From bc83f1cbbf64c6f52723ec456094499b4d5b33b2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 18 Mar 2019 01:19:58 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2007/2xxx/CVE-2007-2168.json | 160 +- 2007/2xxx/CVE-2007-2252.json | 160 +- 2007/3xxx/CVE-2007-3095.json | 180 +- 2007/3xxx/CVE-2007-3155.json | 170 +- 2007/3xxx/CVE-2007-3366.json | 150 +- 2007/3xxx/CVE-2007-3958.json | 160 +- 2007/4xxx/CVE-2007-4083.json | 140 +- 2007/4xxx/CVE-2007-4237.json | 170 +- 2007/4xxx/CVE-2007-4836.json | 180 +- 2007/6xxx/CVE-2007-6551.json | 180 +- 2007/6xxx/CVE-2007-6602.json | 180 +- 2007/6xxx/CVE-2007-6717.json | 170 +- 2007/6xxx/CVE-2007-6755.json | 190 +- 2010/1xxx/CVE-2010-1108.json | 160 +- 2010/1xxx/CVE-2010-1229.json | 150 +- 2010/1xxx/CVE-2010-1445.json | 130 +- 2010/5xxx/CVE-2010-5116.json | 34 +- 2014/0xxx/CVE-2014-0224.json | 3140 ++++++++++++++-------------- 2014/0xxx/CVE-2014-0450.json | 120 +- 2014/1xxx/CVE-2014-1408.json | 130 +- 2014/1xxx/CVE-2014-1624.json | 160 +- 2014/1xxx/CVE-2014-1727.json | 170 +- 2014/5xxx/CVE-2014-5137.json | 120 +- 2014/5xxx/CVE-2014-5500.json | 34 +- 2014/5xxx/CVE-2014-5581.json | 140 +- 2014/5xxx/CVE-2014-5758.json | 140 +- 2015/2xxx/CVE-2015-2038.json | 34 +- 2015/2xxx/CVE-2015-2381.json | 130 +- 2015/2xxx/CVE-2015-2818.json | 130 +- 2015/2xxx/CVE-2015-2819.json | 160 +- 2016/4xxx/CVE-2016-4015.json | 130 +- 2016/4xxx/CVE-2016-4091.json | 140 +- 2016/8xxx/CVE-2016-8121.json | 34 +- 2016/8xxx/CVE-2016-8175.json | 34 +- 2016/8xxx/CVE-2016-8562.json | 140 +- 2016/9xxx/CVE-2016-9681.json | 140 +- 2016/9xxx/CVE-2016-9957.json | 220 +- 2016/9xxx/CVE-2016-9990.json | 206 +- 2019/1003xxx/CVE-2019-1003023.json | 124 +- 2019/2xxx/CVE-2019-2117.json | 34 +- 2019/2xxx/CVE-2019-2490.json | 148 +- 2019/2xxx/CVE-2019-2821.json | 34 +- 2019/2xxx/CVE-2019-2884.json | 34 +- 2019/3xxx/CVE-2019-3385.json | 34 +- 2019/3xxx/CVE-2019-3839.json | 34 +- 2019/6xxx/CVE-2019-6122.json | 34 +- 2019/6xxx/CVE-2019-6204.json | 34 +- 2019/6xxx/CVE-2019-6610.json | 34 +- 2019/6xxx/CVE-2019-6625.json | 34 +- 2019/7xxx/CVE-2019-7140.json | 34 +- 2019/7xxx/CVE-2019-7150.json | 140 +- 2019/7xxx/CVE-2019-7581.json | 120 +- 52 files changed, 4594 insertions(+), 4594 deletions(-) diff --git a/2007/2xxx/CVE-2007-2168.json b/2007/2xxx/CVE-2007-2168.json index 1546b68a86f..529a4245069 100644 --- a/2007/2xxx/CVE-2007-2168.json +++ b/2007/2xxx/CVE-2007-2168.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-2168", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Static code injection vulnerability in process.php in AimStats 3.2 and earlier allows remote attackers to inject PHP code into config.php via the databasehost parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-2168", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.x-pose.org/aimstats.php", - "refsource" : "CONFIRM", - "url" : "http://www.x-pose.org/aimstats.php" - }, - { - "name" : "23573", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/23573" - }, - { - "name" : "ADV-2007-1447", - "refsource" : "VUPEN", - "url" : "http://www.vupen.com/english/advisories/2007/1447" - }, - { - "name" : "24955", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/24955" - }, - { - "name" : "aimstats-process-command-execution(33742)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33742" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Static code injection vulnerability in process.php in AimStats 3.2 and earlier allows remote attackers to inject PHP code into config.php via the databasehost parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.x-pose.org/aimstats.php", + "refsource": "CONFIRM", + "url": "http://www.x-pose.org/aimstats.php" + }, + { + "name": "aimstats-process-command-execution(33742)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33742" + }, + { + "name": "23573", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/23573" + }, + { + "name": "ADV-2007-1447", + "refsource": "VUPEN", + "url": "http://www.vupen.com/english/advisories/2007/1447" + }, + { + "name": "24955", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/24955" + } + ] + } +} \ No newline at end of file diff --git a/2007/2xxx/CVE-2007-2252.json b/2007/2xxx/CVE-2007-2252.json index cabc2a0f951..e1118e174c6 100644 --- a/2007/2xxx/CVE-2007-2252.json +++ b/2007/2xxx/CVE-2007-2252.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-2252", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Directory traversal vulnerability in iconspopup.php in Exponent CMS 0.96.6 Alpha and earlier allows remote attackers to obtain sensitive information via a .. (dot dot) in the icodir parameter." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-2252", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.bugtraq.ir/articles/advisory/exponent_multiple_vulnerabilities/10", - "refsource" : "MISC", - "url" : "http://www.bugtraq.ir/articles/advisory/exponent_multiple_vulnerabilities/10" - }, - { - "name" : "23574", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/23574" - }, - { - "name" : "35051", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/35051" - }, - { - "name" : "24934", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/24934" - }, - { - "name" : "exponentcms-iconspopup-directory-traversal(33936)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/33936" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Directory traversal vulnerability in iconspopup.php in Exponent CMS 0.96.6 Alpha and earlier allows remote attackers to obtain sensitive information via a .. (dot dot) in the icodir parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "exponentcms-iconspopup-directory-traversal(33936)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33936" + }, + { + "name": "23574", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/23574" + }, + { + "name": "http://www.bugtraq.ir/articles/advisory/exponent_multiple_vulnerabilities/10", + "refsource": "MISC", + "url": "http://www.bugtraq.ir/articles/advisory/exponent_multiple_vulnerabilities/10" + }, + { + "name": "24934", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/24934" + }, + { + "name": "35051", + "refsource": "OSVDB", + "url": "http://osvdb.org/35051" + } + ] + } +} \ No newline at end of file diff --git a/2007/3xxx/CVE-2007-3095.json b/2007/3xxx/CVE-2007-3095.json index 7c0fcee564f..1085a3b3140 100644 --- a/2007/3xxx/CVE-2007-3095.json +++ b/2007/3xxx/CVE-2007-3095.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-3095", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Unspecified vulnerability in Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, allows attackers to \"disable the authentication system\" and bypass authentication via unknown vectors." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-3095", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.symantec.com/avcenter/security/Content/2007.06.05.html", - "refsource" : "CONFIRM", - "url" : "http://www.symantec.com/avcenter/security/Content/2007.06.05.html" - }, - { - "name" : "24325", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/24325" - }, - { - "name" : "ADV-2007-2074", - "refsource" : "VUPEN", - "url" : "http://www.vupen.com/english/advisories/2007/2074" - }, - { - "name" : "36107", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/36107" - }, - { - "name" : "1018196", - "refsource" : "SECTRACK", - "url" : "http://www.securitytracker.com/id?1018196" - }, - { - "name" : "25543", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/25543" - }, - { - "name" : "symantec-unspecified-authentication-bypass(34895)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34895" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Unspecified vulnerability in Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, allows attackers to \"disable the authentication system\" and bypass authentication via unknown vectors." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "36107", + "refsource": "OSVDB", + "url": "http://osvdb.org/36107" + }, + { + "name": "24325", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/24325" + }, + { + "name": "symantec-unspecified-authentication-bypass(34895)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34895" + }, + { + "name": "http://www.symantec.com/avcenter/security/Content/2007.06.05.html", + "refsource": "CONFIRM", + "url": "http://www.symantec.com/avcenter/security/Content/2007.06.05.html" + }, + { + "name": "1018196", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id?1018196" + }, + { + "name": "ADV-2007-2074", + "refsource": "VUPEN", + "url": "http://www.vupen.com/english/advisories/2007/2074" + }, + { + "name": "25543", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/25543" + } + ] + } +} \ No newline at end of file diff --git a/2007/3xxx/CVE-2007-3155.json b/2007/3xxx/CVE-2007-3155.json index 60ea59bba85..9c60030cdc5 100644 --- a/2007/3xxx/CVE-2007-3155.json +++ b/2007/3xxx/CVE-2007-3155.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-3155", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Unspecified vulnerability in eGroupWare before 1.2.107-2 has unknown impact and attack vectors related to ADOdb. NOTE: due to lack of details from the vendor, it is uncertain whether this issue is already covered by another CVE identifier." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-3155", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://sourceforge.net/project/shownotes.php?release_id=513311&group_id=78745", - "refsource" : "CONFIRM", - "url" : "http://sourceforge.net/project/shownotes.php?release_id=513311&group_id=78745" - }, - { - "name" : "http://sourceforge.net/project/shownotes.php?release_id=513749&group_id=78745", - "refsource" : "CONFIRM", - "url" : "http://sourceforge.net/project/shownotes.php?release_id=513749&group_id=78745" - }, - { - "name" : "24378", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/24378" - }, - { - "name" : "37188", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/37188" - }, - { - "name" : "25454", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/25454" - }, - { - "name" : "egroupware-adodb-unspecified(34914)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/34914" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Unspecified vulnerability in eGroupWare before 1.2.107-2 has unknown impact and attack vectors related to ADOdb. NOTE: due to lack of details from the vendor, it is uncertain whether this issue is already covered by another CVE identifier." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "37188", + "refsource": "OSVDB", + "url": "http://osvdb.org/37188" + }, + { + "name": "egroupware-adodb-unspecified(34914)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34914" + }, + { + "name": "25454", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/25454" + }, + { + "name": "24378", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/24378" + }, + { + "name": "http://sourceforge.net/project/shownotes.php?release_id=513749&group_id=78745", + "refsource": "CONFIRM", + "url": "http://sourceforge.net/project/shownotes.php?release_id=513749&group_id=78745" + }, + { + "name": "http://sourceforge.net/project/shownotes.php?release_id=513311&group_id=78745", + "refsource": "CONFIRM", + "url": "http://sourceforge.net/project/shownotes.php?release_id=513311&group_id=78745" + } + ] + } +} \ No newline at end of file diff --git a/2007/3xxx/CVE-2007-3366.json b/2007/3xxx/CVE-2007-3366.json index 4bd852718a3..87373b0d71e 100644 --- a/2007/3xxx/CVE-2007-3366.json +++ b/2007/3xxx/CVE-2007-3366.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-3366", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Cross-site scripting (XSS) vulnerability in Simple CGI Wrapper (scgiwrap) in cPanel before 10.9.1, and 11.x before 11.4.19-R14378, allows remote attackers to inject arbitrary web script or HTML via the URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-3366", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "24586", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/24586" - }, - { - "name" : "35860", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/35860" - }, - { - "name" : "25722", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/25722" - }, - { - "name" : "cpanel-scgiwrap-xss(35008)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35008" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS) vulnerability in Simple CGI Wrapper (scgiwrap) in cPanel before 10.9.1, and 11.x before 11.4.19-R14378, allows remote attackers to inject arbitrary web script or HTML via the URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "cpanel-scgiwrap-xss(35008)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35008" + }, + { + "name": "24586", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/24586" + }, + { + "name": "25722", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/25722" + }, + { + "name": "35860", + "refsource": "OSVDB", + "url": "http://osvdb.org/35860" + } + ] + } +} \ No newline at end of file diff --git a/2007/3xxx/CVE-2007-3958.json b/2007/3xxx/CVE-2007-3958.json index 674d91f72f4..7e5b218af61 100644 --- a/2007/3xxx/CVE-2007-3958.json +++ b/2007/3xxx/CVE-2007-3958.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-3958", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Microsoft Windows Explorer (explorer.exe) allows user-assisted remote attackers to cause a denial of service via a certain GIF file, as demonstrated by Art.gif." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-3958", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "4215", - "refsource" : "EXPLOIT-DB", - "url" : "https://www.exploit-db.com/exploits/4215" - }, - { - "name" : "http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html", - "refsource" : "MISC", - "url" : "http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html" - }, - { - "name" : "25013", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/25013" - }, - { - "name" : "43773", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/43773" - }, - { - "name" : "windows-explorer-gif-dos(35538)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35538" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Microsoft Windows Explorer (explorer.exe) allows user-assisted remote attackers to cause a denial of service via a certain GIF file, as demonstrated by Art.gif." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "windows-explorer-gif-dos(35538)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35538" + }, + { + "name": "http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html", + "refsource": "MISC", + "url": "http://lostmon.blogspot.com/2007/08/windows-extended-file-attributes-buffer.html" + }, + { + "name": "43773", + "refsource": "OSVDB", + "url": "http://osvdb.org/43773" + }, + { + "name": "4215", + "refsource": "EXPLOIT-DB", + "url": "https://www.exploit-db.com/exploits/4215" + }, + { + "name": "25013", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/25013" + } + ] + } +} \ No newline at end of file diff --git a/2007/4xxx/CVE-2007-4083.json b/2007/4xxx/CVE-2007-4083.json index 800860c29c4..741eb0ed815 100644 --- a/2007/4xxx/CVE-2007-4083.json +++ b/2007/4xxx/CVE-2007-4083.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-4083", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Multiple cross-site scripting (XSS) vulnerabilities in AlstraSoft AskMe Pro allow remote attackers to inject arbitrary web script or HTML via (1) the cat_id parameter to search.php or the (2) typ parameter to register.php." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-4083", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html", - "refsource" : "MISC", - "url" : "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html" - }, - { - "name" : "37092", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/37092" - }, - { - "name" : "37093", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/37093" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Multiple cross-site scripting (XSS) vulnerabilities in AlstraSoft AskMe Pro allow remote attackers to inject arbitrary web script or HTML via (1) the cat_id parameter to search.php or the (2) typ parameter to register.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "37092", + "refsource": "OSVDB", + "url": "http://osvdb.org/37092" + }, + { + "name": "37093", + "refsource": "OSVDB", + "url": "http://osvdb.org/37093" + }, + { + "name": "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html", + "refsource": "MISC", + "url": "http://lostmon.blogspot.com/2007/07/alstrasoft-multiple-products-multiple.html" + } + ] + } +} \ No newline at end of file diff --git a/2007/4xxx/CVE-2007-4237.json b/2007/4xxx/CVE-2007-4237.json index b789b60ab06..4d4eb18dd70 100644 --- a/2007/4xxx/CVE-2007-4237.json +++ b/2007/4xxx/CVE-2007-4237.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-4237", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Buffer overflow in the atm subset in arp in devices.common.IBM.atm.rte in AIX 5.2 and 5.3 allows local users to gain root privileges." