"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-11-15 16:01:45 +00:00
parent 4897e39f97
commit b48aab8d43
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 138 additions and 5 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-5047",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Jetty 6.x before 6.1.22 suffers from an escape sequence injection vulnerability from two different vectors: 1) \"Cookie Dump Servlet\" and 2) Http Content-Length header. 1) A POST request to the form at \"/test/cookie/\" with the \"Age\" parameter set to a string throws a \"java.lang.NumberFormatException\" which reflects binary characters including ESC. These characters could be used to execute arbitrary commands or buffer dumps in the terminal. 2) The same attack in 1) can be exploited by requesting a page using an HTTP request \"Content-Length\" header set to a letteral string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt",
"url": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2009-5047",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2009-5047"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20110114 Re: CVE requests: ftpls, xdigger, lbreakout2, calibre, typo3",
"url": "https://www.openwall.com/lists/oss-security/2011/01/14/2"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2016-5285",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "NSS",
"product": {
"product_data": [
{
"product_name": "NSS",
"version": {
"version_data": [
{
"version_value": "before 3.26"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,58 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Null pointer dereference vulnerability exists in K11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime in NSS before 3.26, which causes the TLS/SSL server using NSS to crash."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2016-5285",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2016-5285"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5285",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5285"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-5285",
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-5285"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html"
},
{
"refsource": "MISC",
"name": "https://downloads.avaya.com/css/P8/documents/101033728",
"url": "https://downloads.avaya.com/css/P8/documents/101033728"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/cve/CVE-2016-5285",
"url": "https://packetstormsecurity.com/files/cve/CVE-2016-5285"
},
{
"refsource": "MISC",
"name": "https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-5285",
"url": "https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-5285"
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20191115 [SECURITY] [DLA 1993-1] mesa security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html"
}
]
},