"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 23:38:30 +00:00
parent 55fe2a33a7
commit bc8882783b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
59 changed files with 4845 additions and 4845 deletions

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-1999-1474", "ID": "CVE-1999-1474",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer." "value": "PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.microsoft.com/windows/ie/security/powerpoint.asp", "name": "nt-ppt-patch(179)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.microsoft.com/windows/ie/security/powerpoint.asp" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/179"
}, },
{ {
"name" : "nt-ppt-patch(179)", "name": "http://www.microsoft.com/windows/ie/security/powerpoint.asp",
"refsource" : "XF", "refsource": "CONFIRM",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/179" "url": "http://www.microsoft.com/windows/ie/security/powerpoint.asp"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2000-1077", "ID": "CVE-2000-1077",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer overflow in the SHTML logging functionality of iPlanet Web Server 4.x allows remote attackers to execute arbitrary commands via a long filename with a .shtml extension." "value": "Buffer overflow in the SHTML logging functionality of iPlanet Web Server 4.x allows remote attackers to execute arbitrary commands via a long filename with a .shtml extension."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20001026 Buffer overflow in iPlanet Web Server 4 server side SHTML parsing module", "name": "20001026 Buffer overflow in iPlanet Web Server 4 server side SHTML parsing module",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/141435" "url": "http://www.securityfocus.com/archive/1/141435"
}, },
{ {
"name" : "iplanet-web-server-shtml-bo(5446)", "name": "iplanet-web-server-shtml-bo(5446)",
"refsource" : "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5446" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5446"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2000-1194", "ID": "CVE-2000-1194",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Argosoft FRP server 1.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to the (1) USER or (2) CWD commands." "value": "Argosoft FRP server 1.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to the (1) USER or (2) CWD commands."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.mdma.za.net/fk/FK9.zip", "name": "http://www.mdma.za.net/fk/FK9.zip",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.mdma.za.net/fk/FK9.zip" "url": "http://www.mdma.za.net/fk/FK9.zip"
}, },
{ {
"name" : "1227", "name": "1227",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/1227" "url": "http://www.securityfocus.com/bid/1227"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-0132", "ID": "CVE-2005-0132",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-2254", "ID": "CVE-2005-2254",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in PhpAuction 2.5 allow remote attackers to inject arbitrary web script or HTML via the lan parameter to (1) index.php or (2) admin/index.php, or (3) the auction_id parameter to profile.php. NOTE: there is evidence that viewnews.php and login.php may not be part of the PhpAuction product, so they are not included in this description." "value": "Multiple cross-site scripting (XSS) vulnerabilities in PhpAuction 2.5 allow remote attackers to inject arbitrary web script or HTML via the lan parameter to (1) index.php or (2) admin/index.php, or (3) the auction_id parameter to profile.php. NOTE: there is evidence that viewnews.php and login.php may not be part of the PhpAuction product, so they are not included in this description."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "1014423", "name": "1014423",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://securitytracker.com/id?1014423" "url": "http://securitytracker.com/id?1014423"
}, },
{ {
"name" : "15967", "name": "15967",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/15967" "url": "http://secunia.com/advisories/15967"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-2275", "ID": "CVE-2005-2275",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-2566", "ID": "CVE-2005-2566",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple SQL injection vulnerabilities in Open Bulletin Board (OpenBB) allow remote attackers to execute arbitrary SQL commands via the (1) FID parameter to board.php or (2) UID parameter to member.php." "value": "Multiple SQL injection vulnerabilities in Open Bulletin Board (OpenBB) allow remote attackers to execute arbitrary SQL commands via the (1) FID parameter to board.php or (2) UID parameter to member.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20050808 SQL IN Open Bulletin Board", "name": "20050808 SQL IN Open Bulletin Board",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=112351834624072&w=2" "url": "http://marc.info/?l=bugtraq&m=112351834624072&w=2"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-2725", "ID": "CVE-2005-2725",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The inputtrap utility in QNX RTOS 6.1.0, 6.3, and possibly earlier versions does not properly check permissions when the -t flag is specified, which allows local users to read arbitrary files." "value": "The inputtrap utility in QNX RTOS 6.1.0, 6.3, and possibly earlier versions does not properly check permissions when the -t flag is specified, which allows local users to read arbitrary files."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20050824 [RLSA_01-2005] QNX inputtrap arbitrary file read vulnerability", "name": "16569",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=112490406301882&w=2" "url": "http://secunia.com/advisories/16569/"
}, },
{ {
"name" : "http://www.rfdslabs.com.br/advisories/qnx-advs-01-2005.txt", "name": "14656",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://www.rfdslabs.com.br/advisories/qnx-advs-01-2005.txt" "url": "http://www.securityfocus.com/bid/14656"
}, },
{ {
"name" : "14656", "name": "http://www.rfdslabs.com.br/advisories/qnx-advs-01-2005.txt",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/14656" "url": "http://www.rfdslabs.com.br/advisories/qnx-advs-01-2005.txt"
}, },
{ {
"name" : "16569", "name": "qnx-inputtrap-obtain-information(21969)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/16569/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21969"
}, },
{ {
"name" : "qnx-inputtrap-obtain-information(21969)", "name": "20050824 [RLSA_01-2005] QNX inputtrap arbitrary file read vulnerability",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/21969" "url": "http://marc.info/?l=bugtraq&m=112490406301882&w=2"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-2814", "ID": "CVE-2005-2814",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in FlatNuke 2.5.6 allows remote attackers to inject arbitrary web script or HTML via the usr parameter in a vis_reg operation to index.php." "value": "Cross-site scripting (XSS) vulnerability in FlatNuke 2.5.6 allows remote attackers to inject arbitrary web script or HTML via the usr parameter in a vis_reg operation to index.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20050830 Flatnuke 2.5.6 (possibly prior versions) Underlying system information disclosure / Administrative & users credentials disclosure", "name": "flatnuke-indexphp-xss(22101)",
"refsource" : "BUGTRAQ", "refsource": "XF",
"url" : "http://seclists.org/lists/bugtraq/2005/Aug/0440.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22101"
}, },
{ {
"name" : "14704", "name": "1014824",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/14704" "url": "http://securitytracker.com/id?1014824"
}, },
{ {
"name" : "1014824", "name": "20050830 Flatnuke 2.5.6 (possibly prior versions) Underlying system information disclosure / Administrative & users credentials disclosure",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://securitytracker.com/id?1014824" "url": "http://seclists.org/lists/bugtraq/2005/Aug/0440.html"
}, },
{ {
"name" : "flatnuke-indexphp-xss(22101)", "name": "14704",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22101" "url": "http://www.securityfocus.com/bid/14704"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-3032", "ID": "CVE-2005-3032",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer overflow in vxTftpSrv 1.7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TFTP request with a long filename argument." "value": "Buffer overflow in vxTftpSrv 1.7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TFTP request with a long filename argument."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.airscanner.com/security/05081203_vxtftpsrv.htm", "name": "14842",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://www.airscanner.com/security/05081203_vxtftpsrv.htm" "url": "http://www.securityfocus.com/bid/14842"
}, },
{ {
"name" : "14842", "name": "http://www.airscanner.com/security/05081203_vxtftpsrv.htm",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/14842" "url": "http://www.airscanner.com/security/05081203_vxtftpsrv.htm"
}, },
{ {
"name" : "1014912", "name": "1014912",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://securitytracker.com/id?1014912" "url": "http://securitytracker.com/id?1014912"
}, },
{ {
"name" : "16840", "name": "16840",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/16840" "url": "http://secunia.com/advisories/16840"
