"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-23 20:00:49 +00:00
parent 759468cf0f
commit 7ab39a1484
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
10 changed files with 889 additions and 779 deletions

View File

@ -1,220 +1,221 @@
{ {
"CVE_data_meta":{ "CVE_data_meta": {
"ASSIGNER":"secalert@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID":"CVE-2014-0107", "ID": "CVE-2014-0107",
"STATE":"PUBLIC" "STATE": "PUBLIC"
}, },
"affects":{ "affects": {
"vendor":{ "vendor": {
"vendor_data":[ "vendor_data": [
{ {
"product":{ "product": {
"product_data":[ "product_data": [
{ {
"product_name":"n/a", "product_name": "n/a",
"version":{ "version": {
"version_data":[ "version_data": [
{ {
"version_value":"n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name":"n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format":"MITRE", "data_format": "MITRE",
"data_type":"CVE", "data_type": "CVE",
"data_version":"4.0", "data_version": "4.0",
"description":{ "description": {
"description_data":[ "description_data": [
{ {
"lang":"eng", "lang": "eng",
"value":"The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function." "value": "The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function."
} }
] ]
}, },
"problemtype":{ "problemtype": {
"problemtype_data":[ "problemtype_data": [
{ {
"description":[ "description": [
{ {
"lang":"eng", "lang": "eng",
"value":"n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references":{ "references": {
"reference_data":[ "reference_data": [
{ {
"name":"https://issues.apache.org/jira/browse/XALANJ-2435", "name": "https://issues.apache.org/jira/browse/XALANJ-2435",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://issues.apache.org/jira/browse/XALANJ-2435" "url": "https://issues.apache.org/jira/browse/XALANJ-2435"
}, },
{ {
"name":"GLSA-201604-02", "name": "GLSA-201604-02",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"https://security.gentoo.org/glsa/201604-02" "url": "https://security.gentoo.org/glsa/201604-02"
}, },
{ {
"name":"59291", "name": "59291",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59291" "url": "http://secunia.com/advisories/59291"
}, },
{ {
"name":"59290", "name": "59290",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59290" "url": "http://secunia.com/advisories/59290"
}, },
{ {
"name":"RHSA-2015:1888", "name": "RHSA-2015:1888",
"refsource":"REDHAT", "refsource": "REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2015-1888.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1888.html"
}, },
{ {
"name":"59151", "name": "59151",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59151" "url": "http://secunia.com/advisories/59151"
}, },
{ {
"name":"59247", "name": "59247",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59247" "url": "http://secunia.com/advisories/59247"
}, },
{ {
"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
}, },
{ {
"name":"59515", "name": "59515",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59515" "url": "http://secunia.com/advisories/59515"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676093", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676093",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676093" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676093"
}, },
{ {
"name":"http://www.ibm.com/support/docview.wss?uid=swg21677967", "name": "http://www.ibm.com/support/docview.wss?uid=swg21677967",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.ibm.com/support/docview.wss?uid=swg21677967" "url": "http://www.ibm.com/support/docview.wss?uid=swg21677967"
}, },
{ {
"name":"https://www.tenable.com/security/tns-2018-15", "name": "https://www.tenable.com/security/tns-2018-15",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-15" "url": "https://www.tenable.com/security/tns-2018-15"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677145", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677145",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677145" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677145"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21681933", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21681933",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21681933" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21681933"
}, },
{ {
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{ {
"name":"DSA-2886", "name": "DSA-2886",
"refsource":"DEBIAN", "refsource": "DEBIAN",
"url":"http://www.debian.org/security/2014/dsa-2886" "url": "http://www.debian.org/security/2014/dsa-2886"
}, },
{ {
"name":"60502", "name": "60502",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/60502" "url": "http://secunia.com/advisories/60502"
}, },
{ {
"name":"59369", "name": "59369",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59369" "url": "http://secunia.com/advisories/59369"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21674334", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674334",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21674334" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674334"
}, },
{ {
"name":"59711", "name": "59711",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59711" "url": "http://secunia.com/advisories/59711"
}, },
{ {
"name":"http://www.ocert.org/advisories/ocert-2014-002.html", "name": "http://www.ocert.org/advisories/ocert-2014-002.html",
"refsource":"MISC", "refsource": "MISC",
"url":"http://www.ocert.org/advisories/ocert-2014-002.html" "url": "http://www.ocert.org/advisories/ocert-2014-002.html"
}, },
{ {
"name":"http://svn.apache.org/viewvc?view=revision&revision=1581058", "name": "http://svn.apache.org/viewvc?view=revision&revision=1581058",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1581058" "url": "http://svn.apache.org/viewvc?view=revision&revision=1581058"
}, },
{ {
"name":"57563", "name": "57563",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/57563" "url": "http://secunia.com/advisories/57563"
}, },
{ {
"name":"66397", "name": "66397",
"refsource":"BID", "refsource": "BID",
"url":"http://www.securityfocus.com/bid/66397" "url": "http://www.securityfocus.com/bid/66397"
}, },
{ {
"name":"1034711", "name": "1034711",
"refsource":"SECTRACK", "refsource": "SECTRACK",
"url":"http://www.securitytracker.com/id/1034711" "url": "http://www.securitytracker.com/id/1034711"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21680703", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21680703",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21680703" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21680703"
}, },
{ {
"name":"1034716", "name": "1034716",
"refsource":"SECTRACK", "refsource": "SECTRACK",
"url":"http://www.securitytracker.com/id/1034716" "url": "http://www.securitytracker.com/id/1034716"
}, },
{ {
"name":"RHSA-2014:1351", "name": "RHSA-2014:1351",
"refsource":"REDHAT", "refsource": "REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2014-1351.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-1351.html"
}, },
{ {
"name":"RHSA-2014:0348", "name": "RHSA-2014:0348",
"refsource":"REDHAT", "refsource": "REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2014-0348.html" "url": "http://rhn.redhat.com/errata/RHSA-2014-0348.html"
}, },
{ {
"name":"59036", "name": "59036",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59036" "url": "http://secunia.com/advisories/59036"
}, },
{ {
"name":"apache-xalanjava-cve20140107-sec-bypass(92023)", "name": "apache-xalanjava-cve20140107-sec-bypass(92023)",
"refsource":"XF", "refsource": "XF",
"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/92023" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92023"
}, },
{ {
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
} }
] ]
} }

