- Synchronized data.

This commit is contained in:
CVE Team 2017-11-16 19:06:02 -05:00
parent 1ea8a82056
commit 7ea44b89b4
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
3 changed files with 177 additions and 177 deletions

View File

@ -1,62 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "kurt@seifried.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.446674",
"ID": "CVE-2017-1000218",
"REQUESTER": "jacksonfylle@gmail.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "LightFTP",
"version": {
"version_data": [
{
"version_value": "1.1"
}
]
}
}
]
},
"vendor_name": ""
}
"CVE_data_meta" : {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"DATE_ASSIGNED" : "2017-08-22T17:29:33.446674",
"ID" : "CVE-2017-1000218",
"REQUESTER" : "jacksonfylle@gmail.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "LightFTP",
"version" : {
"version_data" : [
{
"version_value" : "1.1"
}
]
}
}
]
},
"vendor_name" : ""
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "LightFTP version 1.1 is vulnerable to a buffer overflow in the \"writelogentry\" function resulting a denial of services or a remote code execution."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Overflow"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "LightFTP version 1.1 is vulnerable to a buffer overflow in the \"writelogentry\" function resulting a denial of services or a remote code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/hfiref0x/LightFTP/issues/5"
}
]
}
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://github.com/hfiref0x/LightFTP/issues/5"
}
]
}
}

View File

@ -1,62 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "kurt@seifried.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.447574",
"ID": "CVE-2017-1000219",
"REQUESTER": "bond@casaba.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "windows-cpu",
"version": {
"version_data": [
{
"version_value": "all"
}
]
}
}
]
},
"vendor_name": "Kyle Ross"
}
"CVE_data_meta" : {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"DATE_ASSIGNED" : "2017-08-22T17:29:33.447574",
"ID" : "CVE-2017-1000219",
"REQUESTER" : "bond@casaba.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "windows-cpu",
"version" : {
"version_data" : [
{
"version_value" : "all"
}
]
}
}
]
},
"vendor_name" : "Kyle Ross"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "npm/KyleRoss windows-cpu all versions vulnerable to command injection resulting in code execution as Node.js user"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Shell Injection"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "npm/KyleRoss windows-cpu all versions vulnerable to command injection resulting in code execution as Node.js user"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Shell Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://nodesecurity.io/advisories/336"
}
]
}
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://nodesecurity.io/advisories/336"
}
]
}
}

View File

@ -1,62 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "kurt@seifried.org",
"DATE_ASSIGNED": "2017-08-22T17:29:33.453906",
"ID": "CVE-2017-1000224",
"REQUESTER": "tom@dxw.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "YouTube (WordPress plugin)",
"version": {
"version_data": [
{
"version_value": "11.8.1"
}
]
}
}
]
},
"vendor_name": "EmbedPlus"
}
"CVE_data_meta" : {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"DATE_ASSIGNED" : "2017-08-22T17:29:33.453906",
"ID" : "CVE-2017-1000224",
"REQUESTER" : "tom@dxw.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "YouTube (WordPress plugin)",
"version" : {
"version_data" : [
{
"version_value" : "11.8.1"
}
]
}
}
]
},
"vendor_name" : "EmbedPlus"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "CSRF in YouTube (WordPress plugin) could allow unauthenticated attacker to change any setting within the plugin"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross Site Request Forgery (CSRF)"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CSRF in YouTube (WordPress plugin) could allow unauthenticated attacker to change any setting within the plugin"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Request Forgery (CSRF)"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security.dxw.com/advisories/csrf-in-youtube-plugin/"
}
]
}
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://security.dxw.com/advisories/csrf-in-youtube-plugin/"
}
]
}
}