} }
] ]
} }

View File

@ -1,106 +1,106 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-3051", "ID": "CVE-2005-3051",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Stack-based buffer overflow in the ARJ plugin (arj.dll) 3.9.2.0 for 7-Zip 3.13, 4.23, and 4.26 BETA, as used in products including Turbo Searcher, allows remote attackers to execute arbitrary code via a large ARJ block." "value": "Stack-based buffer overflow in the ARJ plugin (arj.dll) 3.9.2.0 for 7-Zip 3.13, 4.23, and 4.26 BETA, as used in products including Turbo Searcher, allows remote attackers to execute arbitrary code via a large ARJ block."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20050923 Secunia Research: 7-Zip ARJ Archive Handling Buffer Overflow", "name": "14925",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://marc.info/?l=bugtraq&m=112749134603258&w=2" "url": "http://www.securityfocus.com/bid/14925"
}, },
{ {
"name" : "http://secunia.com/secunia_research/2005-45/advisory/", "name": "http://secunia.com/secunia_research/2005-45/advisory/",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://secunia.com/secunia_research/2005-45/advisory/" "url": "http://secunia.com/secunia_research/2005-45/advisory/"
}, },
{ {
"name" : "http://www.vuln.sg/turbosearcher330-en.html", "name": "turbo-searcher-arj-bo(30438)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://www.vuln.sg/turbosearcher330-en.html" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30438"
}, },
{ {
"name" : "14925", "name": "ADV-2006-4603",
"refsource" : "BID", "refsource": "VUPEN",
"url" : "http://www.securityfocus.com/bid/14925" "url": "http://www.vupen.com/english/advisories/2006/4603"
}, },
{ {
"name" : "21208", "name": "1017261",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/21208" "url": "http://securitytracker.com/id?1017261"
}, },
{ {
"name" : "ADV-2006-4603", "name": "http://www.vuln.sg/turbosearcher330-en.html",
"refsource" : "VUPEN", "refsource": "MISC",
"url" : "http://www.vupen.com/english/advisories/2006/4603" "url": "http://www.vuln.sg/turbosearcher330-en.html"
}, },
{ {
"name" : "1017261", "name": "21208",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://securitytracker.com/id?1017261" "url": "http://www.securityfocus.com/bid/21208"
}, },
{ {
"name" : "16664", "name": "23004",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/16664/" "url": "http://secunia.com/advisories/23004"
}, },
{ {
"name" : "23004", "name": "16664",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/23004" "url": "http://secunia.com/advisories/16664/"
}, },
{ {
"name" : "turbo-searcher-arj-bo(30438)", "name": "20050923 Secunia Research: 7-Zip ARJ Archive Handling Buffer Overflow",
"refsource" : "XF", "refsource": "BUGTRAQ",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/30438" "url": "http://marc.info/?l=bugtraq&m=112749134603258&w=2"
} }
] ]
} }

View File

@ -1,611 +1,611 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-3193", "ID": "CVE-2005-3193",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated." "value": "Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051205 Multiple Vendor xpdf JPX Stream Reader Heap Overflow Vulnerability", "name": "17959",
"refsource" : "IDEFENSE", "refsource": "SECUNIA",
"url" : "http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true" "url": "http://secunia.com/advisories/17959"
}, },
{ {
"name" : "20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice", "name": "17929",
"refsource" : "BUGTRAQ", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/archive/1/418883/100/0/threaded" "url": "http://secunia.com/advisories/17929"
}, },
{ {
"name" : "http://www.kde.org/info/security/advisory-20051207-1.txt", "name": "19797",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.kde.org/info/security/advisory-20051207-1.txt" "url": "http://secunia.com/advisories/19797"
}, },
{ {
"name" : "http://www.kde.org/info/security/advisory-20051207-2.txt", "name": "SCOSA-2006.20",
"refsource" : "CONFIRM", "refsource": "SCO",
"url" : "http://www.kde.org/info/security/advisory-20051207-2.txt" "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt"
}, },
{ {
"name" : "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html", "name": "DSA-932",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html" "url": "http://www.debian.org/security/2005/dsa-932"
}, },
{ {
"name" : "https://issues.rpath.com/browse/RPL-1609", "name": "18349",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://issues.rpath.com/browse/RPL-1609" "url": "http://secunia.com/advisories/18349"
}, },
{ {
"name" : "DSA-931", "name": "18147",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2005/dsa-931" "url": "http://secunia.com/advisories/18147"
}, },
{ {
"name" : "DSA-932", "name": "SCOSA-2006.15",
"refsource" : "DEBIAN", "refsource": "SCO",
"url" : "http://www.debian.org/security/2005/dsa-932" "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt"
}, },
{ {
"name" : "DSA-937", "name": "18055",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2005/dsa-937" "url": "http://secunia.com/advisories/18055"
}, },
{ {
"name" : "DSA-938", "name": "http://www.kde.org/info/security/advisory-20051207-1.txt",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2005/dsa-938" "url": "http://www.kde.org/info/security/advisory-20051207-1.txt"
}, },
{ {
"name" : "DSA-940", "name": "http://www.kde.org/info/security/advisory-20051207-2.txt",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2005/dsa-940" "url": "http://www.kde.org/info/security/advisory-20051207-2.txt"
}, },
{ {
"name" : "DSA-936", "name": "18679",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2006/dsa-936" "url": "http://secunia.com/advisories/18679"
}, },
{ {
"name" : "DSA-950", "name": "18189",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2006/dsa-950" "url": "http://secunia.com/advisories/18189"
}, },
{ {
"name" : "DSA-961", "name": "26413",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2006/dsa-961" "url": "http://secunia.com/advisories/26413"
}, },
{ {
"name" : "DSA-962", "name": "17940",
"refsource" : "DEBIAN", "refsource": "SECUNIA",
"url" : "http://www.debian.org/security/2006/dsa-962" "url": "http://secunia.com/advisories/17940"
}, },
{ {
"name" : "FEDORA-2005-1141", "name": "18303",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html" "url": "http://secunia.com/advisories/18303"
}, },
{ {
"name" : "FEDORA-2005-1142", "name": "DSA-931",
"refsource" : "FEDORA", "refsource": "DEBIAN",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html" "url": "http://www.debian.org/security/2005/dsa-931"
}, },
{ {
"name" : "FEDORA-2005-1125", "name": "18554",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html" "url": "http://secunia.com/advisories/18554"
}, },
{ {
"name" : "FEDORA-2005-1126", "name": "MDKSA-2006:003",
"refsource" : "FEDORA", "refsource": "MANDRIVA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003"
}, },
{ {
"name" : "FEDORA-2005-1127", "name": "19230",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html" "url": "http://secunia.com/advisories/19230"
}, },
{ {
"name" : "FEDORA-2005-1132", "name": "102972",
"refsource" : "FEDORA", "refsource": "SUNALERT",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1"
}, },
{ {
"name" : "FEDORA-2005-1171", "name": "MDKSA-2006:012",
"refsource" : "FEDORA", "refsource": "MANDRIVA",
"url" : "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012"
}, },
{ {
"name" : "FLSA:175404", "name": "DSA-962",
"refsource" : "FEDORA", "refsource": "DEBIAN",
"url" : "http://www.securityfocus.com/archive/1/427990/100/0/threaded" "url": "http://www.debian.org/security/2006/dsa-962"
}, },
{ {
"name" : "FLSA-2006:176751", "name": "FEDORA-2005-1171",
"refsource" : "FEDORA", "refsource": "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/427053/100/0/threaded" "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00073.html"
}, },
{ {
"name" : "GLSA-200512-08", "name": "1015309",
"refsource" : "GENTOO", "refsource": "SECTRACK",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml" "url": "http://securitytracker.com/id?1015309"
}, },
{ {
"name" : "GLSA-200601-02", "name": "DSA-937",
"refsource" : "GENTOO", "refsource": "DEBIAN",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml" "url": "http://www.debian.org/security/2005/dsa-937"
}, },
{ {
"name" : "GLSA-200603-02", "name": "18398",
"refsource" : "GENTOO", "refsource": "SECUNIA",
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml" "url": "http://secunia.com/advisories/18398"
}, },
{ {
"name" : "MDKSA-2006:010", "name": "FLSA-2006:176751",
"refsource" : "MANDRAKE", "refsource": "FEDORA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010" "url": "http://www.securityfocus.com/archive/1/427053/100/0/threaded"
}, },
{ {
"name" : "MDKSA-2006:003", "name": "15721",
"refsource" : "MANDRIVA", "refsource": "BID",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003" "url": "http://www.securityfocus.com/bid/15721"
}, },
{ {
"name" : "MDKSA-2006:004", "name": "SUSE-SA:2006:001",
"refsource" : "MANDRIVA", "refsource": "SUSE",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004" "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html"
}, },
{ {
"name" : "MDKSA-2006:005", "name": "DSA-936",
"refsource" : "MANDRIVA", "refsource": "DEBIAN",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005" "url": "http://www.debian.org/security/2006/dsa-936"
}, },
{ {