View File

@ -1,400 +1,401 @@
{ {
"CVE_data_meta":{ "CVE_data_meta": {
"ASSIGNER":"secalert@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID":"CVE-2014-0114", "ID": "CVE-2014-0114",
"STATE":"PUBLIC" "STATE": "PUBLIC"
}, },
"affects":{ "affects": {
"vendor":{ "vendor": {
"vendor_data":[ "vendor_data": [
{ {
"product":{ "product": {
"product_data":[ "product_data": [
{ {
"product_name":"n/a", "product_name": "n/a",
"version":{ "version": {
"version_data":[ "version_data": [
{ {
"version_value":"n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name":"n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format":"MITRE", "data_format": "MITRE",
"data_type":"CVE", "data_type": "CVE",
"data_version":"4.0", "data_version": "4.0",
"description":{ "description": {
"description_data":[ "description_data": [
{ {
"lang":"eng", "lang": "eng",
"value":"Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1." "value": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1."
} }
] ]
}, },
"problemtype":{ "problemtype": {
"problemtype_data":[ "problemtype_data": [
{ {
"description":[ "description": [
{ {
"lang":"eng", "lang": "eng",
"value":"n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references":{ "references": {
"reference_data":[ "reference_data": [
{ {
"name":"[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114", "name": "[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114",
"refsource":"MLIST", "refsource": "MLIST",
"url":"http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html" "url": "http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html"
}, },
{ {
"name":"57477", "name": "57477",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/57477" "url": "http://secunia.com/advisories/57477"
}, },
{ {
"name":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html", "name": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html" "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
}, },
{ {
"name":"https://issues.apache.org/jira/browse/BEANUTILS-463", "name": "https://issues.apache.org/jira/browse/BEANUTILS-463",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://issues.apache.org/jira/browse/BEANUTILS-463" "url": "https://issues.apache.org/jira/browse/BEANUTILS-463"
}, },
{ {
"name":"58710", "name": "58710",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/58710" "url": "http://secunia.com/advisories/58710"
}, },
{ {
"name":"MDVSA-2014:095", "name": "MDVSA-2014:095",
"refsource":"MANDRIVA", "refsource": "MANDRIVA",
"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:095" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:095"
}, },
{ {
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
}, },
{ {
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
}, },
{ {
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
}, },
{ {
"name":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html" "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675689", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675689" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689"
}, },
{ {
"name":"FEDORA-2014-9380", "name": "FEDORA-2014-9380",
"refsource":"FEDORA", "refsource": "FEDORA",
"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21674812", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21674812" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812"
}, },
{ {
"name":"https://security.netapp.com/advisory/ntap-20140911-0001/", "name": "https://security.netapp.com/advisory/ntap-20140911-0001/",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20140911-0001/" "url": "https://security.netapp.com/advisory/ntap-20140911-0001/"
}, },
{ {
"name":"59464", "name": "59464",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59464" "url": "http://secunia.com/advisories/59464"
}, },
{ {
"name":"59118", "name": "59118",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59118" "url": "http://secunia.com/advisories/59118"
}, },
{ {
"name":"https://security.netapp.com/advisory/ntap-20180629-0006/", "name": "https://security.netapp.com/advisory/ntap-20180629-0006/",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180629-0006/" "url": "https://security.netapp.com/advisory/ntap-20180629-0006/"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675387", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675387" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387"
}, },
{ {
"name":"https://access.redhat.com/solutions/869353", "name": "https://access.redhat.com/solutions/869353",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://access.redhat.com/solutions/869353" "url": "https://access.redhat.com/solutions/869353"
}, },
{ {
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1091938", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1091938" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938"
}, },
{ {
"name":"http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt", "name": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt" "url": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt"
}, },
{ {
"name":"http://advisories.mageia.org/MGASA-2014-0219.html", "name": "http://advisories.mageia.org/MGASA-2014-0219.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://advisories.mageia.org/MGASA-2014-0219.html" "url": "http://advisories.mageia.org/MGASA-2014-0219.html"
}, },
{ {
"name":"60703", "name": "60703",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/60703" "url": "http://secunia.com/advisories/60703"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675972", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675972" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972"
}, },
{ {
"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676375", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676375" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375"
}, },
{ {
"name":"[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE", "name": "[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE",
"refsource":"MLIST", "refsource": "MLIST",
"url":"http://openwall.com/lists/oss-security/2014/07/08/1" "url": "http://openwall.com/lists/oss-security/2014/07/08/1"
}, },
{ {
"name":"RHSA-2018:2669", "name": "RHSA-2018:2669",
"refsource":"REDHAT", "refsource": "REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2669" "url": "https://access.redhat.com/errata/RHSA-2018:2669"
