- Populated assignment information for various entries.

This commit is contained in:
CVE Team 2017-10-16 16:44:18 -04:00
parent 5171ecb7ee
commit b63528c880
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
4212 changed files with 47380 additions and 15513 deletions

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@suse.com",
"DATE_PUBLIC" : "2017-08-06T00:00:00",
"ID" : "CVE-2011-0469",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "openSUSE",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "open build service 2.1 before March 11 2011"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Micro Focus"
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "remote code execution"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Application Control (MAC) 6.1.0 for Linux and earlier",
"product_name" : "Application Control (MAC)",
"version" : {
"version_data" : [
{
"version_value" : "Application Control (MAC) 6.1.0 for Linux and earlier"
"version_value" : "6.1.0 for Linux and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Change Control (MCC) 6.1.0 for Linux and earlier",
"product_name" : "Change Control (MCC)",
"version" : {
"version_data" : [
{
"version_value" : "Change Control (MCC) 6.1.0 for Linux and earlier"
"version_value" : "6.1.0 for Linux and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "SaaS Control Console (SCC) Platform 6.14 before patch 1070, and 6.15 before patch 1076",
"product_name" : "SaaS Control Console (SCC) Platform",
"version" : {
"version_data" : [
{
"version_value" : "SaaS Control Console (SCC) Platform 6.14 before patch 1070, and 6.15 before patch 1076"
"version_value" : "6.14 before patch 1070, and 6.15 before patch 1076"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@apache.org",
"DATE_PUBLIC" : "2014-02-21T00:00:00",
"ID" : "CVE-2014-0043",
"STATE" : "PUBLIC"
},
@ -11,18 +12,21 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Wicket",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "1.5.10"
},
{
"version_value" : "6.13.0"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Apache Software Foundation"
}
]
}
@ -44,7 +48,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Information Disclosure"
}
]
}

View File

@ -11,18 +11,21 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Spring Security",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "3.2.0 to 3.2.1"
},
{
"version_value" : "3.1.0 to 3.1.5"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Pivotal"
}
]
}
@ -44,7 +47,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Authentication Bypass"
}
]
}

View File

@ -11,18 +11,24 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Spring Framework",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "4.0.0 to 4.0.4"
},
{
"version_value" : "3.0.0 to 3.2.8"
},
{
"version_value" : "Earlier unsupported versions may be affected"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Pivotal"
}
]
}
@ -44,7 +50,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "XXE"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Spring Security",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "3.1 to 3.2.4"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Pivotal"
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Access Control Bypass"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9411",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use of Out-of-range Pointer Offset in Core"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Android N/A",
"product_name" : "Android",
"version" : {
"version_data" : [
{
"version_value" : "Android N/A"
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Google Inc."
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Android N/A",
"product_name" : "Android",
"version" : {
"version_data" : [
{
"version_value" : "Android N/A"
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Google Inc."
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier",
"product_name" : "McAfee Application Control (MAC)",
"version" : {
"version_data" : [
{
"version_value" : "McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier"
"version_value" : "6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Cloud Analysis and Deconstructive Services (CADS) 1.0.0.3x, 1.0.0.4d and earlier",
"product_name" : "Cloud Analysis and Deconstructive Services (CADS)",
"version" : {
"version_data" : [
{
"version_value" : "Cloud Analysis and Deconstructive Services (CADS) 1.0.0.3x, 1.0.0.4d and earlier"
"version_value" : "1.0.0.3x, 1.0.0.4d and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input Vulnerability in NAS"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Signed to Unsigned Conversion Error in 1x"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input Vulnerability in HDR"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use After Free Vulnerability in GNSS"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input Vulnerability in UIM"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input Vulnerability in GERAN"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use of Out-of-range Pointer Offset Vulnerability in WCDMA"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use After Free Vulnerability in WCDMA"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Overflow Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Integer Overflow Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Input Validation in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Cryptographic Issues"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Integer Overflow to Buffer Overflow Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Time-of-check Time-of-use Race Condition in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Overflow Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Time-of-Check Time-of-Use Race Condition Vulnerability in Embedded File System"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use of Uninitialized Variable Vulnerability in Boot"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Null Pointer Dereference Vulnerability in Core Kernel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Integer Overflow to Buffer Overflow Vulnerability in Secure File System"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Authorization Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use After Free Vulnerability in Core Kernel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Information Exposure Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Validation of Array Index Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Untrusted Pointer Dereference Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Authorization Vulnerability in Core Kernel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Information Exposure Through Timing Discrepancy Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Capture-Replay Vulnerability in Secure File System"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Data Processing Error in Boot"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Input Validation Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Integer Overflow Vulnerability in Boot"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Input Validation Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Time-of-check Time-of-use (TOCTOU) Race Condition in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Untrusted Pointer Dereference Vulnerability in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9968",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in UIM"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9969",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use of a Broken or Risky Cryptographic Algorithm in GNSS"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9971",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Always-Incorrect Control Flow Implementation in TD-SCDMA"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9972",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "NULL Pointer Dereference in MMCP"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9973",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Input Validation in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9974",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Input Validation in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9975",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Authentication in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9976",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in 1x"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9977",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9978",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9979",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use of Uninitialized Variable in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9980",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Information Exposure in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2014-9981",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Validation of Array Index in Boot"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-0574",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Access Control in UIM"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-0575",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Configuration Vulnerability in SSL"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-0576",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in WCDMA"
}
]
}