"name" : "MDKSA-2006:006", "name": "17916",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006" "url": "http://secunia.com/advisories/17916"
}, },
{ {
"name" : "MDKSA-2006:008", "name": "236",
"refsource" : "MANDRIVA", "refsource": "SREASON",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008" "url": "http://securityreason.com/securityalert/236"
}, },
{ {
"name" : "MDKSA-2006:012", "name": "GLSA-200603-02",
"refsource" : "MANDRIVA", "refsource": "GENTOO",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012" "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-02.xml"
}, },
{ {
"name" : "MDKSA-2006:011", "name": "RHSA-2005:840",
"refsource" : "MANDRIVA", "refsource": "REDHAT",
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011" "url": "http://www.redhat.com/support/errata/RHSA-2005-840.html"
}, },
{ {
"name" : "RHSA-2005:840", "name": "ADV-2005-2789",
"refsource" : "REDHAT", "refsource": "VUPEN",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-840.html" "url": "http://www.vupen.com/english/advisories/2005/2789"
}, },
{ {
"name" : "RHSA-2005:867", "name": "RHSA-2005:867",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-867.html" "url": "http://www.redhat.com/support/errata/RHSA-2005-867.html"
}, },
{ {
"name" : "RHSA-2005:878", "name": "18674",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/support/errata/RHSA-2005-878.html" "url": "http://secunia.com/advisories/18674"
}, },
{ {
"name" : "RHSA-2005:868", "name": "MDKSA-2006:005",
"refsource" : "REDHAT", "refsource": "MANDRIVA",
"url" : "http://rhn.redhat.com/errata/RHSA-2005-868.html" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005"
}, },
{ {
"name" : "RHSA-2006:0160", "name": "18313",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0160.html" "url": "http://secunia.com/advisories/18313"
}, },
{ {
"name" : "SCOSA-2006.15", "name": "https://issues.rpath.com/browse/RPL-1609",
"refsource" : "SCO", "refsource": "CONFIRM",
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt" "url": "https://issues.rpath.com/browse/RPL-1609"
}, },
{ {
"name" : "SCOSA-2006.20", "name": "RHSA-2005:868",
"refsource" : "SCO", "refsource": "REDHAT",
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt" "url": "http://rhn.redhat.com/errata/RHSA-2005-868.html"
}, },
{ {
"name" : "SCOSA-2006.21", "name": "20051201-01-U",
"refsource" : "SCO", "refsource": "SGI",
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt" "url": "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U"
}, },
{ {
"name" : "20051201-01-U", "name": "20060101-01-U",
"refsource" : "SGI", "refsource": "SGI",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U" "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U"
}, },
{ {
"name" : "20060101-01-U", "name": "18448",
"refsource" : "SGI", "refsource": "SECUNIA",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" "url": "http://secunia.com/advisories/18448"
}, },
{ {
"name" : "20060201-01-U", "name": "18380",
"refsource" : "SGI", "refsource": "SECUNIA",
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U" "url": "http://secunia.com/advisories/18380"
}, },
{ {
"name" : "SSA:2006-045-04", "name": "GLSA-200512-08",
"refsource" : "SLACKWARE", "refsource": "GENTOO",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747" "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml"
}, },
{ {
"name" : "SSA:2006-045-09", "name": "FEDORA-2005-1126",
"refsource" : "SLACKWARE", "refsource": "FEDORA",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683" "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html"
}, },
{ {
"name" : "102972", "name": "18416",
"refsource" : "SUNALERT", "refsource": "SECUNIA",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1" "url": "http://secunia.com/advisories/18416"
}, },
{ {
"name" : "SUSE-SA:2006:001", "name": "FEDORA-2005-1132",
"refsource" : "SUSE", "refsource": "FEDORA",
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html" "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00022.html"
}, },
{ {
"name" : "SUSE-SR:2005:029", "name": "ADV-2007-2280",
"refsource" : "SUSE", "refsource": "VUPEN",
"url" : "http://www.novell.com/linux/security/advisories/2005_29_sr.html" "url": "http://www.vupen.com/english/advisories/2007/2280"
}, },
{ {
"name" : "TSLSA-2005-0072", "name": "GLSA-200601-02",
"refsource" : "TRUSTIX", "refsource": "GENTOO",
"url" : "http://www.trustix.org/errata/2005/0072/" "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml"
}, },
{ {
"name" : "USN-227-1", "name": "19125",
"refsource" : "UBUNTU", "refsource": "SECUNIA",
"url" : "http://www.ubuntulinux.org/usn/usn-227-1" "url": "http://secunia.com/advisories/19125"
}, },
{ {
"name" : "15721", "name": "xpdf-jpx-stream-bo(23441)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/15721" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23441"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11440", "name": "FEDORA-2005-1142",
"refsource" : "OVAL", "refsource": "FEDORA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440" "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html"
}, },
{ {
"name" : "ADV-2005-2789", "name": "18336",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2005/2789" "url": "http://secunia.com/advisories/18336"
}, },
{ {
"name" : "ADV-2005-2790", "name": "18061",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2005/2790" "url": "http://secunia.com/advisories/18061"
}, },
{ {
"name" : "ADV-2005-2856", "name": "18407",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2005/2856" "url": "http://secunia.com/advisories/18407"
}, },
{ {
"name" : "ADV-2005-2787", "name": "18009",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2005/2787" "url": "http://secunia.com/advisories/18009"
}, },
{ {
"name" : "ADV-2007-2280", "name": "USN-227-1",
"refsource" : "VUPEN", "refsource": "UBUNTU",
"url" : "http://www.vupen.com/english/advisories/2007/2280" "url": "http://www.ubuntulinux.org/usn/usn-227-1"
}, },
{ {
"name" : "1015309", "name": "17897",
"refsource" : "SECTRACK", "refsource": "SECUNIA",
"url" : "http://securitytracker.com/id?1015309" "url": "http://secunia.com/advisories/17897"
}, },
{ {
"name" : "1015324", "name": "18517",
"refsource" : "SECTRACK", "refsource": "SECUNIA",
"url" : "http://securitytracker.com/id?1015324" "url": "http://secunia.com/advisories/18517"
}, },
{ {
"name" : "17912", "name": "18582",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17912" "url": "http://secunia.com/advisories/18582"
}, },
{ {
"name" : "17916", "name": "18534",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17916" "url": "http://secunia.com/advisories/18534"
}, },
{ {
"name" : "17920", "name": "SSA:2006-045-09",
"refsource" : "SECUNIA", "refsource": "SLACKWARE",
"url" : "http://secunia.com/advisories/17920" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683"
}, },
{ {
"name" : "17929", "name": "TSLSA-2005-0072",
"refsource" : "SECUNIA", "refsource": "TRUSTIX",
"url" : "http://secunia.com/advisories/17929" "url": "http://www.trustix.org/errata/2005/0072/"
}, },
{ {
"name" : "17940", "name": "18520",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17940" "url": "http://secunia.com/advisories/18520"
}, },
{ {
"name" : "17976", "name": "FEDORA-2005-1127",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/17976" "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html"
}, },
{ {
"name" : "18009", "name": "20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/18009" "url": "http://www.securityfocus.com/archive/1/418883/100/0/threaded"
}, },
{ {
"name" : "18055", "name": "18908",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18055" "url": "http://secunia.com/advisories/18908"
}, },
{ {
"name" : "18061", "name": "25729",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18061" "url": "http://secunia.com/advisories/25729"
}, },
{ {
"name" : "17897", "name": "MDKSA-2006:006",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/17897" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006"
}, },
{ {
"name" : "17926", "name": "17956",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17926" "url": "http://secunia.com/advisories/17956"
}, },
{ {
"name" : "18191", "name": "17926",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18191" "url": "http://secunia.com/advisories/17926"
}, },
{ {
"name" : "18192", "name": "19798",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18192" "url": "http://secunia.com/advisories/19798"
}, },
{ {
"name" : "18189", "name": "MDKSA-2006:008",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/18189" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008"
}, },
{ {
"name" : "18313", "name": "18191",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18313" "url": "http://secunia.com/advisories/18191"
}, },
{ {
"name" : "18336", "name": "20060201-01-U",
"refsource" : "SECUNIA", "refsource": "SGI",
"url" : "http://secunia.com/advisories/18336" "url": "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U"
}, },
{ {
"name" : "18387", "name": "RHSA-2006:0160",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/18387" "url": "http://www.redhat.com/support/errata/RHSA-2006-0160.html"
}, },
{ {
"name" : "18416", "name": "17912",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18416" "url": "http://secunia.com/advisories/17912"
}, },
{ {
"name" : "18349", "name": "MDKSA-2006:010",
"refsource" : "SECUNIA", "refsource": "MANDRAKE",
"url" : "http://secunia.com/advisories/18349" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010"
}, },
{ {