}, },
{ {
"name":"GLSA-201607-09", "name": "GLSA-201607-09",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"https://security.gentoo.org/glsa/201607-09" "url": "https://security.gentoo.org/glsa/201607-09"
}, },
{ {
"name":"HPSBST03160", "name": "HPSBST03160",
"refsource":"HP", "refsource": "HP",
"url":"http://marc.info/?l=bugtraq&m=141451023707502&w=2" "url": "http://marc.info/?l=bugtraq&m=141451023707502&w=2"
}, },
{ {
"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource":"BUGTRAQ", "refsource": "BUGTRAQ",
"url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675898", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675898" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676110", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676110" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110"
}, },
{ {
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg27042296", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg27042296" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676303", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676303" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303"
}, },
{ {
"name":"59228", "name": "59228",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59228" "url": "http://secunia.com/advisories/59228"
}, },
{ {
"name":"59246", "name": "59246",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59246" "url": "http://secunia.com/advisories/59246"
}, },
{ {
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{ {
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1116665", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116665" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665"
}, },
{ {
"name":"[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE", "name": "[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE",
"refsource":"MLIST", "refsource": "MLIST",
"url":"http://openwall.com/lists/oss-security/2014/06/15/10" "url": "http://openwall.com/lists/oss-security/2014/06/15/10"
}, },
{ {
"name":"59245", "name": "59245",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59245" "url": "http://secunia.com/advisories/59245"
}, },
{ {
"name":"HPSBMU03090", "name": "HPSBMU03090",
"refsource":"HP", "refsource": "HP",
"url":"http://marc.info/?l=bugtraq&m=140801096002766&w=2" "url": "http://marc.info/?l=bugtraq&m=140801096002766&w=2"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21674128", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21674128" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676931", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676931" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
}, },
{ {
"name":"60177", "name": "60177",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/60177" "url": "http://secunia.com/advisories/60177"
}, },
{ {
"name":"20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities",
"refsource":"FULLDISC", "refsource": "FULLDISC",
"url":"http://seclists.org/fulldisclosure/2014/Dec/23" "url": "http://seclists.org/fulldisclosure/2014/Dec/23"
}, },
{ {
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
}, },
{ {
"name":"http://www.ibm.com/support/docview.wss?uid=swg21675496", "name": "http://www.ibm.com/support/docview.wss?uid=swg21675496",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.ibm.com/support/docview.wss?uid=swg21675496" "url": "http://www.ibm.com/support/docview.wss?uid=swg21675496"
}, },
{ {
"name":"DSA-2940", "name": "DSA-2940",
"refsource":"DEBIAN", "refsource": "DEBIAN",
"url":"http://www.debian.org/security/2014/dsa-2940" "url": "http://www.debian.org/security/2014/dsa-2940"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21675266", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21675266" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266"
}, },
{ {
"name":"59014", "name": "59014",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59014" "url": "http://secunia.com/advisories/59014"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21677110", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21677110" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110"
}, },
{ {
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21676091", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21676091" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091"
}, },
{ {
"name":"67121", "name": "67121",
"refsource":"BID", "refsource": "BID",
"url":"http://www.securityfocus.com/bid/67121" "url": "http://www.securityfocus.com/bid/67121"
}, },
{ {
"name":"59480", "name": "59480",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59480" "url": "http://secunia.com/advisories/59480"
}, },
{ {
"name":"HPSBGN03041", "name": "HPSBGN03041",
"refsource":"HP", "refsource": "HP",
"url":"http://marc.info/?l=bugtraq&m=140119284401582&w=2" "url": "http://marc.info/?l=bugtraq&m=140119284401582&w=2"
}, },
{ {
"name":"59479", "name": "59479",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59479" "url": "http://secunia.com/advisories/59479"
}, },
{ {
"name":"59704", "name": "59704",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59704" "url": "http://secunia.com/advisories/59704"
}, },
{ {
"name":"58947", "name": "58947",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/58947" "url": "http://secunia.com/advisories/58947"
}, },
{ {
"name":"59718", "name": "59718",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59718" "url": "http://secunia.com/advisories/59718"
}, },
{ {
"name":"59430", "name": "59430",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/59430" "url": "http://secunia.com/advisories/59430"
}, },
{ {
"name":"58851", "name": "58851",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/58851" "url": "http://secunia.com/advisories/58851"
}, },
{ {
"refsource":"MLIST", "refsource": "MLIST",
"name":"[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities", "name": "[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E" "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E"
}, },
{ {
"refsource":"MLIST", "refsource": "MLIST",
"name":"[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities", "name": "[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E" "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E"
}, },
{ {
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
} }
] ]
} }

