - "url":"http://www.kb.cert.org/vuls/id/602540" + "name": "VU#602540", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/602540" }, { - "name":"https://support.apple.com/HT205267", - "refsource":"CONFIRM", - "url":"https://support.apple.com/HT205267" + "name": "https://support.apple.com/HT205267", + "refsource": "CONFIRM", + "url": "https://support.apple.com/HT205267" }, { - "name":"20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", - "refsource":"FULLDISC", - "url":"http://seclists.org/fulldisclosure/2015/May/14" + "name": "20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", + "refsource": "FULLDISC", + "url": "http://seclists.org/fulldisclosure/2015/May/14" }, { - "name":"APPLE-SA-2015-09-21-1", - "refsource":"APPLE", - "url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html" + "name": "APPLE-SA-2015-09-21-1", + "refsource": "APPLE", + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html" }, { - "name":"APPLE-SA-2015-09-16-3", - "refsource":"APPLE", - "url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html" + "name": "APPLE-SA-2015-09-16-3", + "refsource": "APPLE", + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html" }, { - "name":"[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", - "refsource":"MLIST", - "url":"http://openwall.com/lists/oss-security/2015/05/05/6" + "name": "[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", + "refsource": "MLIST", + "url": "http://openwall.com/lists/oss-security/2015/05/05/6" }, { - "name":"https://support.apple.com/HT205213", - "refsource":"CONFIRM", - "url":"https://support.apple.com/HT205213" + "name": "https://support.apple.com/HT205213", + "refsource": "CONFIRM", + "url": "https://support.apple.com/HT205213" }, { - "name":"74457", - "refsource":"BID", - "url":"http://www.securityfocus.com/bid/74457" + "name": "74457", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/74457" }, { - "name":"APPLE-SA-2015-09-16-1", - "refsource":"APPLE", - "url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html" + "name": "APPLE-SA-2015-09-16-1", + "refsource": "APPLE", + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html" }, { - "name":"DSA-3323", - "refsource":"DEBIAN", - "url":"http://www.debian.org/security/2015/dsa-3323" + "name": "DSA-3323", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2015/dsa-3323" }, { - "name":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" + "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { - "url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "refsource": "MISC", + "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } diff --git a/2014/8xxx/CVE-2014-8147.json b/2014/8xxx/CVE-2014-8147.json index 23ea238cc91..32eea1aaf6f 100644 --- a/2014/8xxx/CVE-2014-8147.json +++ b/2014/8xxx/CVE-2014-8147.json @@ -1,130 +1,131 @@ - { - "CVE_data_meta":{ - "ASSIGNER":"secalert@redhat.com", - "ID":"CVE-2014-8147", - "STATE":"PUBLIC" + "CVE_data_meta": { + "ASSIGNER": "secalert@redhat.com", + "ID": "CVE-2014-8147", + "STATE": "PUBLIC" }, - "affects":{ - "vendor":{ - "vendor_data":[ + "affects": { + "vendor": { + "vendor_data": [ { - "product":{ - "product_data":[ + "product": { + "product_data": [ { - "product_name":"n/a", - "version":{ - "version_data":[ + "product_name": "n/a", + "version": { + "version_data": [ { - "version_value":"n/a" + "version_value": "n/a" } ] } } ] }, - "vendor_name":"n/a" + "vendor_name": "n/a" } ] } }, - "data_format":"MITRE", - "data_type":"CVE", - "data_version":"4.0", - "description":{ - "description_data":[ + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ { - "lang":"eng", - "value":"The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text." + "lang": "eng", + "value": "The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text." } ] }, - "problemtype":{ - "problemtype_data":[ + "problemtype": { + "problemtype_data": [ { - "description":[ + "description": [ { - "lang":"eng", - "value":"n/a" + "lang": "eng", + "value": "n/a" } ] } ] }, - "references":{ - "reference_data":[ + "references": { + "reference_data": [ { - "name":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", - "refsource":"MISC", - "url":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt" + "name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", + "refsource": "MISC", + "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt" }, { - "name":"APPLE-SA-2015-09-30-3", - "refsource":"APPLE", - "url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" + "name": "APPLE-SA-2015-09-30-3", + "refsource": "APPLE", + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { - "name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" + "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" }, { - "name":"GLSA-201507-04", - "refsource":"GENTOO", - "url":"https://security.gentoo.org/glsa/201507-04" + "name": "GLSA-201507-04", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201507-04" }, { - "name":"VU#602540", - "refsource":"CERT-VN", - "url":"http://www.kb.cert.org/vuls/id/602540" + "name": "VU#602540", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/602540" }, { - "name":"https://support.apple.com/HT205267", - "refsource":"CONFIRM", - "url":"https://support.apple.com/HT205267" + "name": "https://support.apple.com/HT205267", + "refsource": "CONFIRM", + "url": "https://support.apple.com/HT205267" }, { - "name":"20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", - "refsource":"FULLDISC", - "url":"http://seclists.org/fulldisclosure/2015/May/14" + "name": "20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", + "refsource": "FULLDISC", + "url": "http://seclists.org/fulldisclosure/2015/May/14" }, { - "name":"APPLE-SA-2015-09-21-1", - "refsource":"APPLE", - "url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html" + "name": "APPLE-SA-2015-09-21-1", + "refsource": "APPLE", + "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html" }, { - "name":"[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", - "refsource":"MLIST", - "url":"http://openwall.com/lists/oss-security/2015/05/05/6" + "name": "[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", + "refsource": "MLIST", + "url": "http://openwall.com/lists/oss-security/2015/05/05/6" }, { - "name":"https://support.apple.com/HT205213", - "refsource":"CONFIRM", - "url":"https://support.apple.com/HT205213" + "name": "https://support.apple.com/HT205213", + "refsource": "CONFIRM", + "url": "https://support.apple.com/HT205213" }, { - "name":"74457", - "refsource":"BID", - "url":"http://www.securityfocus.com/bid/74457" + "name": "74457", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/74457" }, { - "name":"DSA-3323", - "refsource":"DEBIAN", - "url":"http://www.debian.org/security/2015/dsa-3323" + "name": "DSA-3323", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2015/dsa-3323" }, { - "name":"http://bugs.icu-project.org/trac/changeset/37080", - "refsource":"CONFIRM", - "url":"http://bugs.icu-project.org/trac/changeset/37080" + "name": "http://bugs.icu-project.org/trac/changeset/37080", + "refsource": "CONFIRM", + "url": "http://bugs.icu-project.org/trac/changeset/37080" }, { - "name":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", - "refsource":"CONFIRM", - "url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" + "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { - "url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", + "refsource": "MISC", + "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } diff --git a/2019/10xxx/CVE-2019-10710.json b/2019/10xxx/CVE-2019-10710.json index 86262731a4b..b69a09e2b79 100644 --- a/2019/10xxx/CVE-2019-10710.json +++ b/2019/10xxx/CVE-2019-10710.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-10710", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-10710", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insecure permissions in the Web management portal on all IP cameras based on Hisilicon Hi3510 firmware allow authenticated attackers to receive a network's cleartext WiFi credentials via a specific HTTP request. This affects certain devices labeled as HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/", + "url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/" } ] } diff --git a/2019/7xxx/CVE-2019-7727.json b/2019/7xxx/CVE-2019-7727.json index 701a27d49f7..e4614e13e46 100644 --- a/2019/7xxx/CVE-2019-7727.json +++ b/2019/7xxx/CVE-2019-7727.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7727", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In NICE Engage through 6.5, the default configuration binds an unauthenticated JMX/RMI interface to all network interfaces, without restricting registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol by using the JMX connector. The observed affected TCP port is 6338 but, based on the product's configuration, a different one could be vulnerable." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "BUGTRAQ", + "name": "20190401 CVE-2019-7727 - JMX/RMI Nice ENGAGE <= 6.5 Remote Command Execution", + "url": "https://seclists.org/bugtraq/2019/Apr/2" + }, + { + "refsource": "MISC", + "name": "https://redtimmysec.wordpress.com/2019/03/26/jmx-rmi-multiple-applications-rce/", + "url": "https://redtimmysec.wordpress.com/2019/03/26/jmx-rmi-multiple-applications-rce/" + }, + { + "refsource": "FULLDISC", + "name": "20190404 CVE-2019-7727 - JMX/RMI Nice ENGAGE <= 6.5 Remote Command Execution", + "url": "http://seclists.org/fulldisclosure/2019/Apr/4" } ] } diff --git a/2019/9xxx/CVE-2019-9210.json b/2019/9xxx/CVE-2019-9210.json index d1bd9b91526..70d5cce2150 100644 --- a/2019/9xxx/CVE-2019-9210.json +++ b/2019/9xxx/CVE-2019-9210.json @@ -71,6 +71,11 @@ "refsource": "UBUNTU", "name": "USN-3936-1", "url": "https://usn.ubuntu.com/3936-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-3936-2", + "url": "https://usn.ubuntu.com/3936-2/" } ] }