"name" : "18385", "name": "DSA-940",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/18385" "url": "http://www.debian.org/security/2005/dsa-940"
}, },
{ {
"name" : "18389", "name": "MDKSA-2006:004",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/18389" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004"
}, },
{ {
"name" : "18448", "name": "oval:org.mitre.oval:def:11440",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/18448" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11440"
}, },
{ {
"name" : "18398", "name": "ADV-2005-2790",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/18398" "url": "http://www.vupen.com/english/advisories/2005/2790"
}, },
{ {
"name" : "18407", "name": "20051205 Multiple Vendor xpdf JPX Stream Reader Heap Overflow Vulnerability",
"refsource" : "SECUNIA", "refsource": "IDEFENSE",
"url" : "http://secunia.com/advisories/18407" "url": "http://www.idefense.com/application/poi/display?id=345&type=vulnerabilities&flashstatus=true"
}, },
{ {
"name" : "18534", "name": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/18534" "url": "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00043.html"
}, },
{ {
"name" : "18582", "name": "18389",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18582" "url": "http://secunia.com/advisories/18389"
}, },
{ {
"name" : "18303", "name": "18192",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18303" "url": "http://secunia.com/advisories/18192"
}, },
{ {
"name" : "18517", "name": "ADV-2005-2856",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/18517" "url": "http://www.vupen.com/english/advisories/2005/2856"
}, },
{ {
"name" : "18554", "name": "SSA:2006-045-04",
"refsource" : "SECUNIA", "refsource": "SLACKWARE",
"url" : "http://secunia.com/advisories/18554" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747"
}, },
{ {
"name" : "17955", "name": "19377",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17955" "url": "http://secunia.com/advisories/19377"
}, },
{ {
"name" : "17956", "name": "FLSA:175404",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/17956" "url": "http://www.securityfocus.com/archive/1/427990/100/0/threaded"
}, },
{ {
"name" : "17959", "name": "DSA-961",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/17959" "url": "http://www.debian.org/security/2006/dsa-961"
}, },
{ {
"name" : "18674", "name": "SCOSA-2006.21",
"refsource" : "SECUNIA", "refsource": "SCO",
"url" : "http://secunia.com/advisories/18674" "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt"
}, },
{ {
"name" : "18675", "name": "18675",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18675" "url": "http://secunia.com/advisories/18675"
}, },
{ {
"name" : "18679", "name": "1015324",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/18679" "url": "http://securitytracker.com/id?1015324"
}, },
{ {
"name" : "18908", "name": "18913",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18908" "url": "http://secunia.com/advisories/18913"
}, },
{ {
"name" : "18913", "name": "DSA-938",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/18913" "url": "http://www.debian.org/security/2005/dsa-938"
}, },
{ {
"name" : "19125", "name": "SUSE-SR:2005:029",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/19125" "url": "http://www.novell.com/linux/security/advisories/2005_29_sr.html"
}, },
{ {
"name" : "19230", "name": "ADV-2005-2787",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/19230" "url": "http://www.vupen.com/english/advisories/2005/2787"
}, },
{ {
"name" : "19377", "name": "RHSA-2005:878",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/19377" "url": "http://www.redhat.com/support/errata/RHSA-2005-878.html"
}, },
{ {
"name" : "18147", "name": "FEDORA-2005-1141",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/18147" "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html"
}, },
{ {
"name" : "18380", "name": "17920",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/18380" "url": "http://secunia.com/advisories/17920"
}, },
{ {
"name" : "18520", "name": "DSA-950",
"refsource" : "SECUNIA", "refsource": "DEBIAN",
"url" : "http://secunia.com/advisories/18520" "url": "http://www.debian.org/security/2006/dsa-950"
}, },
{ {
"name" : "19797", "name": "17955",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19797" "url": "http://secunia.com/advisories/17955"
}, },
{ {
"name" : "19798", "name": "17976",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/19798" "url": "http://secunia.com/advisories/17976"
}, },
{ {
"name" : "25729", "name": "18387",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/25729" "url": "http://secunia.com/advisories/18387"
}, },
{ {
"name" : "26413", "name": "FEDORA-2005-1125",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/26413" "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00014.html"
}, },
{ {
"name" : "236", "name": "MDKSA-2006:011",
"refsource" : "SREASON", "refsource": "MANDRIVA",
"url" : "http://securityreason.com/securityalert/236" "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011"
}, },
{ {
"name" : "xpdf-jpx-stream-bo(23441)", "name": "18385",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/23441" "url": "http://secunia.com/advisories/18385"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-3286", "ID": "CVE-2005-3286",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The FWDRV driver in Kerio Personal Firewall 4.2 and Server Firewall 1.1.1 allows local users to cause a denial of service (crash) by setting the PAGE_NOACCESS or PAGE_GUARD protection on the Page Environment Block (PEB), which triggers an exception, aka the \"PEB lockout vulnerability.\"" "value": "The FWDRV driver in Kerio Personal Firewall 4.2 and Server Firewall 1.1.1 allows local users to cause a denial of service (crash) by setting the PAGE_NOACCESS or PAGE_GUARD protection on the Page Environment Block (PEB), which triggers an exception, aka the \"PEB lockout vulnerability.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051013 Kerio Personal Firewall and Kerio Server Firewall FWDRV driver Local Denial of Service", "name": "78",
"refsource" : "FULLDISC", "refsource": "SREASON",
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/037958.html" "url": "http://securityreason.com/securityalert/78"
}, },
{ {
"name" : "20051013 Kerio Personal Firewall and Kerio Server Firewall FWDRV driver Local Denial of Service", "name": "http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://seclists.org/bugtraq/2005/Oct/166" "url": "http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt"
}, },
{ {
"name" : "http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt", "name": "15094",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://pb.specialised.info/all/adv/kerio-fwdrv-dos-adv.txt" "url": "http://www.securityfocus.com/bid/15094"
}, },
{ {
"name" : "http://www.kerio.com/security_advisory.html", "name": "19961",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://www.kerio.com/security_advisory.html" "url": "http://www.osvdb.org/19961"
}, },
{ {
"name" : "15094", "name": "http://www.kerio.com/security_advisory.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/15094" "url": "http://www.kerio.com/security_advisory.html"
}, },
{ {
"name" : "19961", "name": "17155",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://www.osvdb.org/19961" "url": "http://secunia.com/advisories/17155"
}, },
{ {
"name" : "17155", "name": "20051013 Kerio Personal Firewall and Kerio Server Firewall FWDRV driver Local Denial of Service",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/17155" "url": "http://seclists.org/bugtraq/2005/Oct/166"
}, },
{ {
"name" : "78", "name": "20051013 Kerio Personal Firewall and Kerio Server Firewall FWDRV driver Local Denial of Service",
"refsource" : "SREASON", "refsource": "FULLDISC",
"url" : "http://securityreason.com/securityalert/78" "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-October/037958.html"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-3311", "ID": "CVE-2005-3311",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "BMC Software Control-M 6.1.03 for Solaris, and possibly other platforms, allows local users to overwrite arbitrary files via a symlink attack on temporary files." "value": "BMC Software Control-M 6.1.03 for Solaris, and possibly other platforms, allows local users to overwrite arbitrary files via a symlink attack on temporary files."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051022 Insecure Temporary Files in BMC/Control-M Agent", "name": "20051022 Insecure Temporary Files in BMC/Control-M Agent",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=113018286105811&w=2" "url": "http://marc.info/?l=bugtraq&m=113018286105811&w=2"
}, },
{ {
"name" : "15167", "name": "1015096",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/15167" "url": "http://securitytracker.com/id?1015096"
}, },
{ {
"name" : "1015096", "name": "17294",
"refsource" : "SECTRACK", "refsource": "SECUNIA",
"url" : "http://securitytracker.com/id?1015096" "url": "http://secunia.com/advisories/17294"
}, },
{ {
"name" : "17294", "name": "15167",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/17294" "url": "http://www.securityfocus.com/bid/15167"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2005-4107", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2005-4107",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2005. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2005. Notes: none."