View File

@ -1,155 +1,156 @@
{ {
"CVE_data_meta":{ "CVE_data_meta": {
"ASSIGNER":"security@google.com", "ASSIGNER": "security@google.com",
"ID":"CVE-2014-7923", "ID": "CVE-2014-7923",
"STATE":"PUBLIC" "STATE": "PUBLIC"
}, },
"affects":{ "affects": {
"vendor":{ "vendor": {
"vendor_data":[ "vendor_data": [
{ {
"product":{ "product": {
"product_data":[ "product_data": [
{ {
"product_name":"n/a", "product_name": "n/a",
"version":{ "version": {
"version_data":[ "version_data": [
{ {
"version_value":"n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name":"n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format":"MITRE", "data_format": "MITRE",
"data_type":"CVE", "data_type": "CVE",
"data_version":"4.0", "data_version": "4.0",
"description":{ "description": {
"description_data":[ "description_data": [
{ {
"lang":"eng", "lang": "eng",
"value":"The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression." "value": "The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression."
} }
] ]
}, },
"problemtype":{ "problemtype": {
"problemtype_data":[ "problemtype_data": [
{ {
"description":[ "description": [
{ {
"lang":"eng", "lang": "eng",
"value":"n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references":{ "references": {
"reference_data":[ "reference_data": [
{ {
"name":"62665", "name": "62665",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62665" "url": "http://secunia.com/advisories/62665"
}, },
{ {
"name":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb" "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{ {
"name":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html", "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html" "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
}, },
{ {
"name":"62575", "name": "62575",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62575" "url": "http://secunia.com/advisories/62575"
}, },
{ {
"name":"https://codereview.chromium.org/726973003", "name": "https://codereview.chromium.org/726973003",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://codereview.chromium.org/726973003" "url": "https://codereview.chromium.org/726973003"
}, },
{ {
"name":"USN-2476-1", "name": "USN-2476-1",
"refsource":"UBUNTU", "refsource": "UBUNTU",
"url":"http://www.ubuntu.com/usn/USN-2476-1" "url": "http://www.ubuntu.com/usn/USN-2476-1"
}, },
{ {
"name":"72288", "name": "72288",
"refsource":"BID", "refsource": "BID",
"url":"http://www.securityfocus.com/bid/72288" "url": "http://www.securityfocus.com/bid/72288"
}, },
{ {
"name":"https://code.google.com/p/chromium/issues/detail?id=430353", "name": "https://code.google.com/p/chromium/issues/detail?id=430353",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://code.google.com/p/chromium/issues/detail?id=430353" "url": "https://code.google.com/p/chromium/issues/detail?id=430353"
}, },
{ {
"name":"GLSA-201502-13", "name": "GLSA-201502-13",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"http://security.gentoo.org/glsa/glsa-201502-13.xml" "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
}, },
{ {
"name":"GLSA-201503-06", "name": "GLSA-201503-06",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"https://security.gentoo.org/glsa/201503-06" "url": "https://security.gentoo.org/glsa/201503-06"
}, },
{ {
"name":"1031623", "name": "1031623",
"refsource":"SECTRACK", "refsource": "SECTRACK",
"url":"http://www.securitytracker.com/id/1031623" "url": "http://www.securitytracker.com/id/1031623"
}, },
{ {
"name":"openSUSE-SU-2015:0441", "name": "openSUSE-SU-2015:0441",
"refsource":"SUSE", "refsource": "SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
}, },
{ {
"name":"http://advisories.mageia.org/MGASA-2015-0047.html", "name": "http://advisories.mageia.org/MGASA-2015-0047.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://advisories.mageia.org/MGASA-2015-0047.html" "url": "http://advisories.mageia.org/MGASA-2015-0047.html"
}, },
{ {
"name":"http://bugs.icu-project.org/trac/ticket/11370", "name": "http://bugs.icu-project.org/trac/ticket/11370",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://bugs.icu-project.org/trac/ticket/11370" "url": "http://bugs.icu-project.org/trac/ticket/11370"
}, },
{ {
"name":"RHSA-2015:0093", "name": "RHSA-2015:0093",
"refsource":"REDHAT", "refsource": "REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2015-0093.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
}, },
{ {
"name":"62383", "name": "62383",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62383" "url": "http://secunia.com/advisories/62383"
}, },
{ {
"name":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c" "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c"
}, },
{ {
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
} }
] ]
} }