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-4237", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "IZ00510", - "refsource" : "AIXAPAR", - "url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00510" - }, - { - "name" : "IZ00521", - "refsource" : "AIXAPAR", - "url" : "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00521" - }, - { - "name" : "ADV-2007-2678", - "refsource" : "VUPEN", - "url" : "http://www.vupen.com/english/advisories/2007/2678" - }, - { - "name" : "36783", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/36783" - }, - { - "name" : "1018463", - "refsource" : "SECTRACK", - "url" : "http://securitytracker.com/id?1018463" - }, - { - "name" : "26219", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/26219" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in the atm subset in arp in devices.common.IBM.atm.rte in AIX 5.2 and 5.3 allows local users to gain root privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "26219", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/26219" + }, + { + "name": "IZ00521", + "refsource": "AIXAPAR", + "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00521" + }, + { + "name": "36783", + "refsource": "OSVDB", + "url": "http://osvdb.org/36783" + }, + { + "name": "IZ00510", + "refsource": "AIXAPAR", + "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IZ00510" + }, + { + "name": "ADV-2007-2678", + "refsource": "VUPEN", + "url": "http://www.vupen.com/english/advisories/2007/2678" + }, + { + "name": "1018463", + "refsource": "SECTRACK", + "url": "http://securitytracker.com/id?1018463" + } + ] + } +} \ No newline at end of file diff --git a/2007/4xxx/CVE-2007-4836.json b/2007/4xxx/CVE-2007-4836.json index 42c164b5723..93ee85c4a7f 100644 --- a/2007/4xxx/CVE-2007-4836.json +++ b/2007/4xxx/CVE-2007-4836.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-4836", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Cross-site scripting (XSS) vulnerability in index.php in phpMyQuote 0.20 allows remote attackers to inject arbitrary web script or HTML via the id parameter in an edit action." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-4836", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20070909 phpMyQuote 0.20 Version Multiple Sql And Xss Vulnerabilities", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/478967/100/0/threaded" - }, - { - "name" : "http://yollubunlar.org/phpmyquote-020-version-multiple-sql-and-xss-vulnerabilities-3501.html", - "refsource" : "MISC", - "url" : "http://yollubunlar.org/phpmyquote-020-version-multiple-sql-and-xss-vulnerabilities-3501.html" - }, - { - "name" : "25615", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/25615" - }, - { - "name" : "36948", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/36948" - }, - { - "name" : "26762", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/26762" - }, - { - "name" : "3120", - "refsource" : "SREASON", - "url" : "http://securityreason.com/securityalert/3120" - }, - { - "name" : "phpmyquote-index-xss(36513)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36513" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS) vulnerability in index.php in phpMyQuote 0.20 allows remote attackers to inject arbitrary web script or HTML via the id parameter in an edit action." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://yollubunlar.org/phpmyquote-020-version-multiple-sql-and-xss-vulnerabilities-3501.html", + "refsource": "MISC", + "url": "http://yollubunlar.org/phpmyquote-020-version-multiple-sql-and-xss-vulnerabilities-3501.html" + }, + { + "name": "36948", + "refsource": "OSVDB", + "url": "http://osvdb.org/36948" + }, + { + "name": "26762", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/26762" + }, + { + "name": "25615", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/25615" + }, + { + "name": "3120", + "refsource": "SREASON", + "url": "http://securityreason.com/securityalert/3120" + }, + { + "name": "phpmyquote-index-xss(36513)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36513" + }, + { + "name": "20070909 phpMyQuote 0.20 Version Multiple Sql And Xss Vulnerabilities", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/478967/100/0/threaded" + } + ] + } +} \ No newline at end of file diff --git a/2007/6xxx/CVE-2007-6551.json b/2007/6xxx/CVE-2007-6551.json index a72560489b5..ca90b550987 100644 --- a/2007/6xxx/CVE-2007-6551.json +++ b/2007/6xxx/CVE-2007-6551.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-6551", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "SQL injection vulnerability in showMsg.php in MailMachine Pro 2.2.4, and other versions before 2.2.6, allows remote attackers to execute arbitrary SQL commands via the id parameter." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-6551", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "4788", - "refsource" : "EXPLOIT-DB", - "url" : "https://www.exploit-db.com/exploits/4788" - }, - { - "name" : "http://www.inj3ct-it.org/exploit/MailMachine%20Pro%202.2.4.txt", - "refsource" : "MISC", - "url" : "http://www.inj3ct-it.org/exploit/MailMachine%20Pro%202.2.4.txt" - }, - { - "name" : "20080108 Vendor ACK for CVE-2007-6551 (MailMachine Pro SQL injection)", - "refsource" : "VIM", - "url" : "http://www.attrition.org/pipermail/vim/2008-January/001873.html" - }, - { - "name" : "27030", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/27030" - }, - { - "name" : "39638", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/39638" - }, - { - "name" : "28232", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/28232" - }, - { - "name" : "mailmachinepro-showMsg-sql-injection(39211)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39211" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SQL injection vulnerability in showMsg.php in MailMachine Pro 2.2.4, and other versions before 2.2.6, allows remote attackers to execute arbitrary SQL commands via the id parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "39638", + "refsource": "OSVDB", + "url": "http://osvdb.org/39638" + }, + { + "name": "4788", + "refsource": "EXPLOIT-DB", + "url": "https://www.exploit-db.com/exploits/4788" + }, + { + "name": "mailmachinepro-showMsg-sql-injection(39211)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39211" + }, + { + "name": "27030", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/27030" + }, + { + "name": "http://www.inj3ct-it.org/exploit/MailMachine%20Pro%202.2.4.txt", + "refsource": "MISC", + "url": "http://www.inj3ct-it.org/exploit/MailMachine%20Pro%202.2.4.txt" + }, + { + "name": "28232", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/28232" + }, + { + "name": "20080108 Vendor ACK for CVE-2007-6551 (MailMachine Pro SQL injection)", + "refsource": "VIM", + "url": "http://www.attrition.org/pipermail/vim/2008-January/001873.html" + } + ] + } +} \ No newline at end of file diff --git a/2007/6xxx/CVE-2007-6602.json b/2007/6xxx/CVE-2007-6602.json index 7fbcde4748e..4332fcfe2a6 100644 --- a/2007/6xxx/CVE-2007-6602.json +++ b/2007/6xxx/CVE-2007-6602.json @@ -1,92 +1,92 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-6602", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "SQL injection vulnerability in app/models/identity.php in NoseRub 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the username field to the login script." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-6602", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "4805", - "refsource" : "EXPLOIT-DB", - "url" : "https://www.exploit-db.com/exploits/4805" - }, - { - "name" : "http://seclog.de/pub/seclog-2007-001.txt", - "refsource" : "MISC", - "url" : "http://seclog.de/pub/seclog-2007-001.txt" - }, - { - "name" : "http://noserub.googlecode.com/svn/trunk/app/models/identity.php", - "refsource" : "CONFIRM", - "url" : "http://noserub.googlecode.com/svn/trunk/app/models/identity.php" - }, - { - "name" : "27065", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/27065" - }, - { - "name" : "39832", - "refsource" : "OSVDB", - "url" : "http://osvdb.org/39832" - }, - { - "name" : "28259", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/28259" - }, - { - "name" : "noserub-identity-sql-injection(39318)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39318" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SQL injection vulnerability in app/models/identity.php in NoseRub 0.5.2 and earlier allows remote attackers to execute arbitrary SQL commands via the username field to the login script." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://seclog.de/pub/seclog-2007-001.txt", + "refsource": "MISC", + "url": "http://seclog.de/pub/seclog-2007-001.txt" + }, + { + "name": "39832", + "refsource": "OSVDB", + "url": "http://osvdb.org/39832" + }, + { + "name": "28259", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/28259" + }, + { + "name": "27065", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/27065" + }, + { + "name": "4805", + "refsource": "EXPLOIT-DB", + "url": "https://www.exploit-db.com/exploits/4805" + }, + { + "name": "noserub-identity-sql-injection(39318)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39318" + }, + { + "name": "http://noserub.googlecode.com/svn/trunk/app/models/identity.php", + "refsource": "CONFIRM", + "url": "http://noserub.googlecode.com/svn/trunk/app/models/identity.php" + } + ] + } +} \ No newline at end of file diff --git a/2007/6xxx/CVE-2007-6717.json b/2007/6xxx/CVE-2007-6717.json index 5a71ba46ce9..baf52db7d9d 100644 --- a/2007/6xxx/CVE-2007-6717.json +++ b/2007/6xxx/CVE-2007-6717.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-6717", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Buffer overflow in tftp in bos.net.tcp.client in IBM AIX 5.2.0 and 5.3.0 allows local users to gain privileges via unspecified vectors." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2007-6717", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?path=/200710/SECURITY/20071030/datafile110126&mode=7&heading=AIX53", - "refsource" : "CONFIRM", - "url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?path=/200710/SECURITY/20071030/datafile110126&mode=7&heading=AIX53" - }, - { - "name" : "IZ03054", - "refsource" : "AIXAPAR", - "url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ03054" - }, - { - "name" : "IZ03060", - "refsource" : "AIXAPAR", - "url" : "http://www.ibm.com/support/docview.wss?uid=isg1IZ03060" - }, - { - "name" : "oval:org.mitre.oval:def:5988", - "refsource" : "OVAL", - "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5988" - }, - { - "name" : "27437", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/27437" - }, - { - "name" : "ibm-aix-tftp-bo(45651)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/45651" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Buffer overflow in tftp in bos.net.tcp.client in IBM AIX 5.2.0 and 5.3.0 allows local users to gain privileges via unspecified vectors." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "27437", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/27437" + }, + { + "name": "ibm-aix-tftp-bo(45651)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45651" + }, + { + "name": "oval:org.mitre.oval:def:5988", + "refsource": "OVAL", + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5988" + }, + { + "name": "IZ03054", + "refsource": "AIXAPAR", + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ03054" + }, + { + "name": "IZ03060", + "refsource": "AIXAPAR", + "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ03060" + }, + { + "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?path=/200710/SECURITY/20071030/datafile110126&mode=7&heading=AIX53", + "refsource": "CONFIRM", + "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?path=/200710/SECURITY/20071030/datafile110126&mode=7&heading=AIX53" + } + ] + } +} \ No newline at end of file diff --git a/2007/6xxx/CVE-2007-6755.json b/2007/6xxx/CVE-2007-6755.json index d7e620d1a3a..d649562285e 100644 --- a/2007/6xxx/CVE-2007-6755.json +++ b/2007/6xxx/CVE-2007-6755.json @@ -1,97 +1,97 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2007-6755", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain \"skeleton key\" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "secalert_us@oracle.com", + "ID": "CVE-2007-6755", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/", - "refsource" : "MISC", - "url" : "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/" - }, - { - "name" : "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html", - "refsource" : "MISC", - "url" : "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html" - }, - { - "name" : "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html", - "refsource" : "MISC", - "url" : "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html" - }, - { - "name" : "http://rump2007.cr.yp.to/15-shumow.pdf", - "refsource" : "MISC", - "url" : "http://rump2007.cr.yp.to/15-shumow.pdf" - }, - { - "name" : "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/", - "refsource" : "MISC", - "url" : "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/" - }, - { - "name" : "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect", - "refsource" : "MISC", - "url" : "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect" - }, - { - "name" : "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html", - "refsource" : "MISC", - "url" : "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html" - }, - { - "name" : "63657", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/63657" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain \"skeleton key\" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html", + "refsource": "MISC", + "url": "http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html" + }, + { + "name": "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/", + "refsource": "MISC", + "url": "http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/" + }, + { + "name": "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html", + "refsource": "MISC", + "url": "https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html" + }, + { + "name": "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html", + "refsource": "MISC", + "url": "http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html" + }, + { + "name": "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect", + "refsource": "MISC", + "url": "http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect" + }, + { + "name": "63657", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/63657" + }, + { + "name": "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/", + "refsource": "MISC", + "url": "http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/" + }, + { + "name": "http://rump2007.cr.yp.to/15-shumow.pdf", + "refsource": "MISC", + "url": "http://rump2007.cr.yp.to/15-shumow.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2010/1xxx/CVE-2010-1108.json b/2010/1xxx/CVE-2010-1108.json index 5b1de810e76..d840fbbad4c 100644 --- a/2010/1xxx/CVE-2010-1108.json +++ b/2010/1xxx/CVE-2010-1108.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2010-1108", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Cross-site scripting (XSS) vulnerability in the Control Panel module 5.x through 5.x-1.5 and 6.x through 6.x-1.2 for Drupal allows remote authenticated users, with \"administer blocks\" privileges, to inject arbitrary web script or HTML via unspecified vectors." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2010-1108", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://drupal.org/node/686428", - "refsource" : "CONFIRM", - "url" : "http://drupal.org/node/686428" - }, - { - "name" : "http://drupal.org/node/690718", - "refsource" : "CONFIRM", - "url" : "http://drupal.org/node/690718" - }, - { - "name" : "37890", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/37890" - }, - { - "name" : "38280", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/38280" - }, - { - "name" : "controlpanel-unspecified-xss(55769)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55769" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Cross-site scripting (XSS) vulnerability in the Control Panel module 5.x through 5.x-1.5 and 6.x through 6.x-1.2 for Drupal allows remote authenticated users, with \"administer blocks\" privileges, to inject arbitrary web script or HTML via unspecified vectors." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://drupal.org/node/690718", + "refsource": "CONFIRM", + "url": "http://drupal.org/node/690718" + }, + { + "name": "37890", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/37890" + }, + { + "name": "controlpanel-unspecified-xss(55769)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55769" + }, + { + "name": "http://drupal.org/node/686428", + "refsource": "CONFIRM", + "url": "http://drupal.org/node/686428" + }, + { + "name": "38280", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/38280" + } + ] + } +} \ No newline at end of file diff --git a/2010/1xxx/CVE-2010-1229.json b/2010/1xxx/CVE-2010-1229.json index 0a444f89e8a..6c52cd38baf 100644 --- a/2010/1xxx/CVE-2010-1229.json +++ b/2010/1xxx/CVE-2010-1229.json @@ -1,77 +1,77 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2010-1229", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The sandbox infrastructure in Google Chrome before 4.1.249.1036 does not properly use pointers, which has unspecified impact and attack vectors." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2010-1229", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://code.google.com/p/chromium/issues/detail?id=28804", - "refsource" : "CONFIRM", - "url" : "http://code.google.com/p/chromium/issues/detail?id=28804" - }, - { - "name" : "http://code.google.com/p/chromium/issues/detail?id=31880", - "refsource" : "CONFIRM", - "url" : "http://code.google.com/p/chromium/issues/detail?id=31880" - }, - { - "name" : "http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html", - "refsource" : "CONFIRM", - "url" : "http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html" - }, - { - "name" : "oval:org.mitre.oval:def:14220", - "refsource" : "OVAL", - "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14220" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The sandbox infrastructure in Google Chrome before 4.1.249.1036 does not properly use pointers, which has unspecified impact and attack vectors." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "oval:org.mitre.oval:def:14220", + "refsource": "OVAL", + "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14220" + }, + { + "name": "http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html", + "refsource": "CONFIRM", + "url": "http://googlechromereleases.blogspot.com/2010/03/stable-channel-update.html" + }, + { + "name": "http://code.google.com/p/chromium/issues/detail?id=28804", + "refsource": "CONFIRM", + "url": "http://code.google.com/p/chromium/issues/detail?id=28804" + }, + { + "name": "http://code.google.com/p/chromium/issues/detail?id=31880", + "refsource": "CONFIRM", + "url": "http://code.google.com/p/chromium/issues/detail?id=31880" + } + ] + } +} \ No newline at end of file diff --git a/2010/1xxx/CVE-2010-1445.json b/2010/1xxx/CVE-2010-1445.json index 5087b4c6f4e..17b244ddfb5 100644 --- a/2010/1xxx/CVE-2010-1445.json +++ b/2010/1xxx/CVE-2010-1445.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2010-1445", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Heap-based buffer overflow in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream in an RTMP session." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "secalert@redhat.com", + "ID": "CVE-2010-1445", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "[oss-security] 20100428 Re: CVE request: VLC <1.0.6 Multiple issues", - "refsource" : "MLIST", - "url" : "http://openwall.com/lists/oss-security/2010/04/28/4" - }, - { - "name" : "http://www.videolan.org/security/sa1003.html", - "refsource" : "CONFIRM", - "url" : "http://www.videolan.org/security/sa1003.html" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Heap-based buffer overflow in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream in an RTMP session." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.videolan.org/security/sa1003.html", + "refsource": "CONFIRM", + "url": "http://www.videolan.org/security/sa1003.html" + }, + { + "name": "[oss-security] 20100428 Re: CVE request: VLC <1.0.6 Multiple issues", + "refsource": "MLIST", + "url": "http://openwall.com/lists/oss-security/2010/04/28/4" + } + ] + } +} \ No newline at end of file diff --git a/2010/5xxx/CVE-2010-5116.json b/2010/5xxx/CVE-2010-5116.json index 72e004583ad..54282d0e32e 100644 --- a/2010/5xxx/CVE-2010-5116.json +++ b/2010/5xxx/CVE-2010-5116.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2010-5116", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2010-5116", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2014/0xxx/CVE-2014-0224.json b/2014/0xxx/CVE-2014-0224.json index 04dc8436853..168a4c573f1 100644 --- a/2014/0xxx/CVE-2014-0224.json +++ b/2014/0xxx/CVE-2014-0224.json @@ -1,1572 +1,1572 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-0224", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "secalert@redhat.com", + "ID": "CVE-2014-0224", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/534161/100/0/threaded" - }, - { - "name" : "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", - "refsource" : "FULLDISC", - "url" : "http://seclists.org/fulldisclosure/2014/Dec/23" - }, - { - "name" : "20140607 Re: More OpenSSL issues", - "refsource" : "FULLDISC", - "url" : "http://seclists.org/fulldisclosure/2014/Jun/38" - }, - { - "name" : "http://ccsinjection.lepidum.co.jp", - "refsource" : "MISC", - "url" : "http://ccsinjection.lepidum.co.jp" - }, - { - "name" : "https://www.imperialviolet.org/2014/06/05/earlyccs.html", - "refsource" : "MISC", - "url" : "https://www.imperialviolet.org/2014/06/05/earlyccs.html" - }, - { - "name" : "http://www.openssl.org/news/secadv_20140605.txt", - "refsource" : "CONFIRM", - "url" : "http://www.openssl.org/news/secadv_20140605.txt" - }, - { - "name" : "https://access.redhat.com/site/blogs/766093/posts/908133", - "refsource" : "CONFIRM", - "url" : "https://access.redhat.com/site/blogs/766093/posts/908133" - }, - { - "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", - "refsource" : "CONFIRM", - "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" - }, - { - "name" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", - "refsource" : "CONFIRM", - "url" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441" - }, - { - "name" : "https://kb.bluecoat.com/index?page=content&id=SA80", - "refsource" : "CONFIRM", - "url" : "https://kb.bluecoat.com/index?page=content&id=SA80" - }, - { - "name" : "http://www.kerio.com/support/kerio-control/release-history", - "refsource" : "CONFIRM", - "url" : "http://www.kerio.com/support/kerio-control/release-history" - }, - { - "name" : "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", - "refsource" : "CONFIRM", - "url" : "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" - }, - { - "name" : "http://www.blackberry.com/btsc/KB36051", - "refsource" : "CONFIRM", - "url" : "http://www.blackberry.com/btsc/KB36051" - }, - { - "name" : "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", - "refsource" : "CONFIRM", - "url" : "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" - }, - { - "name" : "http://www.novell.com/support/kb/doc.php?id=7015264", - "refsource" : "CONFIRM", - "url" : "http://www.novell.com/support/kb/doc.php?id=7015264" - }, - { - "name" : "http://www.novell.com/support/kb/doc.php?id=7015300", - "refsource" : "CONFIRM", - "url" : "http://www.novell.com/support/kb/doc.php?id=7015300" - }, - { - "name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", - "refsource" : "CONFIRM", - "url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E" - }, - { - "name" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", - "refsource" : "CONFIRM", - "url" : "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E" - }, - { - "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", - "refsource" : "CONFIRM", - "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10075" - }, - { - "name" : "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", - "refsource" : "CONFIRM", - "url" : "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" - }, - { - "name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", - "refsource" : "CONFIRM", - "url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" - }, - { - "name" : "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", - "refsource" : "CONFIRM", - "url" : "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" - }, - { - "name" : "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", - "refsource" : "CONFIRM", - "url" : "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" - }, - { - "name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", - "refsource" : "CONFIRM", - "url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" - }, - { - "name" : "http://www.splunk.com/view/SP-CAAAM2D", - "refsource" : "CONFIRM", - "url" : "http://www.splunk.com/view/SP-CAAAM2D" - }, - { - "name" : "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", - "refsource" : "CONFIRM", - "url" : "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" - }, - { - "name" : "https://discussions.nessus.org/thread/7517", - "refsource" : "CONFIRM", - "url" : "https://discussions.nessus.org/thread/7517" - }, - { - "name" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" - }, - { - "name" : "http://www.fortiguard.com/advisory/FG-IR-14-018/", - "refsource" : "CONFIRM", - "url" : "http://www.fortiguard.com/advisory/FG-IR-14-018/" - }, - { - "name" : "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", - "refsource" : "CONFIRM", - "url" : "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" - }, - { - "name" : "https://filezilla-project.org/versions.php?type=server", - "refsource" : "CONFIRM", - "url" : "https://filezilla-project.org/versions.php?type=server" - }, - { - "name" : "http://puppetlabs.com/security/cve/cve-2014-0224", - "refsource" : "CONFIRM", - "url" : "http://puppetlabs.com/security/cve/cve-2014-0224" - }, - { - "name" : "http://linux.oracle.com/errata/ELSA-2014-1053.html", - "refsource" : "CONFIRM", - "url" : "http://linux.oracle.com/errata/ELSA-2014-1053.html" - }, - { - "name" : "http://support.apple.com/kb/HT6443", - "refsource" : "CONFIRM", - "url" : "http://support.apple.com/kb/HT6443" - }, - { - "name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" - }, - { - "name" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", - "refsource" : "CONFIRM", - "url" : "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" - }, - { - "name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" - }, - { - "name" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", - "refsource" : "CONFIRM", - "url" : "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" - }, - { - "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" - }, - { - "name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", - "refsource" : "CONFIRM", - "url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" - }, - { - "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" - }, - { - "name" : "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", - "refsource" : "CONFIRM", - "url" : "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" - }, - { - "name" : "http://support.citrix.com/article/CTX140876", - "refsource" : "CONFIRM", - "url" : "http://support.citrix.com/article/CTX140876" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" - }, - { - "name" : "http://www.ibm.com/support/docview.wss?uid=swg21676356", - "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=swg21676356" - }, - { - "name" : "http://www.ibm.com/support/docview.wss?uid=swg21676877", - "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=swg21676877" - }, - { - "name" : "http://www.ibm.com/support/docview.wss?uid=swg24037783", - "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=swg24037783" - }, - { - "name" : "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", - "refsource" : "CONFIRM", - "url" : "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" - }, - { - "name" : "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" - }, - { - "name" : "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" - }, - { - "name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", - "refsource" : "CONFIRM", - "url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629" - }, - { - "name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", - "refsource" : "CONFIRM", - "url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195" - }, - { - "name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", - "refsource" : "CONFIRM", - "url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217" - }, - { - "name" : "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", - "refsource" : "CONFIRM", - "url" : "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" - }, - { - "name" : "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", - "refsource" : "CONFIRM", - "url" : "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" - }, - { - "name" : "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", - "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" - }, - { - "name" : "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", - "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" - }, - { - "name" : "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", - "refsource" : "CONFIRM", - "url" : "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" - }, - { - "name" : "https://www.novell.com/support/kb/doc.php?id=7015271", - "refsource" : "CONFIRM", - "url" : "https://www.novell.com/support/kb/doc.php?id=7015271" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" - }, - { - "name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", - "refsource" : "CONFIRM", - "url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" - }, - { - "name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", - "refsource" : "CONFIRM", - "url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" - }, - { - "name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", - "refsource" : "CONFIRM", - "url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" - }, - { - "name" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", - "refsource" : "CONFIRM", - "url" : "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" - }, - { - "name" : "http://www.ibm.com/support/docview.wss?uid=swg21676793", - "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=swg21676793" - }, - { - "name" : "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", - "refsource" : "CONFIRM", - "url" : "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" - }, - { - "name" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", - "refsource" : "CONFIRM", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" - }, - { - "name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" - }, - { - "name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" - }, - { - "name" : "IV61506", - "refsource" : "AIXAPAR", - "url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" - }, - { - "name" : "IT02314", - "refsource" : "AIXAPAR", - "url" : "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" - }, - { - "name" : "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", - "refsource" : "CISCO", - "url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" - }, - { - "name" : "FEDORA-2014-9301", - "refsource" : "FEDORA", - "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" - }, - { - "name" : "FEDORA-2014-9308", - "refsource" : "FEDORA", - "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" - }, - { - "name" : "GLSA-201407-05", - "refsource" : "GENTOO", - "url" : "http://security.gentoo.org/glsa/glsa-201407-05.xml" - }, - { - "name" : "HPSBMU03070", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140499864129699&w=2" - }, - { - "name" : "HPSBMU03053", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140369637402535&w=2" - }, - { - "name" : "HPSBMU03058", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140386311427810&w=2" - }, - { - "name" : "HPSBHF03145", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=141383465822787&w=2" - }, - { - "name" : "HPSBMU03083", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140983229106599&w=2" - }, - { - "name" : "HPSBPI03107", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=141147110427269&w=2" - }, - { - "name" : "HPSBST03097", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=141383410222440&w=2" - }, - { - "name" : "HPSBST03103", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=141164638606214&w=2" - }, - { - "name" : "HPSBST03106", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=141025641601169&w=2" - }, - { - "name" : "HPSBST03265", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=142546741516006&w=2" - }, - { - "name" : "HPSBMU03216", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=142350350616251&w=2" - }, - { - "name" : "SSRT101818", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=142350350616251&w=2" - }, - { - "name" : "HPSBST03195", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=142805027510172&w=2" - }, - { - "name" : "HPSBGN03050", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140482916501310&w=2" - }, - { - "name" : "HPSBGN03068", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140544599631400&w=2" - }, - { - "name" : "HPSBHF03052", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=141658880509699&w=2" - }, - { - "name" : "HPSBHF03088", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140794476212181&w=2" - }, - { - "name" : "HPSBMU03051", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140448122410568&w=2" - }, - { - "name" : "HPSBMU03055", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140431828824371&w=2" - }, - { - "name" : "HPSBMU03056", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140389355508263&w=2" - }, - { - "name" : "HPSBMU03057", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140389274407904&w=2" - }, - { - "name" : "HPSBMU03062", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140752315422991&w=2" - }, - { - "name" : "HPSBMU03065", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140491231331543&w=2" - }, - { - "name" : "HPSBMU03071", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140604261522465&w=2" - }, - { - "name" : "HPSBMU03074", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140621259019789&w=2" - }, - { - "name" : "HPSBMU03076", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140904544427729&w=2" - }, - { - "name" : "HPSBMU03078", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140672208601650&w=2" - }, - { - "name" : "HPSBMU03089", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140784085708882&w=2" - }, - { - "name" : "HPSBMU03094", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140852757108392&w=2" - }, - { - "name" : "HPSBMU03101", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140852826008699&w=2" - }, - { - "name" : "HPSBOV03047", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140317760000786&w=2" - }, - { - "name" : "HPSBST03098", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140870499402361&w=2" - }, - { - "name" : "HPSBUX03046", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140266410314613&w=2" - }, - { - "name" : "SSRT101590", - "refsource" : "HP", - "url" : "http://marc.info/?l=bugtraq&m=140266410314613&w=2" - }, - { - "name" : "MDVSA-2015:062", - "refsource" : "MANDRIVA", - "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" - }, - { - "name" : "MDVSA-2014:105", - "refsource" : "MANDRIVA", - "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" - }, - { - "name" : "MDVSA-2014:106", - "refsource" : "MANDRIVA", - "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" - }, - { - "name" : "RHSA-2014:0624", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0624.html" - }, - { - "name" : "RHSA-2014:0626", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0626.html" - }, - { - "name" : "RHSA-2014:0627", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0627.html" - }, - { - "name" : "RHSA-2014:0630", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0630.html" - }, - { - "name" : "RHSA-2014:0631", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0631.html" - }, - { - "name" : "RHSA-2014:0632", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0632.html" - }, - { - "name" : "RHSA-2014:0633", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0633.html" - }, - { - "name" : "RHSA-2014:0680", - "refsource" : "REDHAT", - "url" : "http://rhn.redhat.com/errata/RHSA-2014-0680.html" - }, - { - "name" : "openSUSE-SU-2015:0229", - "refsource" : "SUSE", - "url" : "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" - }, - { - "name" : "SUSE-SU-2015:0578", - "refsource" : "SUSE", - "url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" - }, - { - "name" : "openSUSE-SU-2016:0640", - "refsource" : "SUSE", - "url" : "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" - }, - { - "name" : "SUSE-SU-2015:0743", - "refsource" : "SUSE", - "url" : "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" - }, - { - "name" : "VU#978508", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/978508" - }, - { - "name" : "1031032", - "refsource" : "SECTRACK", - "url" : "http://www.securitytracker.com/id/1031032" - }, - { - "name" : "1031594", - "refsource" : "SECTRACK", - "url" : "http://www.securitytracker.com/id/1031594" - }, - { - "name" : "58579", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58579" - }, - { - "name" : "59191", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59191" - }, - { - "name" : "58128", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58128" - }, - { - "name" : "58385", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58385" - }, - { - "name" : "58939", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58939" - }, - { - "name" : "59043", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59043" - }, - { - "name" : "59055", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59055" - }, - { - "name" : "59063", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59063" - }, - { - "name" : "59120", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59120" - }, - { - "name" : "59126", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59126" - }, - { - "name" : "59162", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59162" - }, - { - "name" : "59300", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59300" - }, - { - "name" : "59383", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59383" - }, - { - "name" : "59438", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59438" - }, - { - "name" : "59442", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59442" - }, - { - "name" : "59450", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59450" - }, - { - "name" : "59491", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59491" - }, - { - "name" : "59495", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59495" - }, - { - "name" : "59514", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59514" - }, - { - "name" : "59528", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59528" - }, - { - "name" : "59490", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59490" - }, - { - "name" : "59655", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59655" - }, - { - "name" : "59721", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59721" - }, - { - "name" : "59827", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59827" - }, - { - "name" : "58930", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58930" - }, - { - "name" : "59413", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59413" - }, - { - "name" : "59602", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59602" - }, - { - "name" : "59669", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59669" - }, - { - "name" : "58639", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58639" - }, - { - "name" : "58759", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58759" - }, - { - "name" : "59012", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59012" - }, - { - "name" : "59301", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59301" - }, - { - "name" : "59370", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59370" - }, - { - "name" : "59659", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59659" - }, - { - "name" : "59666", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59666" - }, - { - "name" : "59824", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59824" - }, - { - "name" : "58745", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58745" - }, - { - "name" : "59459", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59459" - }, - { - "name" : "59885", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59885" - }, - { - "name" : "59342", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59342" - }, - { - "name" : "59451", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59451" - }, - { - "name" : "59894", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59894" - }, - { - "name" : "59916", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59916" - }, - { - "name" : "60049", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60049" - }, - { - "name" : "58743", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58743" - }, - { - "name" : "59325", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59325" - }, - { - "name" : "59354", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59354" - }, - { - "name" : "59506", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59506" - }, - { - "name" : "59530", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59530" - }, - { - "name" : "59589", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59589" - }, - { - "name" : "60066", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60066" - }, - { - "name" : "59784", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59784" - }, - { - "name" : "59878", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59878" - }, - { - "name" : "59990", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59990" - }, - { - "name" : "60176", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60176" - }, - { - "name" : "60522", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60522" - }, - { - "name" : "60567", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60567" - }, - { - "name" : "60571", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60571" - }, - { - "name" : "60577", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60577" - }, - { - "name" : "60819", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/60819" - }, - { - "name" : "61815", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/61815" - }, - { - "name" : "61254", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/61254" - }, - { - "name" : "58615", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58615" - }, - { - "name" : "58660", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58660" - }, - { - "name" : "58667", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58667" - }, - { - "name" : "58714", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58714" - }, - { - "name" : "58719", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58719" - }, - { - "name" : "59101", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59101" - }, - { - "name" : "59132", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59132" - }, - { - "name" : "59167", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59167" - }, - { - "name" : "59188", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59188" - }, - { - "name" : "59189", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59189" - }, - { - "name" : "59190", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59190" - }, - { - "name" : "59192", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59192" - }, - { - "name" : "59202", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59202" - }, - { - "name" : "59282", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59282" - }, - { - "name" : "59284", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59284" - }, - { - "name" : "59362", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59362" - }, - { - "name" : "59365", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59365" - }, - { - "name" : "59429", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59429" - }, - { - "name" : "59437", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59437" - }, - { - "name" : "59444", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59444" - }, - { - "name" : "59448", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59448" - }, - { - "name" : "59460", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59460" - }, - { - "name" : "58433", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58433" - }, - { - "name" : "59093", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59093" - }, - { - "name" : "59135", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59135" - }, - { - "name" : "59142", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59142" - }, - { - "name" : "59186", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59186" - }, - { - "name" : "59211", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59211" - }, - { - "name" : "59214", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59214" - }, - { - "name" : "59223", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59223" - }, - { - "name" : "59338", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59338" - }, - { - "name" : "59368", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59368" - }, - { - "name" : "59375", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59375" - }, - { - "name" : "59380", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59380" - }, - { - "name" : "59389", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59389" - }, - { - "name" : "59445", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59445" - }, - { - "name" : "59446", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59446" - }, - { - "name" : "59483", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59483" - }, - { - "name" : "58492", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58492" - }, - { - "name" : "58742", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58742" - }, - { - "name" : "59040", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59040" - }, - { - "name" : "59163", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59163" - }, - { - "name" : "59175", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59175" - }, - { - "name" : "59264", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59264" - }, - { - "name" : "59287", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59287" - }, - { - "name" : "59305", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59305" - }, - { - "name" : "59306", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59306" - }, - { - "name" : "59310", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59310" - }, - { - "name" : "59364", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59364" - }, - { - "name" : "59374", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59374" - }, - { - "name" : "59435", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59435" - }, - { - "name" : "59440", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59440" - }, - { - "name" : "59441", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59441" - }, - { - "name" : "59447", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59447" - }, - { - "name" : "59449", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59449" - }, - { - "name" : "59454", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59454" - }, - { - "name" : "58337", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58337" - }, - { - "name" : "58713", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58713" - }, - { - "name" : "58716", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58716" - }, - { - "name" : "58945", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58945" - }, - { - "name" : "58977", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/58977" - }, - { - "name" : "59004", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59004" - }, - { - "name" : "59347", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59347" - }, - { - "name" : "59518", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59518" - }, - { - "name" : "59215", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59215" - }, - { - "name" : "59231", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59231" - }, - { - "name" : "59502", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59502" - }, - { - "name" : "59525", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59525" - }, - { - "name" : "59529", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59529" - }, - { - "name" : "59661", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59661" - }, - { - "name" : "59677", - "refsource" : "SECUNIA", - "url" : "http://secunia.com/advisories/59677" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "59342", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59342" + }, + { + "name": "59669", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59669" + }, + { + "name": "59525", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59525" + }, + { + "name": "HPSBMU03071", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140604261522465&w=2" + }, + { + "name": "59004", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59004" + }, + { + "name": "59530", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59530" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675626" + }, + { + "name": "59824", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59824" + }, + { + "name": "59282", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59282" + }, + { + "name": "http://www.novell.com/support/kb/doc.php?id=7015300", + "refsource": "CONFIRM", + "url": "http://www.novell.com/support/kb/doc.php?id=7015300" + }, + { + "name": "59215", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59215" + }, + { + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586", + "refsource": "CONFIRM", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103586" + }, + { + "name": "59990", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59990" + }, + { + "name": "59264", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59264" + }, + { + "name": "59454", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59454" + }, + { + "name": "58492", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