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-4247", "ID": "CVE-2005-4247",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in index.php in Plogger Beta 2 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchterms parameter." "value": "Cross-site scripting (XSS) vulnerability in index.php in Plogger Beta 2 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchterms parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2005/12/plogger-sqlxss-vuln.html", "name": "15839",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://pridels0.blogspot.com/2005/12/plogger-sqlxss-vuln.html" "url": "http://www.securityfocus.com/bid/15839"
}, },
{ {
"name" : "15839", "name": "http://pridels0.blogspot.com/2005/12/plogger-sqlxss-vuln.html",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/15839" "url": "http://pridels0.blogspot.com/2005/12/plogger-sqlxss-vuln.html"
}, },
{ {
"name" : "21711", "name": "21711",
"refsource" : "OSVDB", "refsource": "OSVDB",
"url" : "http://www.osvdb.org/21711" "url": "http://www.osvdb.org/21711"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-4438", "ID": "CVE-2005-4438",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Heap-based buffer overflow in Dec2Rar.dll 3.2.14.3, as distributed in the Symantec Antivirus Library and used by various Symantec products, allows remote attackers to execute arbitrary code via RAR archives with sub-block headers that contain incorrect values in the length field." "value": "Heap-based buffer overflow in Dec2Rar.dll 3.2.14.3, as distributed in the Symantec Antivirus Library and used by various Symantec products, allows remote attackers to execute arbitrary code via RAR archives with sub-block headers that contain incorrect values in the length field."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051220 Symantec Antivirus Library Remote Heap Overflows", "name": "15971",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://www.securityfocus.com/archive/1/419853/100/0/threaded" "url": "http://www.securityfocus.com/bid/15971"
}, },
{ {
"name" : "http://www.rem0te.com/public/images/symc2.pdf", "name": "276",
"refsource" : "MISC", "refsource": "SREASON",
"url" : "http://www.rem0te.com/public/images/symc2.pdf" "url": "http://securityreason.com/securityalert/276"
}, },
{ {
"name" : "VU#305272", "name": "ADV-2005-3003",
"refsource" : "CERT-VN", "refsource": "VUPEN",
"url" : "http://www.kb.cert.org/vuls/id/305272" "url": "http://www.vupen.com/english/advisories/2005/3003"
}, },
{ {
"name" : "15971", "name": "http://www.rem0te.com/public/images/symc2.pdf",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/15971" "url": "http://www.rem0te.com/public/images/symc2.pdf"
}, },
{ {
"name" : "ADV-2005-3003", "name": "1015384",
"refsource" : "VUPEN", "refsource": "SECTRACK",
"url" : "http://www.vupen.com/english/advisories/2005/3003" "url": "http://securitytracker.com/id?1015384"
}, },
{ {
"name" : "1015384", "name": "20051220 Symantec Antivirus Library Remote Heap Overflows",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://securitytracker.com/id?1015384" "url": "http://www.securityfocus.com/archive/1/419853/100/0/threaded"
}, },
{ {
"name" : "18131", "name": "VU#305272",
"refsource" : "SECUNIA", "refsource": "CERT-VN",
"url" : "http://secunia.com/advisories/18131" "url": "http://www.kb.cert.org/vuls/id/305272"
}, },
{ {
"name" : "276", "name": "18131",
"refsource" : "SREASON", "refsource": "SECUNIA",
"url" : "http://securityreason.com/securityalert/276" "url": "http://secunia.com/advisories/18131"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-4632", "ID": "CVE-2005-4632",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in poll_frame.php in Vote! Pro 4.0 and earlier allows remote attackers to execute arbitrary SQL commands via the poll_id parameter." "value": "SQL injection vulnerability in poll_frame.php in Vote! Pro 4.0 and earlier allows remote attackers to execute arbitrary SQL commands via the poll_id parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://pridels0.blogspot.com/2005/11/vote-pro-4x-pollid-sql-inj.html", "name": "21309",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://pridels0.blogspot.com/2005/11/vote-pro-4x-pollid-sql-inj.html" "url": "http://www.osvdb.org/21309"
}, },
{ {
"name" : "21309", "name": "http://pridels0.blogspot.com/2005/11/vote-pro-4x-pollid-sql-inj.html",
"refsource" : "OSVDB", "refsource": "MISC",
"url" : "http://www.osvdb.org/21309" "url": "http://pridels0.blogspot.com/2005/11/vote-pro-4x-pollid-sql-inj.html"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-2337", "ID": "CVE-2009-2337",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in includes/module/book/index.inc.php in w3b|cms Gaestebuch Guestbook Module 3.0.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the spam_id parameter." "value": "SQL injection vulnerability in includes/module/book/index.inc.php in w3b|cms Gaestebuch Guestbook Module 3.0.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the spam_id parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "8396", "name": "http://www.w3bcms.de/2.news/54.kommentare/",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "http://www.exploit-db.com/exploits/8396" "url": "http://www.w3bcms.de/2.news/54.kommentare/"
}, },
{ {
"name" : "http://www.w3bcms.de/2.news/54.kommentare/", "name": "guestbookmodule-indexinc-sql-injection(49853)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "http://www.w3bcms.de/2.news/54.kommentare/" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49853"
}, },
{ {
"name" : "34477", "name": "34650",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/34477" "url": "http://secunia.com/advisories/34650"
}, },
{ {
"name" : "53614", "name": "34477",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://osvdb.org/53614" "url": "http://www.securityfocus.com/bid/34477"
}, },
{ {
"name" : "34650", "name": "8396",
"refsource" : "SECUNIA", "refsource": "EXPLOIT-DB",
"url" : "http://secunia.com/advisories/34650" "url": "http://www.exploit-db.com/exploits/8396"
}, },
{ {
"name" : "guestbookmodule-indexinc-sql-injection(49853)", "name": "53614",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/49853" "url": "http://osvdb.org/53614"
} }
] ]
} }

View File

@ -1,186 +1,186 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2009-2411", "ID": "CVE-2009-2411",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412." "value": "Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20090807 Subversion heap overflow", "name": "[dev] 20090806 Subversion 1.5.7 Released",
"refsource" : "BUGTRAQ", "refsource": "MLIST",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2009-08/0056.html" "url": "http://svn.haxx.se/dev/archive-2009-08/0108.shtml"
}, },
{ {
"name" : "[dev] 20090806 Patch to 1.4.x branch for CVE-2009-2411", "name": "1022697",
"refsource" : "MLIST", "refsource": "SECTRACK",
"url" : "http://svn.haxx.se/dev/archive-2009-08/0110.shtml" "url": "http://www.securitytracker.com/id?1022697"
}, },
{ {
"name" : "[dev] 20090806 Subversion 1.5.7 Released", "name": "ADV-2009-2180",
"refsource" : "MLIST", "refsource": "VUPEN",
"url" : "http://svn.haxx.se/dev/archive-2009-08/0108.shtml" "url": "http://www.vupen.com/english/advisories/2009/2180"
}, },
{ {
"name" : "[dev] 20090806 Subversion 1.6.4 Released", "name": "20090807 Subversion heap overflow",
"refsource" : "MLIST", "refsource": "BUGTRAQ",
"url" : "http://svn.haxx.se/dev/archive-2009-08/0107.shtml" "url": "http://archives.neohapsis.com/archives/bugtraq/2009-08/0056.html"
}, },
{ {
"name" : "http://subversion.tigris.org/security/CVE-2009-2411-advisory.txt", "name": "36262",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://subversion.tigris.org/security/CVE-2009-2411-advisory.txt" "url": "http://secunia.com/advisories/36262"
}, },
{ {
"name" : "http://svn.collab.net/repos/svn/tags/1.5.7/CHANGES", "name": "36257",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://svn.collab.net/repos/svn/tags/1.5.7/CHANGES" "url": "http://secunia.com/advisories/36257"
}, },
{ {
"name" : "http://svn.collab.net/repos/svn/tags/1.6.4/CHANGES", "name": "36184",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://svn.collab.net/repos/svn/tags/1.6.4/CHANGES" "url": "http://secunia.com/advisories/36184"
}, },
{ {
"name" : "http://support.apple.com/kb/HT3937", "name": "USN-812-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://support.apple.com/kb/HT3937" "url": "http://www.ubuntu.com/usn/usn-812-1"
}, },
{ {
"name" : "APPLE-SA-2009-11-09-1", "name": "DSA-1855",
"refsource" : "APPLE", "refsource": "DEBIAN",
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" "url": "http://www.debian.org/security/2009/dsa-1855"
}, },
{ {
"name" : "DSA-1855", "name": "http://subversion.tigris.org/security/CVE-2009-2411-advisory.txt",
"refsource" : "DEBIAN", "refsource": "CONFIRM",
"url" : "http://www.debian.org/security/2009/dsa-1855" "url": "http://subversion.tigris.org/security/CVE-2009-2411-advisory.txt"
}, },
{ {
"name" : "FEDORA-2009-8432", "name": "36224",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00469.html" "url": "http://secunia.com/advisories/36224"
}, },
{ {
"name" : "FEDORA-2009-8449", "name": "35983",
"refsource" : "FEDORA", "refsource": "BID",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00485.html" "url": "http://www.securityfocus.com/bid/35983"
}, },
{ {
"name" : "MDVSA-2009:199", "name": "[dev] 20090806 Subversion 1.6.4 Released",
"refsource" : "MANDRIVA", "refsource": "MLIST",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:199" "url": "http://svn.haxx.se/dev/archive-2009-08/0107.shtml"
}, },
{ {
"name" : "RHSA-2009:1203", "name": "FEDORA-2009-8449",
"refsource" : "REDHAT", "refsource": "FEDORA",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1203.html" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00485.html"
}, },
{ {
"name" : "USN-812-1", "name": "[dev] 20090806 Patch to 1.4.x branch for CVE-2009-2411",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "http://www.ubuntu.com/usn/usn-812-1" "url": "http://svn.haxx.se/dev/archive-2009-08/0110.shtml"
}, },
{ {
"name" : "35983", "name": "http://svn.collab.net/repos/svn/tags/1.6.4/CHANGES",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/35983" "url": "http://svn.collab.net/repos/svn/tags/1.6.4/CHANGES"