View File

@ -1,155 +1,156 @@
{ {
"CVE_data_meta":{ "CVE_data_meta": {
"ASSIGNER":"security@google.com", "ASSIGNER": "security@google.com",
"ID":"CVE-2014-7926", "ID": "CVE-2014-7926",
"STATE":"PUBLIC" "STATE": "PUBLIC"
}, },
"affects":{ "affects": {
"vendor":{ "vendor": {
"vendor_data":[ "vendor_data": [
{ {
"product":{ "product": {
"product_data":[ "product_data": [
{ {
"product_name":"n/a", "product_name": "n/a",
"version":{ "version": {
"version_data":[ "version_data": [
{ {
"version_value":"n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name":"n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format":"MITRE", "data_format": "MITRE",
"data_type":"CVE", "data_type": "CVE",
"data_version":"4.0", "data_version": "4.0",
"description":{ "description": {
"description_data":[ "description_data": [
{ {
"lang":"eng", "lang": "eng",
"value":"The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier." "value": "The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier."
} }
] ]
}, },
"problemtype":{ "problemtype": {
"problemtype_data":[ "problemtype_data": [
{ {
"description":[ "description": [
{ {
"lang":"eng", "lang": "eng",
"value":"n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references":{ "references": {
"reference_data":[ "reference_data": [
{ {
"name":"62665", "name": "62665",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62665" "url": "http://secunia.com/advisories/62665"
}, },
{ {
"name":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb", "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb" "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb"
}, },
{ {
"name":"https://code.google.com/p/chromium/issues/detail?id=422824", "name": "https://code.google.com/p/chromium/issues/detail?id=422824",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://code.google.com/p/chromium/issues/detail?id=422824" "url": "https://code.google.com/p/chromium/issues/detail?id=422824"
}, },
{ {
"name":"http://bugs.icu-project.org/trac/ticket/11369", "name": "http://bugs.icu-project.org/trac/ticket/11369",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://bugs.icu-project.org/trac/ticket/11369" "url": "http://bugs.icu-project.org/trac/ticket/11369"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{ {
"name":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html", "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html" "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
}, },
{ {
"name":"62575", "name": "62575",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62575" "url": "http://secunia.com/advisories/62575"
}, },
{ {
"name":"https://codereview.chromium.org/726973003", "name": "https://codereview.chromium.org/726973003",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://codereview.chromium.org/726973003" "url": "https://codereview.chromium.org/726973003"
}, },
{ {
"name":"USN-2476-1", "name": "USN-2476-1",
"refsource":"UBUNTU", "refsource": "UBUNTU",
"url":"http://www.ubuntu.com/usn/USN-2476-1" "url": "http://www.ubuntu.com/usn/USN-2476-1"
}, },
{ {
"name":"72288", "name": "72288",
"refsource":"BID", "refsource": "BID",
"url":"http://www.securityfocus.com/bid/72288" "url": "http://www.securityfocus.com/bid/72288"
}, },
{ {
"name":"GLSA-201502-13", "name": "GLSA-201502-13",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"http://security.gentoo.org/glsa/glsa-201502-13.xml" "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
}, },
{ {
"name":"GLSA-201503-06", "name": "GLSA-201503-06",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"https://security.gentoo.org/glsa/201503-06" "url": "https://security.gentoo.org/glsa/201503-06"
}, },
{ {
"name":"1031623", "name": "1031623",
"refsource":"SECTRACK", "refsource": "SECTRACK",
"url":"http://www.securitytracker.com/id/1031623" "url": "http://www.securitytracker.com/id/1031623"
}, },
{ {
"name":"openSUSE-SU-2015:0441", "name": "openSUSE-SU-2015:0441",
"refsource":"SUSE", "refsource": "SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
}, },
{ {
"name":"http://advisories.mageia.org/MGASA-2015-0047.html", "name": "http://advisories.mageia.org/MGASA-2015-0047.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://advisories.mageia.org/MGASA-2015-0047.html" "url": "http://advisories.mageia.org/MGASA-2015-0047.html"
}, },
{ {
"name":"RHSA-2015:0093", "name": "RHSA-2015:0093",
"refsource":"REDHAT", "refsource": "REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2015-0093.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
}, },
{ {
"name":"62383", "name": "62383",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62383" "url": "http://secunia.com/advisories/62383"
}, },
{ {
"name":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c", "name": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c" "url": "https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c"
}, },
{ {
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
} }
] ]
} }