58492" + }, + { + "name": "59186", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59186" + }, + { + "name": "59188", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59188" + }, + { + "name": "59126", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59126" + }, + { + "name": "HPSBMU03078", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140672208601650&w=2" + }, + { + "name": "HPSBMU03089", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140784085708882&w=2" + }, + { + "name": "http://www.novell.com/support/kb/doc.php?id=7015264", + "refsource": "CONFIRM", + "url": "http://www.novell.com/support/kb/doc.php?id=7015264" + }, + { + "name": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html", + "refsource": "CONFIRM", + "url": "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html" + }, + { + "name": "59306", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59306" + }, + { + "name": "RHSA-2014:0627", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0627.html" + }, + { + "name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", + "refsource": "CONFIRM", + "url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0" + }, + { + "name": "HPSBGN03068", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140544599631400&w=2" + }, + { + "name": "RHSA-2014:0626", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0626.html" + }, + { + "name": "59190", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59190" + }, + { + "name": "58639", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58639" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678289" + }, + { + "name": "http://www.ibm.com/support/docview.wss?uid=swg21676877", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=swg21676877" + }, + { + "name": "59446", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59446" + }, + { + "name": "59529", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59529" + }, + { + "name": "59445", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59445" + }, + { + "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", + "refsource": "CONFIRM", + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" + }, + { + "name": "59589", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59589" + }, + { + "name": "59894", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59894" + }, + { + "name": "59325", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59325" + }, + { + "name": "59354", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59354" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037729" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677131" + }, + { + "name": "HPSBUX03046", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140266410314613&w=2" + }, + { + "name": "61254", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/61254" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678233" + }, + { + "name": "59447", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59447" + }, + { + "name": "1031594", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1031594" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676655" + }, + { + "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E", + "refsource": "CONFIRM", + "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E" + }, + { + "name": "59223", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59223" + }, + { + "name": "58743", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58743" + }, + { + "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" + }, + { + "name": "58719", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58719" + }, + { + "name": "59449", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59449" + }, + { + "name": "59132", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59132" + }, + { + "name": "SSRT101818", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=142350350616251&w=2" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843" + }, + { + "name": "HPSBST03098", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140870499402361&w=2" + }, + { + "name": "HPSBMU03058", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140386311427810&w=2" + }, + { + "name": "59442", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59442" + }, + { + "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946", + "refsource": "CONFIRM", + "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946" + }, + { + "name": "HPSBOV03047", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140317760000786&w=2" + }, + { + "name": "HPSBST03195", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=142805027510172&w=2" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676879" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037761" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677828" + }, + { + "name": "59441", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59441" + }, + { + "name": "HPSBMU03074", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140621259019789&w=2" + }, + { + "name": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf", + "refsource": "CONFIRM", + "url": "http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf" + }, + { + "name": "HPSBMU03094", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140852757108392&w=2" + }, + { + "name": "https://filezilla-project.org/versions.php?type=server", + "refsource": "CONFIRM", + "url": "https://filezilla-project.org/versions.php?type=server" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676786" + }, + { + "name": "60567", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60567" + }, + { + "name": "59189", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59189" + }, + { + "name": "59368", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59368" + }, + { + "name": "MDVSA-2014:106", + "refsource": "MANDRIVA", + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:106" + }, + { + "name": "59142", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59142" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676478" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676845" + }, + { + "name": "58742", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58742" + }, + { + "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004670" + }, + { + "name": "RHSA-2014:0624", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0624.html" + }, + { + "name": "59602", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59602" + }, + { + "name": "http://www.kerio.com/support/kerio-control/release-history", + "refsource": "CONFIRM", + "url": "http://www.kerio.com/support/kerio-control/release-history" + }, + { + "name": "59300", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59300" + }, + { + "name": "58930", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58930" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677080" + }, + { + "name": "61815", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/61815" + }, + { + "name": "58667", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58667" + }, + { + "name": "GLSA-201407-05", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-201407-05.xml" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677390" + }, + { + "name": "59191", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59191" + }, + { + "name": "59284", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59284" + }, + { + "name": "59444", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59444" + }, + { + "name": "https://www.imperialviolet.org/2014/06/05/earlyccs.html", + "refsource": "MISC", + "url": "https://www.imperialviolet.org/2014/06/05/earlyccs.html" + }, + { + "name": "http://www.ibm.com/support/docview.wss?uid=swg24037783", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=swg24037783" + }, + { + "name": "59365", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59365" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677695" + }, + { + "name": "59305", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59305" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676529" + }, + { + "name": "59483", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59483" + }, + { + "name": "58385", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58385" + }, + { + "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" + }, + { + "name": "59495", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59495" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676889" + }, + { + "name": "FEDORA-2014-9308", + "refsource": "FEDORA", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html" + }, + { + "name": "58945", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58945" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841" + }, + { + "name": "HPSBST03106", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=141025641601169&w=2" + }, + { + "name": "59659", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59659" + }, + { + "name": "59440", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59440" + }, + { + "name": "openSUSE-SU-2016:0640", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" + }, + { + "name": "59429", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59429" + }, + { + "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" + }, + { + "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" + }, + { + "name": "59655", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59655" + }, + { + "name": "59370", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59370" + }, + { + "name": "59827", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59827" + }, + { + "name": "58660", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58660" + }, + { + "name": "59163", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59163" + }, + { + "name": "58716", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58716" + }, + { + "name": "59055", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59055" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676071" + }, + { + "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737", + "refsource": "CONFIRM", + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677836" + }, + { + "name": "59437", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59437" + }, + { + "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754", + "refsource": "CONFIRM", + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754" + }, + { + "name": "60176", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60176" + }, + { + "name": "HPSBPI03107", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=141147110427269&w=2" + }, + { + "name": "59101", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59101" + }, + { + "name": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx", + "refsource": "CONFIRM", + "url": "http://esupport.trendmicro.com/solution/en-US/1103813.aspx" + }, + { + "name": "59374", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59374" + }, + { + "name": "59063", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59063" + }, + { + "name": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html", + "refsource": "CONFIRM", + "url": "http://www.vmware.com/security/advisories/VMSA-2014-0006.html" + }, + { + "name": "https://discussions.nessus.org/thread/7517", + "refsource": "CONFIRM", + "url": "https://discussions.nessus.org/thread/7517" + }, + { + "name": "59310", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59310" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676501" + }, + { + "name": "HPSBMU03216", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=142350350616251&w=2" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676536" + }, + { + "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" + }, + { + "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", + "refsource": "CONFIRM", + "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc" + }, + { + "name": "IV61506", + "refsource": "AIXAPAR", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506" + }, + { + "name": "59502", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59502" + }, + { + "name": "http://www.splunk.com/view/SP-CAAAM2D", + "refsource": "CONFIRM", + "url": "http://www.splunk.com/view/SP-CAAAM2D" + }, + { + "name": "59878", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59878" + }, + { + "name": "http://www.fortiguard.com/advisory/FG-IR-14-018/", + "refsource": "CONFIRM", + "url": "http://www.fortiguard.com/advisory/FG-IR-14-018/" + }, + { + "name": "SUSE-SU-2015:0743", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" + }, + { + "name": "HPSBMU03101", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140852826008699&w=2" + }, + { + "name": "http://www.ibm.com/support/docview.wss?uid=swg21676793", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=swg21676793" + }, + { + "name": "59214", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59214" + }, + { + "name": "http://www.ibm.com/support/docview.wss?uid=swg21676356", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=swg21676356" + }, + { + "name": "HPSBHF03088", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140794476212181&w=2" + }, + { + "name": "HPSBMU03057", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140389274407904&w=2" + }, + { + "name": "http://support.citrix.com/article/CTX140876", + "refsource": "CONFIRM", + "url": "http://support.citrix.com/article/CTX140876" + }, + { + "name": "59167", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59167" + }, + { + "name": "59120", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59120" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037732" + }, + { + "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757", + "refsource": "CONFIRM", + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172" + }, + { + "name": "HPSBMU03053", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140369637402535&w=2" + }, + { + "name": "59380", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59380" + }, + { + "name": "MDVSA-2014:105", + "refsource": "MANDRIVA", + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:105" + }, + { + "name": "59460", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59460" + }, + { + "name": "59506", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59506" + }, + { + "name": "58939", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58939" + }, + { + "name": "SSRT101590", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140266410314613&w=2" + }, + { + "name": "59661", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59661" + }, + { + "name": "59514", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59514" + }, + { + "name": "59677", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59677" + }, + { + "name": "RHSA-2014:0630", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0630.html" + }, + { + "name": "20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products", + "refsource": "CISCO", + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl" + }, + { + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195", + "refsource": "CONFIRM", + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195" + }, + { + "name": "RHSA-2014:0632", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0632.html" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037730" + }, + { + "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10075", + "refsource": "CONFIRM", + "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10075" + }, + { + "name": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037731" + }, + { + "name": "58745", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58745" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676419" + }, + { + "name": "59438", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59438" + }, + { + "name": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=isg3T1020948" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676496" + }, + { + "name": "58714", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58714" + }, + { + "name": "HPSBGN03050", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140482916501310&w=2" + }, + { + "name": "openSUSE-SU-2015:0229", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" + }, + { + "name": "http://ccsinjection.lepidum.co.jp", + "refsource": "MISC", + "url": "http://ccsinjection.lepidum.co.jp" + }, + { + "name": "59435", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59435" + }, + { + "name": "HPSBHF03052", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=141658880509699&w=2" + }, + { + "name": "http://www.openssl.org/news/secadv_20140605.txt", + "refsource": "CONFIRM", + "url": "http://www.openssl.org/news/secadv_20140605.txt" + }, + { + "name": "58615", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58615" + }, + { + "name": "HPSBST03265", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=142546741516006&w=2" + }, + { + "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", + "refsource": "FULLDISC", + "url": "http://seclists.org/fulldisclosure/2014/Dec/23" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676644" + }, + { + "name": "59231", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59231" + }, + { + "name": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671", + "refsource": "CONFIRM", + "url": "https://www.ibm.com/support/docview.wss?uid=ssg1S1004671" + }, + { + "name": "SUSE-SU-2015:0578", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" + }, + { + "name": "http://support.apple.com/kb/HT6443", + "refsource": "CONFIRM", + "url": "http://support.apple.com/kb/HT6443" + }, + { + "name": "59211", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59211" + }, + { + "name": "58433", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58433" + }, + { + "name": "60066", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60066" + }, + { + "name": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html", + "refsource": "CONFIRM", + "url": "http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html" + }, + { + "name": "https://access.redhat.com/site/blogs/766093/posts/908133", + "refsource": "CONFIRM", + "url": "https://access.redhat.com/site/blogs/766093/posts/908133" + }, + { + "name": "59301", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59301" + }, + { + "name": "60522", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60522" + }, + { + "name": "59784", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59784" + }, + { + "name": "https://kb.bluecoat.com/index?page=content&id=SA80", + "refsource": "CONFIRM", + "url": "https://kb.bluecoat.com/index?page=content&id=SA80" + }, + { + "name": "HPSBST03097", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=141383410222440&w=2" + }, + { + "name": "20140607 