}, },
{ {
"name" : "56856", "name": "RHSA-2009:1203",
"refsource" : "OSVDB", "refsource": "REDHAT",
"url" : "http://osvdb.org/56856" "url": "http://www.redhat.com/support/errata/RHSA-2009-1203.html"
}, },
{ {
"name" : "oval:org.mitre.oval:def:11465", "name": "36232",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11465" "url": "http://secunia.com/advisories/36232"
}, },
{ {
"name" : "1022697", "name": "http://svn.collab.net/repos/svn/tags/1.5.7/CHANGES",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://www.securitytracker.com/id?1022697" "url": "http://svn.collab.net/repos/svn/tags/1.5.7/CHANGES"
}, },
{ {
"name" : "36184", "name": "ADV-2009-3184",
"refsource" : "SECUNIA", "refsource": "VUPEN",
"url" : "http://secunia.com/advisories/36184" "url": "http://www.vupen.com/english/advisories/2009/3184"
}, },
{ {
"name" : "36224", "name": "MDVSA-2009:199",
"refsource" : "SECUNIA", "refsource": "MANDRIVA",
"url" : "http://secunia.com/advisories/36224" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:199"
}, },
{ {
"name" : "36232", "name": "oval:org.mitre.oval:def:11465",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/36232" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11465"
}, },
{ {
"name" : "36257", "name": "56856",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/36257" "url": "http://osvdb.org/56856"
}, },
{ {
"name" : "36262", "name": "APPLE-SA-2009-11-09-1",
"refsource" : "SECUNIA", "refsource": "APPLE",
"url" : "http://secunia.com/advisories/36262" "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
}, },
{ {
"name" : "ADV-2009-2180", "name": "http://support.apple.com/kb/HT3937",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2009/2180" "url": "http://support.apple.com/kb/HT3937"
}, },
{ {
"name" : "ADV-2009-3184", "name": "FEDORA-2009-8432",
"refsource" : "VUPEN", "refsource": "FEDORA",
"url" : "http://www.vupen.com/english/advisories/2009/3184" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00469.html"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-2749", "ID": "CVE-2009-2749",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Feature Pack for Communications Enabled Applications (CEA) before 1.0.0.1 for IBM WebSphere Application Server 7.0.0.7 uses predictable session values, which allows man-in-the-middle attackers to spoof a collaboration session by guessing the value." "value": "Feature Pack for Communications Enabled Applications (CEA) before 1.0.0.1 for IBM WebSphere Application Server 7.0.0.7 uses predictable session values, which allows man-in-the-middle attackers to spoof a collaboration session by guessing the value."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg27017328", "name": "PM00435",
"refsource" : "CONFIRM", "refsource": "AIXAPAR",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg27017328" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM00435"
}, },
{ {
"name" : "PM00435", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg27017328",
"refsource" : "AIXAPAR", "refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PM00435" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27017328"
}, },
{ {
"name" : "37392", "name": "37392",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/37392" "url": "http://www.securityfocus.com/bid/37392"
}, },
{ {
"name" : "ADV-2009-3598", "name": "ADV-2009-3598",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3598" "url": "http://www.vupen.com/english/advisories/2009/3598"
}, },
{ {
"name" : "was-fbcea-collaboration-spoofing(54494)", "name": "was-fbcea-collaboration-spoofing(54494)",
"refsource" : "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54494" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54494"
} }
] ]
} }

View File

@ -1,211 +1,211 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-2813", "ID": "CVE-2009-2813",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories." "value": "Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat", "name": "SSRT090212",
"refsource" : "BUGTRAQ", "refsource": "HP",
"url" : "http://www.securityfocus.com/archive/1/507856/100/0/threaded" "url": "http://marc.info/?l=bugtraq&m=126514298313071&w=2"
}, },
{ {
"name" : "http://support.apple.com/kb/HT3865", "name": "http://news.samba.org/releases/3.4.2/",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://support.apple.com/kb/HT3865" "url": "http://news.samba.org/releases/3.4.2/"
}, },
{ {
"name" : "http://news.samba.org/releases/3.0.37/", "name": "20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat",
"refsource" : "CONFIRM", "refsource": "BUGTRAQ",
"url" : "http://news.samba.org/releases/3.0.37/" "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded"
}, },
{ {
"name" : "http://news.samba.org/releases/3.2.15/", "name": "FEDORA-2009-10172",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "http://news.samba.org/releases/3.2.15/" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html"
}, },
{ {
"name" : "http://news.samba.org/releases/3.3.8/", "name": "oval:org.mitre.oval:def:9191",
"refsource" : "CONFIRM", "refsource": "OVAL",
"url" : "http://news.samba.org/releases/3.3.8/" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191"
}, },
{ {
"name" : "http://news.samba.org/releases/3.4.2/", "name": "HPSBUX02479",
"refsource" : "CONFIRM", "refsource": "HP",
"url" : "http://news.samba.org/releases/3.4.2/" "url": "http://marc.info/?l=bugtraq&m=126514298313071&w=2"
}, },
{ {
"name" : "http://www.samba.org/samba/security/CVE-2009-2813.html", "name": "http://news.samba.org/releases/3.2.15/",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.samba.org/samba/security/CVE-2009-2813.html" "url": "http://news.samba.org/releases/3.2.15/"
}, },
{ {
"name" : "http://wiki.rpath.com/Advisories:rPSA-2009-0145", "name": "APPLE-SA-2009-09-10-2",
"refsource" : "CONFIRM", "refsource": "APPLE",
"url" : "http://wiki.rpath.com/Advisories:rPSA-2009-0145" "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
}, },
{ {
"name" : "APPLE-SA-2009-09-10-2", "name": "1021111",
"refsource" : "APPLE", "refsource": "SUNALERT",
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1"
}, },
{ {
"name" : "FEDORA-2009-10172", "name": "ADV-2009-2810",
"refsource" : "FEDORA", "refsource": "VUPEN",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html" "url": "http://www.vupen.com/english/advisories/2009/2810"
}, },
{ {
"name" : "FEDORA-2009-10180", "name": "SSA:2009-276-01",
"refsource" : "FEDORA", "refsource": "SLACKWARE",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439"
}, },
{ {
"name" : "HPSBUX02479", "name": "37428",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=126514298313071&w=2" "url": "http://secunia.com/advisories/37428"
}, },
{ {
"name" : "SSRT090212", "name": "36937",
"refsource" : "HP", "refsource": "SECUNIA",
"url" : "http://marc.info/?l=bugtraq&m=126514298313071&w=2" "url": "http://secunia.com/advisories/36937"
}, },
{ {
"name" : "SSA:2009-276-01", "name": "USN-839-1",
"refsource" : "SLACKWARE", "refsource": "UBUNTU",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439" "url": "http://www.ubuntu.com/usn/USN-839-1"
}, },
{ {
"name" : "1021111", "name": "http://news.samba.org/releases/3.0.37/",
"refsource" : "SUNALERT", "refsource": "CONFIRM",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1" "url": "http://news.samba.org/releases/3.0.37/"
}, },
{ {
"name" : "SUSE-SR:2009:017", "name": "http://www.samba.org/samba/security/CVE-2009-2813.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" "url": "http://www.samba.org/samba/security/CVE-2009-2813.html"
}, },
{ {
"name" : "USN-839-1", "name": "oval:org.mitre.oval:def:7257",
"refsource" : "UBUNTU", "refsource": "OVAL",
"url" : "http://www.ubuntu.com/usn/USN-839-1" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257"
}, },
{ {
"name" : "36363", "name": "http://support.apple.com/kb/HT3865",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/36363" "url": "http://support.apple.com/kb/HT3865"
}, },
{ {
"name" : "57955", "name": "36363",
"refsource" : "OSVDB", "refsource": "BID",
"url" : "http://osvdb.org/57955" "url": "http://www.securityfocus.com/bid/36363"
}, },
{ {
"name" : "oval:org.mitre.oval:def:7211", "name": "36918",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211" "url": "http://secunia.com/advisories/36918"
}, },
{ {
"name" : "oval:org.mitre.oval:def:7791", "name": "36701",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791" "url": "http://secunia.com/advisories/36701"
}, },
{ {
"name" : "oval:org.mitre.oval:def:9191", "name": "36893",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191" "url": "http://secunia.com/advisories/36893"
}, },
{ {
"name" : "oval:org.mitre.oval:def:7257", "name": "http://news.samba.org/releases/3.3.8/",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257" "url": "http://news.samba.org/releases/3.3.8/"
}, },
{ {
"name" : "36701", "name": "36953",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/36701" "url": "http://secunia.com/advisories/36953"
}, },
{ {
"name" : "36893", "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0145",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/36893" "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145"
}, },
{ {
"name" : "36918", "name": "oval:org.mitre.oval:def:7211",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/36918" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211"
}, },
{ {
"name" : "36937", "name": "SUSE-SR:2009:017",
"refsource" : "SECUNIA", "refsource": "SUSE",
"url" : "http://secunia.com/advisories/36937" "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
}, },
{ {
"name" : "36953", "name": "macosx-smb-security-bypass(53174)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/36953" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174"
}, },
{ {
"name" : "37428", "name": "oval:org.mitre.oval:def:7791",
"refsource" : "SECUNIA", "refsource": "OVAL",
"url" : "http://secunia.com/advisories/37428" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791"
}, },
{ {
"name" : "ADV-2009-2810", "name": "57955",
"refsource" : "VUPEN", "refsource": "OSVDB",
"url" : "http://www.vupen.com/english/advisories/2009/2810" "url": "http://osvdb.org/57955"
}, },
{ {
"name" : "macosx-smb-security-bypass(53174)", "name": "FEDORA-2009-10180",