View File

@ -11,18 +11,21 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Cloud Foundry",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "cf-release versions prior to v208"
},
{
"version_value" : "Elastic Runtime versions prior to 1.4.2"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Pivotal"
}
]
}
@ -44,7 +47,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Path Traversal"
}
]
}

View File

@ -11,18 +11,33 @@
"product" : {
"product_data" : [
{
"product_name" : "IBM Security Directory Server 6.1, 6.2, 6.3, 6.3.1, 6.0, 6.4",
"product_name" : "Directory Server",
"version" : {
"version_data" : [
{
"version_value" : "IBM Security Directory Server 6.1, 6.2, 6.3, 6.3.1, 6.0, 6.4"
"version_value" : "6.1"
},
{
"version_value" : "6.2"
},
{
"version_value" : "6.3"
},
{
"version_value" : "6.3.1"
},
{
"version_value" : "6.0"
},
{
"version_value" : "6.4"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "IBM Corporation"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Trane Comfortink II SCC firmware version 2.0.2",
"product_name" : "ComfortLink II SCC firmware",
"version" : {
"version_data" : [
{
"version_value" : "Trane Comfortink II SCC firmware version 2.0.2"
"version_value" : "2.0.2"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Trane"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Trane ComfortLink II SCC firmware version 2.0.2",
"product_name" : "ComfortLink II SCC firmware",
"version" : {
"version_data" : [
{
"version_value" : "Trane ComfortLink II SCC firmware version 2.0.2"
"version_value" : "2.0.2"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Trane"
}
]
}

View File

@ -11,18 +11,24 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Cloud Foundry",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "Runtime cf-release versions v208 or earlier"
},
{
"version_value" : "UAA Standalone versions 2.2.5 or earlier"
},
{
"version_value" : "Runtime 1.4.5 or earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Pivotal"
}
]
}
@ -44,7 +50,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Password reset weakness"
}
]
}

View File

@ -11,18 +11,24 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Cloud Foundry",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "Runtime cf-release versions v209 or earlier"
},
{
"version_value" : "UAA Standalone versions 2.2.6 or earlier"
},
{
"version_value" : "Runtime 1.4.5 or earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Pivotal"
}
]
}
@ -44,7 +50,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Open redirect"
}
]
}

View File

@ -11,18 +11,24 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "Cloud Foundry",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "Runtime cf-release versions v209 or earlier"
},
{
"version_value" : "UAA Standalone versions 2.2.6 or earlier"
},
{
"version_value" : "Runtime 1.4.5 or earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Pivotal"
}
]
}
@ -44,7 +50,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "CSRF"
}
]
}