View File

@ -1,145 +1,146 @@
{ {
"CVE_data_meta":{ "CVE_data_meta": {
"ASSIGNER":"security@google.com", "ASSIGNER": "security@google.com",
"ID":"CVE-2014-7940", "ID": "CVE-2014-7940",
"STATE":"PUBLIC" "STATE": "PUBLIC"
}, },
"affects":{ "affects": {
"vendor":{ "vendor": {
"vendor_data":[ "vendor_data": [
{ {
"product":{ "product": {
"product_data":[ "product_data": [
{ {
"product_name":"n/a", "product_name": "n/a",
"version":{ "version": {
"version_data":[ "version_data": [
{ {
"version_value":"n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name":"n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format":"MITRE", "data_format": "MITRE",
"data_type":"CVE", "data_type": "CVE",
"data_version":"4.0", "data_version": "4.0",
"description":{ "description": {
"description_data":[ "description_data": [
{ {
"lang":"eng", "lang": "eng",
"value":"The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence." "value": "The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence."
} }
] ]
}, },
"problemtype":{ "problemtype": {
"problemtype_data":[ "problemtype_data": [
{ {
"description":[ "description": [
{ {
"lang":"eng", "lang": "eng",
"value":"n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references":{ "references": {
"reference_data":[ "reference_data": [
{ {
"name":"62665", "name": "62665",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62665" "url": "http://secunia.com/advisories/62665"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{ {
"name":"https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8", "name": "https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8" "url": "https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8"
}, },
{ {
"name":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html", "name": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html" "url": "http://googlechromereleases.blogspot.com/2015/01/stable-update.html"
}, },
{ {
"name":"62575", "name": "62575",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62575" "url": "http://secunia.com/advisories/62575"
}, },
{ {
"name":"USN-2476-1", "name": "USN-2476-1",
"refsource":"UBUNTU", "refsource": "UBUNTU",
"url":"http://www.ubuntu.com/usn/USN-2476-1" "url": "http://www.ubuntu.com/usn/USN-2476-1"
}, },
{ {
"name":"72288", "name": "72288",
"refsource":"BID", "refsource": "BID",
"url":"http://www.securityfocus.com/bid/72288" "url": "http://www.securityfocus.com/bid/72288"
}, },
{ {
"name":"GLSA-201502-13", "name": "GLSA-201502-13",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"http://security.gentoo.org/glsa/glsa-201502-13.xml" "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
}, },
{ {
"name":"GLSA-201503-06", "name": "GLSA-201503-06",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"https://security.gentoo.org/glsa/201503-06" "url": "https://security.gentoo.org/glsa/201503-06"
}, },
{ {
"name":"1031623", "name": "1031623",
"refsource":"SECTRACK", "refsource": "SECTRACK",
"url":"http://www.securitytracker.com/id/1031623" "url": "http://www.securitytracker.com/id/1031623"
}, },
{ {
"name":"https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075", "name": "https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075" "url": "https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075"
}, },
{ {
"name":"https://code.google.com/p/chromium/issues/detail?id=433866", "name": "https://code.google.com/p/chromium/issues/detail?id=433866",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://code.google.com/p/chromium/issues/detail?id=433866" "url": "https://code.google.com/p/chromium/issues/detail?id=433866"
}, },
{ {
"name":"openSUSE-SU-2015:0441", "name": "openSUSE-SU-2015:0441",
"refsource":"SUSE", "refsource": "SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html"
}, },
{ {
"name":"http://advisories.mageia.org/MGASA-2015-0047.html", "name": "http://advisories.mageia.org/MGASA-2015-0047.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://advisories.mageia.org/MGASA-2015-0047.html" "url": "http://advisories.mageia.org/MGASA-2015-0047.html"
}, },
{ {
"name":"RHSA-2015:0093", "name": "RHSA-2015:0093",
"refsource":"REDHAT", "refsource": "REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2015-0093.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-0093.html"
}, },
{ {
"name":"62383", "name": "62383",
"refsource":"SECUNIA", "refsource": "SECUNIA",
"url":"http://secunia.com/advisories/62383" "url": "http://secunia.com/advisories/62383"
}, },
{ {
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
} }
] ]
} }