"refsource" : "XF", "refsource": "FEDORA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-2832", "ID": "CVE-2009-2832",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer overflow in FTP Server in Apple Mac OS X before 10.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a CWD command specifying a pathname in a deeply nested hierarchy of directories, related to a \"CWD command line tool.\"" "value": "Buffer overflow in FTP Server in Apple Mac OS X before 10.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a CWD command specifying a pathname in a deeply nested hierarchy of directories, related to a \"CWD command line tool.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://support.apple.com/kb/HT3937", "name": "36956",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://support.apple.com/kb/HT3937" "url": "http://www.securityfocus.com/bid/36956"
}, },
{ {
"name" : "APPLE-SA-2009-11-09-1", "name": "ADV-2009-3184",
"refsource" : "APPLE", "refsource": "VUPEN",
"url" : "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" "url": "http://www.vupen.com/english/advisories/2009/3184"
}, },
{ {
"name" : "36956", "name": "APPLE-SA-2009-11-09-1",
"refsource" : "BID", "refsource": "APPLE",
"url" : "http://www.securityfocus.com/bid/36956" "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
}, },
{ {
"name" : "ADV-2009-3184", "name": "http://support.apple.com/kb/HT3937",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2009/3184" "url": "http://support.apple.com/kb/HT3937"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-2894", "ID": "CVE-2009-2894",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple SQL injection vulnerabilities in Ebay Clone 2009 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to product_desc.php, and the cid parameter to (2) showcategory.php and (3) gallery.php." "value": "Multiple SQL injection vulnerabilities in Ebay Clone 2009 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to product_desc.php, and the cid parameter to (2) showcategory.php and (3) gallery.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/0907-exploits/clone2009-sql.txt", "name": "56265",
"refsource" : "MISC", "refsource": "OSVDB",
"url" : "http://packetstormsecurity.org/0907-exploits/clone2009-sql.txt" "url": "http://osvdb.org/56265"
}, },
{ {
"name" : "56265", "name": "56266",
"refsource" : "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/56265" "url": "http://osvdb.org/56266"
}, },
{ {
"name" : "56266", "name": "35952",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://osvdb.org/56266" "url": "http://secunia.com/advisories/35952"
}, },
{ {
"name" : "56268", "name": "ebayclone-cid-sql-injection(51956)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://osvdb.org/56268" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51956"
}, },
{ {
"name" : "35952", "name": "http://packetstormsecurity.org/0907-exploits/clone2009-sql.txt",
"refsource" : "SECUNIA", "refsource": "MISC",
"url" : "http://secunia.com/advisories/35952" "url": "http://packetstormsecurity.org/0907-exploits/clone2009-sql.txt"
}, },
{ {
"name" : "ebayclone-cid-sql-injection(51956)", "name": "56268",
"refsource" : "XF", "refsource": "OSVDB",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/51956" "url": "http://osvdb.org/56268"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-3065", "ID": "CVE-2009-3065",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "PHP remote file inclusion vulnerability in editor/edit_htmlarea.php in Ve-EDIT 0.1.4 allows remote attackers to execute arbitrary PHP code via a URL in the highlighter parameter." "value": "PHP remote file inclusion vulnerability in editor/edit_htmlarea.php in Ve-EDIT 0.1.4 allows remote attackers to execute arbitrary PHP code via a URL in the highlighter parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "9577", "name": "ADV-2009-2522",
"refsource" : "EXPLOIT-DB", "refsource": "VUPEN",
"url" : "http://www.exploit-db.com/exploits/9577" "url": "http://www.vupen.com/english/advisories/2009/2522"
}, },
{ {
"name" : "ADV-2009-2522", "name": "9577",
"refsource" : "VUPEN", "refsource": "EXPLOIT-DB",
"url" : "http://www.vupen.com/english/advisories/2009/2522" "url": "http://www.exploit-db.com/exploits/9577"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-3099", "ID": "CVE-2009-3099",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in HP OpenView Operations Manager 8.1 on Windows Server 2003 SP2 allows remote attackers to have an unknown impact, related to a \"Remote exploit,\" as demonstrated by a certain module in VulnDisco Pack Professional 8.11, a different vulnerability than CVE-2007-3872. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes." "value": "Unspecified vulnerability in HP OpenView Operations Manager 8.1 on Windows Server 2003 SP2 allows remote attackers to have an unknown impact, related to a \"Remote exploit,\" as demonstrated by a certain module in VulnDisco Pack Professional 8.11, a different vulnerability than CVE-2007-3872. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://intevydis.com/vd-list.shtml", "name": "http://intevydis.com/vd-list.shtml",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://intevydis.com/vd-list.shtml" "url": "http://intevydis.com/vd-list.shtml"
}, },
{ {
"name" : "36541", "name": "36541",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/36541" "url": "http://secunia.com/advisories/36541"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-3151", "ID": "CVE-2009-3151",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Directory traversal vulnerability in actions/downloadFile.php in Ultrize TimeSheet 1.2.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter." "value": "Directory traversal vulnerability in actions/downloadFile.php in Ultrize TimeSheet 1.2.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "9307", "name": "9307",
"refsource" : "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/9307" "url": "http://www.exploit-db.com/exploits/9307"
}, },
{ {
"name" : "ultrize-downloadfile-directory-traversal(52166)", "name": "ultrize-downloadfile-directory-traversal(52166)",
"refsource" : "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/52166" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52166"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4517", "ID": "CVE-2009-4517",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site request forgery (CSRF) vulnerability in the FAQ Ask module 5.x and 6.x before 6.x-2.0, a module for Drupal, allows remote attackers to hijack the authentication of arbitrary users for requests that access unpublished content." "value": "Cross-site request forgery (CSRF) vulnerability in the FAQ Ask module 5.x and 6.x before 6.x-2.0, a module for Drupal, allows remote attackers to hijack the authentication of arbitrary users for requests that access unpublished content."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://drupal.org/node/617444", "name": "http://drupal.org/node/617444",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://drupal.org/node/617444" "url": "http://drupal.org/node/617444"
}, },
{ {
"name" : "37201", "name": "37201",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/37201" "url": "http://secunia.com/advisories/37201"
}, },
{ {
"name" : "ADV-2009-3088", "name": "ADV-2009-3088",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/3088" "url": "http://www.vupen.com/english/advisories/2009/3088"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4528", "ID": "CVE-2009-4528",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The Organic Groups (OG) Vocabulary module 6.x before 6.x-1.0 for Drupal allows remote authenticated group members to bypass intended access restrictions, and create, modify, or read a vocabulary, via unspecified vectors." "value": "The Organic Groups (OG) Vocabulary module 6.x before 6.x-1.0 for Drupal allows remote authenticated group members to bypass intended access restrictions, and create, modify, or read a vocabulary, via unspecified vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://drupal.org/node/604354", "name": "ADV-2009-2920",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://drupal.org/node/604354" "url": "http://www.vupen.com/english/advisories/2009/2920"
}, },
{ {
"name" : "http://drupal.org/node/604514", "name": "http://drupal.org/node/604354",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://drupal.org/node/604514" "url": "http://drupal.org/node/604354"
}, },
{ {
"name" : "36685", "name": "36685",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/36685" "url": "http://www.securityfocus.com/bid/36685"
}, },
{ {
"name" : "58947", "name": "58947",
"refsource" : "OSVDB", "refsource": "OSVDB",
"url" : "http://osvdb.org/58947" "url": "http://osvdb.org/58947"
}, },
{ {
"name" : "37060", "name": "http://drupal.org/node/604514",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/37060" "url": "http://drupal.org/node/604514"
}, },
{ {
"name" : "ADV-2009-2920", "name": "ogvocab-membership-security-bypass(53780)",
"refsource" : "VUPEN", "refsource": "XF",
"url" : "http://www.vupen.com/english/advisories/2009/2920" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53780"
}, },
{ {
"name" : "ogvocab-membership-security-bypass(53780)", "name": "37060",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/53780" "url": "http://secunia.com/advisories/37060"
} }
] ]
} }

View File

@ -1,101 +1,101 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4762", "ID": "CVE-2009-4762",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "MoinMoin 1.7.x before 1.7.3 and 1.8.x before 1.8.3 checks parent ACLs in certain inappropriate circumstances during processing of hierarchical ACLs, which allows remote attackers to bypass intended access restrictions by requesting an item, a different vulnerability than CVE-2008-6603." "value": "MoinMoin 1.7.x before 1.7.3 and 1.8.x before 1.8.3 checks parent ACLs in certain inappropriate circumstances during processing of hierarchical ACLs, which allows remote attackers to bypass intended access restrictions by requesting an item, a different vulnerability than CVE-2008-6603."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://hg.moinmo.in/moin/1.7/rev/897cdbe9e8f2", "name": "http://hg.moinmo.in/moin/1.7/rev/897cdbe9e8f2",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://hg.moinmo.in/moin/1.7/rev/897cdbe9e8f2" "url": "http://hg.moinmo.in/moin/1.7/rev/897cdbe9e8f2"