View File

@ -11,18 +11,66 @@
"product" : {
"product_data" : [
{
"product_name" : "IBM Security Access Manager 9.0, 9.0.0.1, 9.0.1, 7.0.0, 8.0.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 9.0.0, 9.0.1.0, 9.0.2.0",
"product_name" : "Access Manager",
"version" : {
"version_data" : [
{
"version_value" : "IBM Security Access Manager 9.0, 9.0.0.1, 9.0.1, 7.0.0, 8.0.0, 8.0.0.1, 8.0.0.2, 8.0.0.3, 8.0.0.4, 8.0.0.5, 8.0.1, 8.0.1.2, 8.0.1.3, 8.0.1.4, 9.0.0, 9.0.1.0, 9.0.2.0"
"version_value" : "9.0"
},
{
"version_value" : "9.0.0.1"
},
{
"version_value" : "9.0.1"
},
{
"version_value" : "7.0.0"
},
{
"version_value" : "8.0.0"
},
{
"version_value" : "8.0.0.1"
},
{
"version_value" : "8.0.0.2"
},
{
"version_value" : "8.0.0.3"
},
{
"version_value" : "8.0.0.4"
},
{
"version_value" : "8.0.0.5"
},
{
"version_value" : "8.0.1"
},
{
"version_value" : "8.0.1.2"
},
{
"version_value" : "8.0.1.3"
},
{
"version_value" : "8.0.1.4"
},
{
"version_value" : "9.0.0"
},
{
"version_value" : "9.0.1.0"
},
{
"version_value" : "9.0.2.0"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "IBM Corporation"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@vmware.com",
"DATE_PUBLIC" : "2017-07-27T00:00:00",
"ID" : "CVE-2015-5191",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "VMware Tools",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "VMware Tools prior to 10.0.9"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "VMware"
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Local privilege escalation vulnerability"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "jUDDI",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "3.1.2, 3.1.3, 3.1.4, and 3.1.5 utilize the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Apache Software Foundation"
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Open Redirect"
}
]
}

View File

@ -11,18 +11,48 @@
"product" : {
"product_data" : [
{
"product_name" : "IBM WebSphere DataPower XC10 Appliance 1.0, 2.0, 2.1, 2.1.0.3, 2.0.0.1, 2.0.0.2, 2.0.0.3, 2.1.0.1, 2.1.0.2, 2.5, 2.5.0.1",
"product_name" : "WebSphere DataPower XC10 Appliance",
"version" : {
"version_data" : [
{
"version_value" : "IBM WebSphere DataPower XC10 Appliance 1.0, 2.0, 2.1, 2.1.0.3, 2.0.0.1, 2.0.0.2, 2.0.0.3, 2.1.0.1, 2.1.0.2, 2.5, 2.5.0.1"
"version_value" : "1.0"
},
{
"version_value" : "2.0"
},
{
"version_value" : "2.1"
},
{
"version_value" : "2.1.0.3"
},
{
"version_value" : "2.0.0.1"
},
{
"version_value" : "2.0.0.2"
},
{
"version_value" : "2.0.0.3"
},
{
"version_value" : "2.1.0.1"
},
{
"version_value" : "2.1.0.2"
},
{
"version_value" : "2.5"
},
{
"version_value" : "2.5.0.1"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "IBM Corporation"
}
]
}

View File

@ -11,18 +11,54 @@
"product" : {
"product_data" : [
{
"product_name" : "IBM InfoSphere Information Server 8.1, 8.5, 8.0, 8.5.0.1, 8.7, 9.1, 8.0.1, 10.0, 11.3, 10, 11.3.0.0, 11.3.1.0, 11.5",
"product_name" : "InfoSphere Information Server",
"version" : {
"version_data" : [
{
"version_value" : "IBM InfoSphere Information Server 8.1, 8.5, 8.0, 8.5.0.1, 8.7, 9.1, 8.0.1, 10.0, 11.3, 10, 11.3.0.0, 11.3.1.0, 11.5"
"version_value" : "8.1"
},
{
"version_value" : "8.5"
},
{
"version_value" : "8.0"
},
{
"version_value" : "8.5.0.1"
},
{
"version_value" : "8.7"
},
{
"version_value" : "9.1"
},
{
"version_value" : "8.0.1"
},
{
"version_value" : "10.0"
},
{
"version_value" : "11.3"
},
{
"version_value" : "10"
},
{
"version_value" : "11.3.0.0"
},
{
"version_value" : "11.3.1.0"
},
{
"version_value" : "11.5"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "IBM Corporation"
}
]
}

View File

@ -11,18 +11,48 @@
"product" : {
"product_data" : [
{
"product_name" : "IBM Cloud Orchestrator 2.2, 2.2.0.1, 2.3, 2.4, 2.3.0.1, 2.4.0.1, 2.4.0.2, 2.5, 2.5.0.1, 2.4.0.3, 2.5.0.2",
"product_name" : "Cloud Orchestrator",
"version" : {
"version_data" : [
{
"version_value" : "IBM Cloud Orchestrator 2.2, 2.2.0.1, 2.3, 2.4, 2.3.0.1, 2.4.0.1, 2.4.0.2, 2.5, 2.5.0.1, 2.4.0.3, 2.5.0.2"
"version_value" : "2.2"
},
{
"version_value" : "2.2.0.1"
},
{
"version_value" : "2.3"
},
{
"version_value" : "2.4"
},
{
"version_value" : "2.3.0.1"
},
{
"version_value" : "2.4.0.1"
},
{
"version_value" : "2.4.0.2"
},
{
"version_value" : "2.5"
},
{
"version_value" : "2.5.0.1"
},
{
"version_value" : "2.4.0.3"
},
{
"version_value" : "2.5.0.2"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "IBM Corporation"
}
]
}