View File

@ -1,150 +1,151 @@
{ {
"CVE_data_meta":{ "CVE_data_meta": {
"ASSIGNER":"secalert@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID":"CVE-2014-8146", "ID": "CVE-2014-8146",
"STATE":"PUBLIC" "STATE": "PUBLIC"
}, },
"affects":{ "affects": {
"vendor":{ "vendor": {
"vendor_data":[ "vendor_data": [
{ {
"product":{ "product": {
"product_data":[ "product_data": [
{ {
"product_name":"n/a", "product_name": "n/a",
"version":{ "version": {
"version_data":[ "version_data": [
{ {
"version_value":"n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name":"n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format":"MITRE", "data_format": "MITRE",
"data_type":"CVE", "data_type": "CVE",
"data_version":"4.0", "data_version": "4.0",
"description":{ "description": {
"description_data":[ "description_data": [
{ {
"lang":"eng", "lang": "eng",
"value":"The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text." "value": "The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text."
} }
] ]
}, },
"problemtype":{ "problemtype": {
"problemtype_data":[ "problemtype_data": [
{ {
"description":[ "description": [
{ {
"lang":"eng", "lang": "eng",
"value":"n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references":{ "references": {
"reference_data":[ "reference_data": [
{ {
"name":"https://support.apple.com/HT205221", "name": "https://support.apple.com/HT205221",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://support.apple.com/HT205221" "url": "https://support.apple.com/HT205221"
}, },
{ {
"name":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", "name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt",
"refsource":"MISC", "refsource": "MISC",
"url":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt" "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt"
}, },
{ {
"name":"http://bugs.icu-project.org/trac/changeset/37162", "name": "http://bugs.icu-project.org/trac/changeset/37162",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://bugs.icu-project.org/trac/changeset/37162" "url": "http://bugs.icu-project.org/trac/changeset/37162"
}, },
{ {
"name":"https://support.apple.com/HT205212", "name": "https://support.apple.com/HT205212",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://support.apple.com/HT205212" "url": "https://support.apple.com/HT205212"
}, },
{ {
"name":"APPLE-SA-2015-09-30-3", "name": "APPLE-SA-2015-09-30-3",
"refsource":"APPLE", "refsource": "APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{ {
"name":"GLSA-201507-04", "name": "GLSA-201507-04",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"https://security.gentoo.org/glsa/201507-04" "url": "https://security.gentoo.org/glsa/201507-04"
}, },
{ {
"name":"VU#602540", "name": "VU#602540",
"refsource":"CERT-VN", "refsource": "CERT-VN",
"url":"http://www.kb.cert.org/vuls/id/602540" "url": "http://www.kb.cert.org/vuls/id/602540"
}, },
{ {
"name":"https://support.apple.com/HT205267", "name": "https://support.apple.com/HT205267",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://support.apple.com/HT205267" "url": "https://support.apple.com/HT205267"
}, },
{ {
"name":"20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", "name": "20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL",
"refsource":"FULLDISC", "refsource": "FULLDISC",
"url":"http://seclists.org/fulldisclosure/2015/May/14" "url": "http://seclists.org/fulldisclosure/2015/May/14"
}, },
{ {
"name":"APPLE-SA-2015-09-21-1", "name": "APPLE-SA-2015-09-21-1",
"refsource":"APPLE", "refsource": "APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
}, },
{ {
"name":"APPLE-SA-2015-09-16-3", "name": "APPLE-SA-2015-09-16-3",
"refsource":"APPLE", "refsource": "APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
}, },
{ {
"name":"[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", "name": "[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL",
"refsource":"MLIST", "refsource": "MLIST",
"url":"http://openwall.com/lists/oss-security/2015/05/05/6" "url": "http://openwall.com/lists/oss-security/2015/05/05/6"
}, },
{ {
"name":"https://support.apple.com/HT205213", "name": "https://support.apple.com/HT205213",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://support.apple.com/HT205213" "url": "https://support.apple.com/HT205213"
}, },
{ {
"name":"74457", "name": "74457",
"refsource":"BID", "refsource": "BID",
"url":"http://www.securityfocus.com/bid/74457" "url": "http://www.securityfocus.com/bid/74457"
}, },
{ {
"name":"APPLE-SA-2015-09-16-1", "name": "APPLE-SA-2015-09-16-1",
"refsource":"APPLE", "refsource": "APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
}, },
{ {
"name":"DSA-3323", "name": "DSA-3323",
"refsource":"DEBIAN", "refsource": "DEBIAN",
"url":"http://www.debian.org/security/2015/dsa-3323" "url": "http://www.debian.org/security/2015/dsa-3323"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}, },
{ {
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
} }
] ]
} }