Re: More OpenSSL issues", + "refsource": "FULLDISC", + "url": "http://seclists.org/fulldisclosure/2014/Jun/38" + }, + { + "name": "HPSBMU03076", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140904544427729&w=2" + }, + { + "name": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6", + "refsource": "CONFIRM", + "url": "http://www.f-secure.com/en/web/labs_global/fsc-2014-6" + }, + { + "name": "59135", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59135" + }, + { + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629", + "refsource": "CONFIRM", + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678167" + }, + { + "name": "58759", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58759" + }, + { + "name": "59093", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59093" + }, + { + "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740", + "refsource": "CONFIRM", + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740" + }, + { + "name": "http://puppetlabs.com/security/cve/cve-2014-0224", + "refsource": "CONFIRM", + "url": "http://puppetlabs.com/security/cve/cve-2014-0224" + }, + { + "name": "59192", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59192" + }, + { + "name": "FEDORA-2014-9301", + "refsource": "FEDORA", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html" + }, + { + "name": "HPSBMU03062", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140752315422991&w=2" + }, + { + "name": "58579", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58579" + }, + { + "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf", + "refsource": "CONFIRM", + "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf" + }, + { + "name": "59040", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59040" + }, + { + "name": "HPSBMU03056", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140389355508263&w=2" + }, + { + "name": "59175", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59175" + }, + { + "name": "60819", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60819" + }, + { + "name": "HPSBMU03051", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140448122410568&w=2" + }, + { + "name": "59666", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59666" + }, + { + "name": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download", + "refsource": "CONFIRM", + "url": "http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download" + }, + { + "name": "58128", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58128" + }, + { + "name": "HPSBMU03055", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140431828824371&w=2" + }, + { + "name": "59413", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59413" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676334" + }, + { + "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675821" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037870" + }, + { + "name": "59721", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59721" + }, + { + "name": "HPSBHF03145", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2" + }, + { + "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756", + "refsource": "CONFIRM", + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756" + }, + { + "name": "RHSA-2014:0680", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0680.html" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676062" + }, + { + "name": "59012", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59012" + }, + { + "name": "58713", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58713" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21673137" + }, + { + "name": "59362", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59362" + }, + { + "name": "MDVSA-2015:062", + "refsource": "MANDRIVA", + "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676035" + }, + { + "name": "HPSBMU03070", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140499864129699&w=2" + }, + { + "name": "RHSA-2014:0631", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0631.html" + }, + { + "name": "59338", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59338" + }, + { + "name": "59450", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59450" + }, + { + "name": "http://linux.oracle.com/errata/ELSA-2014-1053.html", + "refsource": "CONFIRM", + "url": "http://linux.oracle.com/errata/ELSA-2014-1053.html" + }, + { + "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" + }, + { + "name": "VU#978508", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/978508" + }, + { + "name": "1031032", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1031032" + }, + { + "name": "59287", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59287" + }, + { + "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1", + "refsource": "CONFIRM", + "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21683332" + }, + { + "name": "59491", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59491" + }, + { + "name": "59364", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59364" + }, + { + "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues", + "refsource": "CONFIRM", + "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues" + }, + { + "name": "59451", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59451" + }, + { + "name": "58977", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58977" + }, + { + "name": "https://www.novell.com/support/kb/doc.php?id=7015271", + "refsource": "CONFIRM", + "url": "https://www.novell.com/support/kb/doc.php?id=7015271" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676333" + }, + { + "name": "60571", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60571" + }, + { + "name": "59459", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59459" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676833" + }, + { + "name": "60577", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60577" + }, + { + "name": "59448", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59448" + }, + { + "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441", + "refsource": "CONFIRM", + "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441" + }, + { + "name": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf", + "refsource": "CONFIRM", + "url": "https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf" + }, + { + "name": "http://www.blackberry.com/btsc/KB36051", + "refsource": "CONFIRM", + "url": "http://www.blackberry.com/btsc/KB36051" + }, + { + "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755", + "refsource": "CONFIRM", + "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755" + }, + { + "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm", + "refsource": "CONFIRM", + "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm" + }, + { + "name": "HPSBST03103", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=141164638606214&w=2" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690" + }, + { + "name": "59885", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59885" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677527" + }, + { + "name": "59202", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59202" + }, + { + "name": "RHSA-2014:0633", + "refsource": "REDHAT", + "url": "http://rhn.redhat.com/errata/RHSA-2014-0633.html" + }, + { + "name": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004678" + }, + { + "name": "59375", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59375" + }, + { + "name": "HPSBMU03083", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140983229106599&w=2" + }, + { + "name": "59528", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59528" + }, + { + "name": "58337", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/58337" + }, + { + "name": "59518", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59518" + }, + { + "name": "59389", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59389" + }, + { + "name": "59162", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59162" + }, + { + "name": "59383", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59383" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677567" + }, + { + "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217", + "refsource": "CONFIRM", + "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217" + }, + { + "name": "59490", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59490" + }, + { + "name": "59916", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59916" + }, + { + "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E", + "refsource": "CONFIRM", + "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E" + }, + { + "name": "HPSBMU03065", + "refsource": "HP", + "url": "http://marc.info/?l=bugtraq&m=140491231331543&w=2" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24037727" + }, + { + "name": "IT02314", + "refsource": "AIXAPAR", + "url": "http://www.ibm.com/support/docview.wss?uid=swg1IT02314" + }, + { + "name": "59043", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59043" + }, + { + "name": "59347", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/59347" + }, + { + "name": "60049", + "refsource": "SECUNIA", + "url": "http://secunia.com/advisories/60049" + }, + { + "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615", + "refsource": "CONFIRM", + "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676615" + } + ] + } +} \ No newline at end of file diff --git a/2014/0xxx/CVE-2014-0450.json b/2014/0xxx/CVE-2014-0450.json index e3113606e88..37e14aab98d 100644 --- a/2014/0xxx/CVE-2014-0450.json +++ b/2014/0xxx/CVE-2014-0450.json @@ -1,62 +1,62 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-0450", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.7 and 11.1.1.8 allows remote attackers to affect confidentiality via unknown vectors related to People Connection." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "secalert_us@oracle.com", + "ID": "CVE-2014-0450", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.7 and 11.1.1.8 allows remote attackers to affect confidentiality via unknown vectors related to People Connection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html" + } + ] + } +} \ No newline at end of file diff --git a/2014/1xxx/CVE-2014-1408.json b/2014/1xxx/CVE-2014-1408.json index cd95712b404..05b29913656 100644 --- a/2014/1xxx/CVE-2014-1408.json +++ b/2014/1xxx/CVE-2014-1408.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-1408", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The Conceptronic C54APM access point with runtime code 1.26 has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via an HTTP request, as demonstrated by stored XSS attacks." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2014-1408", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf", - "refsource" : "MISC", - "url" : "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf" - }, - { - "name" : "http://download.conceptronic.net/manuals/C04-058_C54APM_v2.0_Quick_Guide_ML.pdf", - "refsource" : "CONFIRM", - "url" : "http://download.conceptronic.net/manuals/C04-058_C54APM_v2.0_Quick_Guide_ML.pdf" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Conceptronic C54APM access point with runtime code 1.26 has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via an HTTP request, as demonstrated by stored XSS attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf", + "refsource": "MISC", + "url": "http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf" + }, + { + "name": "http://download.conceptronic.net/manuals/C04-058_C54APM_v2.0_Quick_Guide_ML.pdf", + "refsource": "CONFIRM", + "url": "http://download.conceptronic.net/manuals/C04-058_C54APM_v2.0_Quick_Guide_ML.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2014/1xxx/CVE-2014-1624.json b/2014/1xxx/CVE-2014-1624.json index eac60ca9fa7..3db4ecbfd04 100644 --- a/2014/1xxx/CVE-2014-1624.json +++ b/2014/1xxx/CVE-2014-1624.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-1624", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allows local users to overwrite arbitrary files by pre-creating /tmp/pyxdg-runtime-dir-fallback-victim to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the get_runtime_dir function is called." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2014-1624", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "[oss-security] 20140121 Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp", - "refsource" : "MLIST", - "url" : "http://www.openwall.com/lists/oss-security/2014/01/21/3" - }, - { - "name" : "[oss-security] 20140121 Re: Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp", - "refsource" : "MLIST", - "url" : "http://www.openwall.com/lists/oss-security/2014/01/21/4" - }, - { - "name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247", - "refsource" : "MISC", - "url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247" - }, - { - "name" : "65042", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/65042" - }, - { - "name" : "pythonxdg-cve20141624-symlink(90618)", - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/90618" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allows local users to overwrite arbitrary files by pre-creating /tmp/pyxdg-runtime-dir-fallback-victim to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the get_runtime_dir function is called." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "[oss-security] 20140121 Re: Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp", + "refsource": "MLIST", + "url": "http://www.openwall.com/lists/oss-security/2014/01/21/4" + }, + { + "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247", + "refsource": "MISC", + "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247" + }, + { + "name": "pythonxdg-cve20141624-symlink(90618)", + "refsource": "XF", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90618" + }, + { + "name": "65042", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/65042" + }, + { + "name": "[oss-security] 20140121 Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp", + "refsource": "MLIST", + "url": "http://www.openwall.com/lists/oss-security/2014/01/21/3" + } + ] + } +} \ No newline at end of file diff --git a/2014/1xxx/CVE-2014-1727.json b/2014/1xxx/CVE-2014-1727.json index 958bc827a5d..0097bf2c88c 100644 --- a/2014/1xxx/CVE-2014-1727.json +++ b/2014/1xxx/CVE-2014-1727.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-1727", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Use-after-free vulnerability in content/renderer/renderer_webcolorchooser_impl.h in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to forms." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "security@google.com", + "ID": "CVE-2014-1727", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html", - "refsource" : "CONFIRM", - "url" : "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html" - }, - { - "name" : "https://code.google.com/p/chromium/issues/detail?id=342735", - "refsource" : "CONFIRM", - "url" : "https://code.google.com/p/chromium/issues/detail?id=342735" - }, - { - "name" : "https://src.chromium.org/viewvc/chrome?revision=255276&view=revision", - "refsource" : "CONFIRM", - "url" : "https://src.chromium.org/viewvc/chrome?revision=255276&view=revision" - }, - { - "name" : "DSA-2905", - "refsource" : "DEBIAN", - "url" : "http://www.debian.org/security/2014/dsa-2905" - }, - { - "name" : "GLSA-201408-16", - "refsource" : "GENTOO", - "url" : "http://security.gentoo.org/glsa/glsa-201408-16.xml" - }, - { - "name" : "openSUSE-SU-2014:0601", - "refsource" : "SUSE", - "url" : "http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Use-after-free vulnerability in content/renderer/renderer_webcolorchooser_impl.h in Google Chrome before 34.0.1847.116 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to forms." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://code.google.com/p/chromium/issues/detail?id=342735", + "refsource": "CONFIRM", + "url": "https://code.google.com/p/chromium/issues/detail?id=342735" + }, + { + "name": "https://src.chromium.org/viewvc/chrome?revision=255276&view=revision", + "refsource": "CONFIRM", + "url": "https://src.chromium.org/viewvc/chrome?revision=255276&view=revision" + }, + { + "name": "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html", + "refsource": "CONFIRM", + "url": "http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html" + }, + { + "name": "openSUSE-SU-2014:0601", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html" + }, + { + "name": "GLSA-201408-16", + "refsource": "GENTOO", + "url": "http://security.gentoo.org/glsa/glsa-201408-16.xml" + }, + { + "name": "DSA-2905", + "refsource": "DEBIAN", + "url": "http://www.debian.org/security/2014/dsa-2905" + } + ] + } +} \ No newline at end of file diff --git a/2014/5xxx/CVE-2014-5137.json b/2014/5xxx/CVE-2014-5137.json index 1c70a4776ef..f83ff66f9f8 100644 --- a/2014/5xxx/CVE-2014-5137.json +++ b/2014/5xxx/CVE-2014-5137.json @@ -1,62 +1,62 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-5137", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Innovative Interfaces Sierra Library Services Platform 1.2_3 provides different responses for login request depending on whether the user account exists, which allows remote attackers to enumerate account names via a series of login requests, possibly related to the Webpac Pro submodule." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2014-5137", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20140828 Sierra Library Services Platform Multiple Vulnerability Disclosure", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/533267/100/0/threaded" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Innovative Interfaces Sierra Library Services Platform 1.2_3 provides different responses for login request depending on whether the user account exists, which allows remote attackers to enumerate account names via a series of login requests, possibly related to the Webpac Pro submodule." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20140828 Sierra Library Services Platform Multiple Vulnerability Disclosure", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/533267/100/0/threaded" + } + ] + } +} \ No newline at end of file diff --git a/2014/5xxx/CVE-2014-5500.json b/2014/5xxx/CVE-2014-5500.json index 36367ad79e0..28077c1a330 100644 --- a/2014/5xxx/CVE-2014-5500.json +++ b/2014/5xxx/CVE-2014-5500.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-5500", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2014-5500", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2014/5xxx/CVE-2014-5581.json b/2014/5xxx/CVE-2014-5581.json index c85490ea57e..c8b92768535 100644 --- a/2014/5xxx/CVE-2014-5581.json +++ b/2014/5xxx/CVE-2014-5581.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-5581", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The mirror photo shape (aka com.baiwang.styleinstamirror) application 1.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cert@cert.org", + "ID": "CVE-2014-5581", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", - "refsource" : "MISC", - "url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" - }, - { - "name" : "VU#205065", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/205065" - }, - { - "name" : "VU#582497", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/582497" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The mirror photo shape (aka com.baiwang.styleinstamirror) application 1.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "VU#205065", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/205065" + }, + { + "name": "VU#582497", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/582497" + }, + { + "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "refsource": "MISC", + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" + } + ] + } +} \ No newline at end of file diff --git a/2014/5xxx/CVE-2014-5758.json b/2014/5xxx/CVE-2014-5758.json index 67bb42649e4..c9931cc0900 100644 --- a/2014/5xxx/CVE-2014-5758.json +++ b/2014/5xxx/CVE-2014-5758.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2014-5758", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The Yellow Pages Local Search (aka com.yellowbook.android2) application 11.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cert@cert.org", + "ID": "CVE-2014-5758", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", - "refsource" : "MISC", - "url" : "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" - }, - { - "name" : "VU#582497", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/582497" - }, - { - "name" : "VU#815521", - "refsource" : "CERT-VN", - "url" : "http://www.kb.cert.org/vuls/id/815521" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Yellow Pages Local Search (aka com.yellowbook.android2) application 11.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "VU#815521", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/815521" + }, + { + "name": "VU#582497", + "refsource": "CERT-VN", + "url": "http://www.kb.cert.org/vuls/id/582497" + }, + { + "name": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing", + "refsource": "MISC", + "url": "https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing" + } + ] + } +} \ No newline at end of file diff --git a/2015/2xxx/CVE-2015-2038.json b/2015/2xxx/CVE-2015-2038.json index 8983ba6bb9a..cf335b2dffa 100644 --- a/2015/2xxx/CVE-2015-2038.json +++ b/2015/2xxx/CVE-2015-2038.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2015-2038", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-2038", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2015/2xxx/CVE-2015-2381.json b/2015/2xxx/CVE-2015-2381.json index 2e1a36a6e4e..9cf61281dd0 100644 --- a/2015/2xxx/CVE-2015-2381.json +++ b/2015/2xxx/CVE-2015-2381.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2015-2381", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka \"Win32k Information Disclosure Vulnerability,\" a different vulnerability than CVE-2015-2382." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "secure@microsoft.com", + "ID": "CVE-2015-2381", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "MS15-073", - "refsource" : "MS", - "url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-073" - }, - { - "name" : "1032904", - "refsource" : "SECTRACK", - "url" : "http://www.securitytracker.com/id/1032904" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka \"Win32k Information Disclosure Vulnerability,\" a different vulnerability than CVE-2015-2382." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "MS15-073", + "refsource": "MS", + "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-073" + }, + { + "name": "1032904", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1032904" + } + ] + } +} \ No newline at end of file diff --git a/2015/2xxx/CVE-2015-2818.json b/2015/2xxx/CVE-2015-2818.json index cbf137cd608..ecead110fd0 100644 --- a/2015/2xxx/CVE-2015-2818.json +++ b/2015/2xxx/CVE-2015-2818.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2015-2818", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "XML external entity (XXE) vulnerability in SAP Mobile Platform 3 allows remote attackers to send requests to intranet servers via crafted XML, aka SAP Security Note 2125513." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-2818", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe", - "refsource" : "MISC", - "url" : "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe" - }, - { - "name" : "73896", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/73896" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "XML external entity (XXE) vulnerability in SAP Mobile Platform 3 allows remote attackers to send requests to intranet servers via crafted XML, aka SAP Security Note 2125513." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe", + "refsource": "MISC", + "url": "https://erpscan.io/advisories/erpscan-15-011-sap-mobile-platform-xxe" + }, + { + "name": "73896", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/73896" + } + ] + } +} \ No newline at end of file diff --git a/2015/2xxx/CVE-2015-2819.json b/2015/2xxx/CVE-2015-2819.json index 6f7b004a599..ae2179b9428 100644 --- a/2015/2xxx/CVE-2015-2819.json +++ b/2015/2xxx/CVE-2015-2819.json @@ -1,82 +1,82 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2015-2819", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "SAP Sybase SQL Anywhere 11 and 16 allows remote attackers to cause a denial of service (crash) via a crafted request, aka SAP Security Note 2108161." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-2819", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20150625 [ERPSCAN-15-010] SYBASE SQL Anywhere 12 and 16 - DoS", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/535831/100/800/threaded" - }, - { - "name" : "20150623 ERPSCAN Research Advisory [ERPSCAN-15-010] SYBASE SQL Anywhere 12 and 16 - DoS", - "refsource" : "FULLDISC", - "url" : "http://seclists.org/fulldisclosure/2015/Jun/68" - }, - { - "name" : "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/", - "refsource" : "MISC", - "url" : "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/" - }, - { - "name" : "http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html", - "refsource" : "MISC", - "url" : "http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html" - }, - { - "name" : "74317", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/74317" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SAP Sybase SQL Anywhere 11 and 16 allows remote attackers to cause a denial of service (crash) via a crafted request, aka SAP Security Note 2108161." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20150625 [ERPSCAN-15-010] SYBASE SQL Anywhere 12 and 16 - DoS", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/535831/100/800/threaded" + }, + { + "name": "74317", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/74317" + }, + { + "name": "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/", + "refsource": "MISC", + "url": "https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos/" + }, + { + "name": "http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html", + "refsource": "MISC", + "url": "http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html" + }, + { + "name": "20150623 ERPSCAN Research Advisory [ERPSCAN-15-010] SYBASE SQL Anywhere 12 and 16 - DoS", + "refsource": "FULLDISC", + "url": "http://seclists.org/fulldisclosure/2015/Jun/68" + } + ] + } +} \ No newline at end of file diff --git a/2016/4xxx/CVE-2016-4015.json b/2016/4xxx/CVE-2016-4015.json index 15e949e5cc0..31da63d72c3 100644 --- a/2016/4xxx/CVE-2016-4015.json +++ b/2016/4xxx/CVE-2016-4015.json @@ -1,67 +1,67 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-4015", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The Enqueue Server in SAP NetWeaver JAVA AS 7.1 through 7.4 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka SAP Security Note 2258784." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-4015", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/", - "refsource" : "MISC", - "url" : "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/" - }, - { - "name" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", - "refsource" : "MISC", - "url" : "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Enqueue Server in SAP NetWeaver JAVA AS 7.1 through 7.4 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka SAP Security Note 2258784." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", + "refsource": "MISC", + "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" + }, + { + "name": "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/", + "refsource": "MISC", + "url": "https://erpscan.io/advisories/erpscan-16-019-sap-netweaver-enqueue-server-dos-vulnerability/" + } + ] + } +} \ No newline at end of file diff --git a/2016/4xxx/CVE-2016-4091.json b/2016/4xxx/CVE-2016-4091.json index fb0245d74a6..61bb72bfbc7 100644 --- a/2016/4xxx/CVE-2016-4091.json +++ b/2016/4xxx/CVE-2016-4091.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-4091", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4092." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "psirt@adobe.com", + "ID": "CVE-2016-4091", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html", - "refsource" : "CONFIRM", - "url" : "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html" - }, - { - "name" : "90508", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/90508" - }, - { - "name" : "1035828", - "refsource" : "SECTRACK", - "url" : "http://www.securitytracker.com/id/1035828" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4092." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "1035828", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1035828" + }, + { + "name": "90508", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/90508" + }, + { + "name": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html", + "refsource": "CONFIRM", + "url": "https://helpx.adobe.com/security/products/acrobat/apsb16-14.html" + } + ] + } +} \ No newline at end of file diff --git a/2016/8xxx/CVE-2016-8121.json b/2016/8xxx/CVE-2016-8121.json index d07cef6bb66..a5399cbf942 100644 --- a/2016/8xxx/CVE-2016-8121.json +++ b/2016/8xxx/CVE-2016-8121.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-8121", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-8121", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2016/8xxx/CVE-2016-8175.json b/2016/8xxx/CVE-2016-8175.json index b151525e701..09d1dfb49c2 100644 --- a/2016/8xxx/CVE-2016-8175.json +++ b/2016/8xxx/CVE-2016-8175.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-8175", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-8175", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2016/8xxx/CVE-2016-8562.json b/2016/8xxx/CVE-2016-8562.json index 682f7c610a7..30fc43bab30 100644 --- a/2016/8xxx/CVE-2016-8562.json +++ b/2016/8xxx/CVE-2016-8562.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-8562", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Siemens SIMATIC CP 1543-1 before 2.0.28, when SNMPv3 write access or SNMPv1 is enabled, allows remote authenticated users to cause a denial of service by modifying SNMP variables." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-8562", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01", - "refsource" : "MISC", - "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01" - }, - { - "name" : "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf", - "refsource" : "CONFIRM", - "url" : "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf" - }, - { - "name" : "94436", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/94436" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Siemens SIMATIC CP 1543-1 before 2.0.28, when SNMPv3 write access or SNMPv1 is enabled, allows remote authenticated users to cause a denial of service by modifying SNMP variables." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "94436", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/94436" + }, + { + "name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01", + "refsource": "MISC", + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01" + }, + { + "name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf", + "refsource": "CONFIRM", + "url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2016/9xxx/CVE-2016-9681.json b/2016/9xxx/CVE-2016-9681.json index 2d11b562b1d..af1d2c0807b 100644 --- a/2016/9xxx/CVE-2016-9681.json +++ b/2016/9xxx/CVE-2016-9681.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-9681", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Multiple cross-site scripting (XSS) vulnerabilities in Serendipity before 2.0.5 allow remote authenticated users to inject arbitrary web script or HTML via a category or directory name." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-9681", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://github.com/s9y/Serendipity/commit/e2a665e13b7de82a71c9bbb77575d15131b722be", - "refsource" : "MISC", - "url" : "https://github.com/s9y/Serendipity/commit/e2a665e13b7de82a71c9bbb77575d15131b722be" - }, - { - "name" : "https://smarterbitbybit.com/cve-2016-9681-serendipity-cms-xss-vulnerability-in-version-2-0-4/", - "refsource" : "MISC", - "url" : "https://smarterbitbybit.com/cve-2016-9681-serendipity-cms-xss-vulnerability-in-version-2-0-4/" - }, - { - "name" : "95095", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/95095" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Multiple cross-site scripting (XSS) vulnerabilities in Serendipity before 2.0.5 allow remote authenticated users to inject arbitrary web script or HTML via a category or directory name." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/s9y/Serendipity/commit/e2a665e13b7de82a71c9bbb77575d15131b722be", + "refsource": "MISC", + "url": "https://github.com/s9y/Serendipity/commit/e2a665e13b7de82a71c9bbb77575d15131b722be" + }, + { + "name": "95095", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/95095" + }, + { + "name": "https://smarterbitbybit.com/cve-2016-9681-serendipity-cms-xss-vulnerability-in-version-2-0-4/", + "refsource": "MISC", + "url": "https://smarterbitbybit.com/cve-2016-9681-serendipity-cms-xss-vulnerability-in-version-2-0-4/" + } + ] + } +} \ No newline at end of file diff --git a/2016/9xxx/CVE-2016-9957.json b/2016/9xxx/CVE-2016-9957.json index 7ea388b0133..dbbea5d85a7 100644 --- a/2016/9xxx/CVE-2016-9957.json +++ b/2016/9xxx/CVE-2016-9957.json @@ -1,112 +1,112 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2016-9957", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Stack-based buffer overflow in game-music-emu before 0.6.1." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "security@debian.org", + "ID": "CVE-2016-9957", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "[oss-security] 20161215 Re: CVE Request: Game Music Emulators: incorrect emulation of the SPC700 audio co-processor of SNES: arbitrary code execution via malformed SPC music file", - "refsource" : "MLIST", - "url" : "http://www.openwall.com/lists/oss-security/2016/12/15/11" - }, - { - "name" : "https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html", - "refsource" : "MISC", - "url" : "https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html" - }, - { - "name" : "https://bitbucket.org/mpyne/game-music-emu/wiki/Home", - "refsource" : "CONFIRM", - "url" : "https://bitbucket.org/mpyne/game-music-emu/wiki/Home" - }, - { - "name" : "FEDORA-2016-04383482b4", - "refsource" : "FEDORA", - "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LKMKVYS7AVB2EXC463FUYN6C6FABHME/" - }, - { - "name" : "FEDORA-2016-fbf9f8b204", - "refsource" : "FEDORA", - "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGHAQI5Q2XDSPGRRKPJJM3A73VWAFSFL/" - }, - { - "name" : "FEDORA-2017-3d771a1702", - "refsource" : "FEDORA", - "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFKIFSFIDXOKFUKAH2MBNXDTY6DYBF6/" - }, - { - "name" : "FEDORA-2017-5bf9a268df", - "refsource" : "FEDORA", - "url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7Z2OVERYM6NW3FGVGTJUNSL5ZNFSH2S/" - }, - { - "name" : "GLSA-201707-02", - "refsource" : "GENTOO", - "url" : "https://security.gentoo.org/glsa/201707-02" - }, - { - "name" : "SUSE-SA:2016:3250", - "refsource" : "SUSE", - "url" : "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" - }, - { - "name" : "openSUSE-SA:2017:0022", - "refsource" : "SUSE", - "url" : "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" - }, - { - "name" : "95305", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/95305" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Stack-based buffer overflow in game-music-emu before 0.6.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "SUSE-SA:2016:3250", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" + }, + { + "name": "FEDORA-2016-fbf9f8b204", + "refsource": "FEDORA", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGHAQI5Q2XDSPGRRKPJJM3A73VWAFSFL/" + }, + { + "name": "95305", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/95305" + }, + { + "name": "[oss-security] 20161215 Re: CVE Request: Game Music Emulators: incorrect emulation of the SPC700 audio co-processor of SNES: arbitrary code execution via malformed SPC music file", + "refsource": "MLIST", + "url": "http://www.openwall.com/lists/oss-security/2016/12/15/11" + }, + { + "name": "https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html", + "refsource": "MISC", + "url": "https://scarybeastsecurity.blogspot.in/2016/12/redux-compromising-linux-using-snes.html" + }, + { + "name": "GLSA-201707-02", + "refsource": "GENTOO", + "url": "https://security.gentoo.org/glsa/201707-02" + }, + { + "name": "FEDORA-2017-5bf9a268df", + "refsource": "FEDORA", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7Z2OVERYM6NW3FGVGTJUNSL5ZNFSH2S/" + }, + { + "name": "https://bitbucket.org/mpyne/game-music-emu/wiki/Home", + "refsource": "CONFIRM", + "url": "https://bitbucket.org/mpyne/game-music-emu/wiki/Home" + }, + { + "name": "FEDORA-2016-04383482b4", + "refsource": "FEDORA", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LKMKVYS7AVB2EXC463FUYN6C6FABHME/" + }, + { + "name": "FEDORA-2017-3d771a1702", + "refsource": "FEDORA", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHFKIFSFIDXOKFUKAH2MBNXDTY6DYBF6/" + }, + { + "name": "openSUSE-SA:2017:0022", + "refsource": "SUSE", + "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" + } + ] + } +} \ No newline at end of file diff --git a/2016/9xxx/CVE-2016-9990.json b/2016/9xxx/CVE-2016-9990.json index e8825a1dff9..ae609e25843 100644 --- a/2016/9xxx/CVE-2016-9990.json +++ b/2016/9xxx/CVE-2016-9990.json @@ -1,105 +1,105 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "ID" : "CVE-2016-9990", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "iNotes", - "version" : { - "version_data" : [ - { - "version_value" : "9.0" - }, - { - "version_value" : "8.5.3" - }, - { - "version_value" : "8.5.2" - }, - { - "version_value" : "8.5.1" - }, - { - "version_value" : "8.5" - }, - { - "version_value" : "8.0.2" - }, - { - "version_value" : "8.5.3.6" - }, - { - "version_value" : "9.0.1" - }, - { - "version_value" : "8.58.5.3" - }, - { - "version_value" : "8.5.1.5" - }, - { - "version_value" : "8.5.2.4" - }, - { - "version_value" : "9.0.1.7" - } - ] - } - } - ] - }, - "vendor_name" : "IBM Corporation" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM iNotes 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998824." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Cross-Site Scripting" - } + "CVE_data_meta": { + "ASSIGNER": "psirt@us.ibm.com", + "ID": "CVE-2016-9990", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "iNotes", + "version": { + "version_data": [ + { + "version_value": "9.0" + }, + { + "version_value": "8.5.3" + }, + { + "version_value": "8.5.2" + }, + { + "version_value": "8.5.1" + }, + { + "version_value": "8.5" + }, + { + "version_value": "8.0.2" + }, + { + "version_value": "8.5.3.6" + }, + { + "version_value": "9.0.1" + }, + { + "version_value": "8.58.5.3" + }, + { + "version_value": "8.5.1.5" + }, + { + "version_value": "8.5.2.4" + }, + { + "version_value": "9.0.1.7" + } + ] + } + } + ] + }, + "vendor_name": "IBM Corporation" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.ibm.com/support/docview.wss?uid=swg21998824", - "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=swg21998824" - }, - { - "name" : "97151", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/97151" - }, - { - "name" : "1038145", - "refsource" : "SECTRACK", - "url" : "http://www.securitytracker.com/id/1038145" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "IBM iNotes 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM Reference #: 1998824." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Scripting" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "1038145", + "refsource": "SECTRACK", + "url": "http://www.securitytracker.com/id/1038145" + }, + { + "name": "http://www.ibm.com/support/docview.wss?uid=swg21998824", + "refsource": "CONFIRM", + "url": "http://www.ibm.com/support/docview.wss?uid=swg21998824" + }, + { + "name": "97151", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/97151" + } + ] + } +} \ No newline at end of file diff --git a/2019/1003xxx/CVE-2019-1003023.json b/2019/1003xxx/CVE-2019-1003023.json index de4fe491ec2..96976419227 100644 --- a/2019/1003xxx/CVE-2019-1003023.json +++ b/2019/1003xxx/CVE-2019-1003023.json @@ -1,64 +1,64 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "kurt@seifried.org", - "DATE_ASSIGNED" : "2019-02-06T02:59:03.182072", - "ID" : "CVE-2019-1003023", - "REQUESTER" : "ml@beckweb.net", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Jenkins Warnings Next Generation Plugin", - "version" : { - "version_data" : [ - { - "version_value" : "1.0.1 and earlier" - } - ] - } - } - ] - }, - "vendor_name" : "Jenkins project" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "CWE-79" - } + "CVE_data_meta": { + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "DATE_ASSIGNED": "2019-02-06T02:59:03.182072", + "ID": "CVE-2019-1003023", + "REQUESTER": "ml@beckweb.net", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Jenkins Warnings Next Generation Plugin", + "version": { + "version_data": [ + { + "version_value": "1.0.1 and earlier" + } + ] + } + } + ] + }, + "vendor_name": "Jenkins project" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1271", - "refsource" : "CONFIRM", - "url" : "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1271" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1271", + "refsource": "CONFIRM", + "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1271" + } + ] + } +} \ No newline at end of file diff --git a/2019/2xxx/CVE-2019-2117.json b/2019/2xxx/CVE-2019-2117.json index 4f21846b3a9..2360f417090 100644 --- a/2019/2xxx/CVE-2019-2117.json +++ b/2019/2xxx/CVE-2019-2117.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-2117", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-2117", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/2xxx/CVE-2019-2490.json b/2019/2xxx/CVE-2019-2490.json index 335b399d861..dbde7d71f73 100644 --- a/2019/2xxx/CVE-2019-2490.json +++ b/2019/2xxx/CVE-2019-2490.json @@ -1,76 +1,76 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "secalert_us@oracle.com", - "ID" : "CVE-2019-2490", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "PeopleSoft Enterprise PT PeopleTools", - "version" : { - "version_data" : [ - { - "version_affected" : "=", - "version_value" : "8.55" - }, - { - "version_affected" : "=", - "version_value" : "8.56" - }, - { - "version_affected" : "=", - "version_value" : "8.57" - } - ] - } - } - ] - }, - "vendor_name" : "Oracle Corporation" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Panel Processor). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data." - } + "CVE_data_meta": { + "ASSIGNER": "secalert_us@oracle.com", + "ID": "CVE-2019-2490", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "PeopleSoft Enterprise PT PeopleTools", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.55" + }, + { + "version_affected": "=", + "version_value": "8.56" + }, + { + "version_affected": "=", + "version_value": "8.57" + } + ] + } + } + ] + }, + "vendor_name": "Oracle Corporation" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", - "refsource" : "CONFIRM", - "url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" - }, - { - "name" : "106592", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/106592" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Panel Processor). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", + "refsource": "CONFIRM", + "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" + }, + { + "name": "106592", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/106592" + } + ] + } +} \ No newline at end of file diff --git a/2019/2xxx/CVE-2019-2821.json b/2019/2xxx/CVE-2019-2821.json index a702e05eef7..e6a5e524911 100644 --- a/2019/2xxx/CVE-2019-2821.json +++ b/2019/2xxx/CVE-2019-2821.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-2821", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-2821", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/2xxx/CVE-2019-2884.json b/2019/2xxx/CVE-2019-2884.json index 86906bfacfe..48a3da4e433 100644 --- a/2019/2xxx/CVE-2019-2884.json +++ b/2019/2xxx/CVE-2019-2884.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-2884", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-2884", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3385.json b/2019/3xxx/CVE-2019-3385.json index 0db306c80e1..d541c4de267 100644 --- a/2019/3xxx/CVE-2019-3385.json +++ b/2019/3xxx/CVE-2019-3385.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-3385", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-3385", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3839.json b/2019/3xxx/CVE-2019-3839.json index 28c3485101b..c80d13b468f 100644 --- a/2019/3xxx/CVE-2019-3839.json +++ b/2019/3xxx/CVE-2019-3839.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-3839", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-3839", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6122.json b/2019/6xxx/CVE-2019-6122.json index 33ab5784d62..d919964eed9 100644 --- a/2019/6xxx/CVE-2019-6122.json +++ b/2019/6xxx/CVE-2019-6122.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-6122", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-6122", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6204.json b/2019/6xxx/CVE-2019-6204.json index c2e78a379d2..2b343ab263f 100644 --- a/2019/6xxx/CVE-2019-6204.json +++ b/2019/6xxx/CVE-2019-6204.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-6204", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-6204", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6610.json b/2019/6xxx/CVE-2019-6610.json index a144ba15b4a..d01816c186d 100644 --- a/2019/6xxx/CVE-2019-6610.json +++ b/2019/6xxx/CVE-2019-6610.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-6610", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-6610", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6625.json b/2019/6xxx/CVE-2019-6625.json index dceb0d957cd..45d0e63ed0a 100644 --- a/2019/6xxx/CVE-2019-6625.json +++ b/2019/6xxx/CVE-2019-6625.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-6625", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-6625", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7140.json b/2019/7xxx/CVE-2019-7140.json index 994ddf88407..8074ace8f92 100644 --- a/2019/7xxx/CVE-2019-7140.json +++ b/2019/7xxx/CVE-2019-7140.json @@ -1,18 +1,18 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-7140", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } -} + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-7140", + "STATE": "RESERVED" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7150.json b/2019/7xxx/CVE-2019-7150.json index dde4c78de83..18bc76d46d2 100644 --- a/2019/7xxx/CVE-2019-7150.json +++ b/2019/7xxx/CVE-2019-7150.json @@ -1,72 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-7150", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-7150", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "[debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update", - "refsource" : "MLIST", - "url" : "https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html" - }, - { - "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24103", - "refsource" : "MISC", - "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=24103" - }, - { - "name" : "https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html", - "refsource" : "MISC", - "url" : "https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24103", + "refsource": "MISC", + "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24103" + }, + { + "name": "[debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update", + "refsource": "MLIST", + "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html" + }, + { + "name": "https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html", + "refsource": "MISC", + "url": "https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7581.json b/2019/7xxx/CVE-2019-7581.json index b7b739a980c..b3c4049490d 100644 --- a/2019/7xxx/CVE-2019-7581.json +++ b/2019/7xxx/CVE-2019-7581.json @@ -1,62 +1,62 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2019-7581", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The parseSWF_ACTIONRECORD function in util/parser.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure, a different vulnerability than CVE-2018-7876." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-7581", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "https://github.com/libming/libming/issues/173", - "refsource" : "MISC", - "url" : "https://github.com/libming/libming/issues/173" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The parseSWF_ACTIONRECORD function in util/parser.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure, a different vulnerability than CVE-2018-7876." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/libming/libming/issues/173", + "refsource": "MISC", + "url": "https://github.com/libming/libming/issues/173" + } + ] + } +} \ No newline at end of file