View File

@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "DoS"
"value" : "DOS"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-8592",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Untrusted Pointer Dereference in Diag"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-8593",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Copy without Checking Size of Input in 1x"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-8594",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Over-read in RFA"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-8595",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Over-read in TrustZone"
}
]
}

View File

@ -1,6 +1,7 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "product-security@qualcomm.com",
"DATE_PUBLIC" : "2017-07-01T00:00:00",
"ID" : "CVE-2015-8596",
"STATE" : "PUBLIC"
},
@ -11,18 +12,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +45,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Improper Input Validation in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Advanced Threat Defense (MATD) 3.4.2.32 and earlier",
"product_name" : "Advanced Threat Defense (MATD)",
"version" : {
"version_data" : [
{
"version_value" : "Advanced Threat Defense (MATD) 3.4.2.32 and earlier"
"version_value" : "3.4.2.32 and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Agent (MA) 4.8.0 patch 2 and earlier",
"product_name" : "Agent (MA)",
"version" : {
"version_data" : [
{
"version_value" : "Agent (MA) 4.8.0 patch 2 and earlier"
"version_value" : "4.8.0 patch 2 and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "ePO Deep Command (eDC) 2.2 and 2.1",
"product_name" : "ePO Deep Command (eDC)",
"version" : {
"version_data" : [
{
"version_value" : "ePO Deep Command (eDC) 2.2 and 2.1"
"version_value" : "2.2 and 2.1"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "McAfee Vulnerability Manager (MVM) 7.5.8 and earlier",
"product_name" : "McAfee Vulnerability Manager (MVM)",
"version" : {
"version_data" : [
{
"version_value" : "McAfee Vulnerability Manager (MVM) 7.5.8 and earlier"
"version_value" : "7.5.8 and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "Advanced Threat Defense (ATD) 3.4.6 and earlier",
"product_name" : "Advanced Threat Defense (ATD)",
"version" : {
"version_data" : [
{
"version_value" : "Advanced Threat Defense (ATD) 3.4.6 and earlier"
"version_value" : "3.4.6 and earlier"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "McAfee Security Scan+ (MSS+) before 3.11.266.3",
"product_name" : "McAfee Security Scan+ (MSS+)",
"version" : {
"version_data" : [
{
"version_value" : "McAfee Security Scan+ (MSS+) before 3.11.266.3"
"version_value" : "before 3.11.266.3"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "WebAdvisor before 4.0.2, 4.0.1 and 3.7.2",
"product_name" : "WebAdvisor",
"version" : {
"version_data" : [
{
"version_value" : "WebAdvisor before 4.0.2, 4.0.1 and 3.7.2"
"version_value" : "before 4.0.2, 4.0.1 and 3.7.2"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "CloudAV (Beta) before 0.5.0.151.3",
"product_name" : "CloudAV (Beta)",
"version" : {
"version_data" : [
{
"version_value" : "CloudAV (Beta) before 0.5.0.151.3"
"version_value" : "before 0.5.0.151.3"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Intel"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Integer Overflow Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Time-of-check Time-of-use Race Condition in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Time-of-check Time-of-use Race Condition in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Integer Overflow Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Buffer Overflow Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Untrusted Pointer Dereference in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Information Exposure Vulnerability in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Use of Out-of-range Pointer Offset in TrustZone"
}
]
}

View File

@ -11,18 +11,18 @@
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"product_name" : "All Qualcomm Products",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
"version_value" : "All Android releases from CAF using the Linux kernel"
}
]
}
}
]
},
"vendor_name" : "n/a"
"vendor_name" : "Qualcomm, Inc."
}
]
}
@ -44,7 +44,7 @@
"description" : [
{
"lang" : "eng",
"value" : "n/a"
"value" : "Cryptographic Issues in TrustZone"
}
]
}

Some files were not shown because too many files have changed in this diff Show More