View File

@ -1,130 +1,131 @@
{ {
"CVE_data_meta":{ "CVE_data_meta": {
"ASSIGNER":"secalert@redhat.com", "ASSIGNER": "secalert@redhat.com",
"ID":"CVE-2014-8147", "ID": "CVE-2014-8147",
"STATE":"PUBLIC" "STATE": "PUBLIC"
}, },
"affects":{ "affects": {
"vendor":{ "vendor": {
"vendor_data":[ "vendor_data": [
{ {
"product":{ "product": {
"product_data":[ "product_data": [
{ {
"product_name":"n/a", "product_name": "n/a",
"version":{ "version": {
"version_data":[ "version_data": [
{ {
"version_value":"n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name":"n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format":"MITRE", "data_format": "MITRE",
"data_type":"CVE", "data_type": "CVE",
"data_version":"4.0", "data_version": "4.0",
"description":{ "description": {
"description_data":[ "description_data": [
{ {
"lang":"eng", "lang": "eng",
"value":"The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text." "value": "The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text."
} }
] ]
}, },
"problemtype":{ "problemtype": {
"problemtype_data":[ "problemtype_data": [
{ {
"description":[ "description": [
{ {
"lang":"eng", "lang": "eng",
"value":"n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references":{ "references": {
"reference_data":[ "reference_data": [
{ {
"name":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt", "name": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt",
"refsource":"MISC", "refsource": "MISC",
"url":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt" "url": "https://raw.githubusercontent.com/pedrib/PoC/master/generic/i-c-u-fail.txt"
}, },
{ {
"name":"APPLE-SA-2015-09-30-3", "name": "APPLE-SA-2015-09-30-3",
"refsource":"APPLE", "refsource": "APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{ {
"name":"GLSA-201507-04", "name": "GLSA-201507-04",
"refsource":"GENTOO", "refsource": "GENTOO",
"url":"https://security.gentoo.org/glsa/201507-04" "url": "https://security.gentoo.org/glsa/201507-04"
}, },
{ {
"name":"VU#602540", "name": "VU#602540",
"refsource":"CERT-VN", "refsource": "CERT-VN",
"url":"http://www.kb.cert.org/vuls/id/602540" "url": "http://www.kb.cert.org/vuls/id/602540"
}, },
{ {
"name":"https://support.apple.com/HT205267", "name": "https://support.apple.com/HT205267",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://support.apple.com/HT205267" "url": "https://support.apple.com/HT205267"
}, },
{ {
"name":"20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", "name": "20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL",
"refsource":"FULLDISC", "refsource": "FULLDISC",
"url":"http://seclists.org/fulldisclosure/2015/May/14" "url": "http://seclists.org/fulldisclosure/2015/May/14"
}, },
{ {
"name":"APPLE-SA-2015-09-21-1", "name": "APPLE-SA-2015-09-21-1",
"refsource":"APPLE", "refsource": "APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
}, },
{ {
"name":"[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL", "name": "[oss-security] 20150505 [CVE-2014-8146/8147] - ICU heap and integer overflows / I-C-U-FAIL",
"refsource":"MLIST", "refsource": "MLIST",
"url":"http://openwall.com/lists/oss-security/2015/05/05/6" "url": "http://openwall.com/lists/oss-security/2015/05/05/6"
}, },
{ {
"name":"https://support.apple.com/HT205213", "name": "https://support.apple.com/HT205213",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"https://support.apple.com/HT205213" "url": "https://support.apple.com/HT205213"
}, },
{ {
"name":"74457", "name": "74457",
"refsource":"BID", "refsource": "BID",
"url":"http://www.securityfocus.com/bid/74457" "url": "http://www.securityfocus.com/bid/74457"
}, },
{ {
"name":"DSA-3323", "name": "DSA-3323",
"refsource":"DEBIAN", "refsource": "DEBIAN",
"url":"http://www.debian.org/security/2015/dsa-3323" "url": "http://www.debian.org/security/2015/dsa-3323"
}, },
{ {
"name":"http://bugs.icu-project.org/trac/changeset/37080", "name": "http://bugs.icu-project.org/trac/changeset/37080",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://bugs.icu-project.org/trac/changeset/37080" "url": "http://bugs.icu-project.org/trac/changeset/37080"
}, },
{ {
"name":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource":"CONFIRM", "refsource": "CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}, },
{ {
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
} }
] ]
} }

View File

@ -1,17 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-10710",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2019-10710",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Insecure permissions in the Web management portal on all IP cameras based on Hisilicon Hi3510 firmware allow authenticated attackers to receive a network's cleartext WiFi credentials via a specific HTTP request. This affects certain devices labeled as HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/",
"url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/"
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7727", "ID": "CVE-2019-7727",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "In NICE Engage through 6.5, the default configuration binds an unauthenticated JMX/RMI interface to all network interfaces, without restricting registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol by using the JMX connector. The observed affected TCP port is 6338 but, based on the product's configuration, a different one could be vulnerable."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "BUGTRAQ",
"name": "20190401 CVE-2019-7727 - JMX/RMI Nice ENGAGE <= 6.5 Remote Command Execution",
"url": "https://seclists.org/bugtraq/2019/Apr/2"
},
{
"refsource": "MISC",
"name": "https://redtimmysec.wordpress.com/2019/03/26/jmx-rmi-multiple-applications-rce/",
"url": "https://redtimmysec.wordpress.com/2019/03/26/jmx-rmi-multiple-applications-rce/"
},
{
"refsource": "FULLDISC",
"name": "20190404 CVE-2019-7727 - JMX/RMI Nice ENGAGE <= 6.5 Remote Command Execution",
"url": "http://seclists.org/fulldisclosure/2019/Apr/4"
} }
] ]
} }

View File

@ -71,6 +71,11 @@
"refsource": "UBUNTU", "refsource": "UBUNTU",
"name": "USN-3936-1", "name": "USN-3936-1",
"url": "https://usn.ubuntu.com/3936-1/" "url": "https://usn.ubuntu.com/3936-1/"
},
{
"refsource": "UBUNTU",
"name": "USN-3936-2",
"url": "https://usn.ubuntu.com/3936-2/"
} }
] ]
} }