}, },
{ {
"name" : "http://hg.moinmo.in/moin/1.8/rev/897cdbe9e8f2", "name": "http://moinmo.in/SecurityFixes",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://hg.moinmo.in/moin/1.8/rev/897cdbe9e8f2" "url": "http://moinmo.in/SecurityFixes"
}, },
{ {
"name" : "http://moinmo.in/SecurityFixes", "name": "ADV-2010-1208",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://moinmo.in/SecurityFixes" "url": "http://www.vupen.com/english/advisories/2010/1208"
}, },
{ {
"name" : "DSA-2014", "name": "DSA-2014",
"refsource" : "DEBIAN", "refsource": "DEBIAN",
"url" : "http://www.debian.org/security/2010/dsa-2014" "url": "http://www.debian.org/security/2010/dsa-2014"
}, },
{ {
"name" : "USN-941-1", "name": "39887",
"refsource" : "UBUNTU", "refsource": "SECUNIA",
"url" : "http://ubuntu.com/usn/usn-941-1" "url": "http://secunia.com/advisories/39887"
}, },
{ {
"name" : "35277", "name": "35277",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/35277" "url": "http://www.securityfocus.com/bid/35277"
}, },
{ {
"name" : "39887", "name": "USN-941-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/39887" "url": "http://ubuntu.com/usn/usn-941-1"
}, },
{ {
"name" : "ADV-2010-0600", "name": "ADV-2010-0600",
"refsource" : "VUPEN", "refsource": "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2010/0600" "url": "http://www.vupen.com/english/advisories/2010/0600"
}, },
{ {
"name" : "ADV-2010-1208", "name": "http://hg.moinmo.in/moin/1.8/rev/897cdbe9e8f2",
"refsource" : "VUPEN", "refsource": "CONFIRM",
"url" : "http://www.vupen.com/english/advisories/2010/1208" "url": "http://hg.moinmo.in/moin/1.8/rev/897cdbe9e8f2"
} }
] ]
} }

View File

@ -1,236 +1,236 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2015-0205", "ID": "CVE-2015-0205",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support." "value": "The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3", "name": "openssl-cve20150205-sec-bypass(99708)",
"refsource" : "CONFIRM", "refsource": "XF",
"url" : "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99708"
}, },
{ {
"name" : "https://www.openssl.org/news/secadv_20150108.txt", "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.openssl.org/news/secadv_20150108.txt" "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "name": "openSUSE-SU-2015:0130",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "name": "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products",
"refsource" : "CONFIRM", "refsource": "CISCO",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html", "name": "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html" "url": "https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "name": "HPSBMU03409",
"refsource" : "CONFIRM", "refsource": "HP",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" "url": "http://marc.info/?l=bugtraq&m=144050155601375&w=2"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "name": "71941",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380" "url": "http://www.securityfocus.com/bid/71941"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
}, },
{ {
"name" : "https://bto.bluecoat.com/security-advisory/sa88", "name": "HPSBMU03380",
"refsource" : "CONFIRM", "refsource": "HP",
"url" : "https://bto.bluecoat.com/security-advisory/sa88" "url": "http://marc.info/?l=bugtraq&m=143748090628601&w=2"
}, },
{ {
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"
}, },
{ {
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10102", "name": "FEDORA-2015-0601",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10102" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html"
}, },
{ {
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10108", "name": "1033378",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10108" "url": "http://www.securitytracker.com/id/1033378"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "name": "HPSBHF03289",
"refsource" : "CONFIRM", "refsource": "HP",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" "url": "http://marc.info/?l=bugtraq&m=142721102728110&w=2"
}, },
{ {
"name" : "https://support.citrix.com/article/CTX216642", "name": "https://www.openssl.org/news/secadv_20150108.txt",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.citrix.com/article/CTX216642" "url": "https://www.openssl.org/news/secadv_20150108.txt"
}, },
{ {
"name" : "20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380",
"refsource" : "CISCO", "refsource": "CONFIRM",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"
}, },
{ {
"name" : "DSA-3125", "name": "MDVSA-2015:019",
"refsource" : "DEBIAN", "refsource": "MANDRIVA",
"url" : "http://www.debian.org/security/2015/dsa-3125" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019"
}, },
{ {
"name" : "FEDORA-2015-0512", "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html" "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"
}, },
{ {
"name" : "FEDORA-2015-0601", "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html" "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679"
}, },
{ {
"name" : "HPSBHF03289", "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "HP", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=142721102728110&w=2" "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
}, },
{ {
"name" : "HPSBMU03380", "name": "openSUSE-SU-2015:1277",
"refsource" : "HP", "refsource": "SUSE",
"url" : "http://marc.info/?l=bugtraq&m=143748090628601&w=2" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"
}, },
{ {
"name" : "HPSBMU03396", "name": "RHSA-2015:0066",
"refsource" : "HP", "refsource": "REDHAT",
"url" : "http://marc.info/?l=bugtraq&m=144050205101530&w=2" "url": "http://rhn.redhat.com/errata/RHSA-2015-0066.html"
}, },
{ {
"name" : "HPSBMU03397", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10108",
"refsource" : "HP", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=144050297101809&w=2" "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10108"
}, },
{ {
"name" : "HPSBMU03409", "name": "SUSE-SU-2015:0578",
"refsource" : "HP", "refsource": "SUSE",
"url" : "http://marc.info/?l=bugtraq&m=144050155601375&w=2" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"
}, },
{ {
"name" : "HPSBMU03413", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10102",
"refsource" : "HP", "refsource": "CONFIRM",
"url" : "http://marc.info/?l=bugtraq&m=144050254401665&w=2" "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10102"
}, },
{ {
"name" : "MDVSA-2015:019", "name": "SUSE-SU-2015:0946",
"refsource" : "MANDRIVA", "refsource": "SUSE",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:019" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html"
}, },
{ {
"name" : "MDVSA-2015:062", "name": "HPSBMU03397",
"refsource" : "MANDRIVA", "refsource": "HP",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062" "url": "http://marc.info/?l=bugtraq&m=144050297101809&w=2"
}, },
{ {
"name" : "RHSA-2015:0066", "name": "91787",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0066.html" "url": "http://www.securityfocus.com/bid/91787"
}, },
{ {
"name" : "openSUSE-SU-2015:0130", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"
}, },
{ {
"name" : "SUSE-SU-2015:0578", "name": "HPSBMU03396",
"refsource" : "SUSE", "refsource": "HP",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" "url": "http://marc.info/?l=bugtraq&m=144050205101530&w=2"
}, },
{ {
"name" : "SUSE-SU-2015:0946", "name": "MDVSA-2015:062",
"refsource" : "SUSE", "refsource": "MANDRIVA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:062"
}, },
{ {
"name" : "openSUSE-SU-2015:1277", "name": "https://support.citrix.com/article/CTX216642",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" "url": "https://support.citrix.com/article/CTX216642"
}, },
{ {
"name" : "91787", "name": "HPSBMU03413",
"refsource" : "BID", "refsource": "HP",
"url" : "http://www.securityfocus.com/bid/91787" "url": "http://marc.info/?l=bugtraq&m=144050254401665&w=2"
}, },
{ {
"name" : "71941", "name": "https://bto.bluecoat.com/security-advisory/sa88",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/71941" "url": "https://bto.bluecoat.com/security-advisory/sa88"
}, },
{ {
"name" : "1033378", "name": "DSA-3125",
"refsource" : "SECTRACK", "refsource": "DEBIAN",
"url" : "http://www.securitytracker.com/id/1033378" "url": "http://www.debian.org/security/2015/dsa-3125"
}, },
{ {
"name" : "openssl-cve20150205-sec-bypass(99708)", "name": "FEDORA-2015-0512",
"refsource" : "XF", "refsource": "FEDORA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99708" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2015-0615", "ID": "CVE-2015-0615",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The call-handling implementation in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (port consumption) by improperly terminating SIP sessions, aka Bug ID CSCul28089." "value": "The call-handling implementation in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (port consumption) by improperly terminating SIP sessions, aka Bug ID CSCul28089."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20150401 Multiple Vulnerabilities in Cisco Unity Connection", "name": "20150401 Multiple Vulnerabilities in Cisco Unity Connection",
"refsource" : "CISCO", "refsource": "CISCO",
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc" "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150401-cuc"
}, },
{ {
"name" : "1032010", "name": "1032010",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id/1032010" "url": "http://www.securitytracker.com/id/1032010"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@suse.com",
"ID" : "CVE-2015-0778", "ID": "CVE-2015-0778",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "osc before 0.151.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a _service file." "value": "osc before 0.151.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a _service file."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=901643", "name": "FEDORA-2015-4482",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=901643" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154267.html"
}, },
{ {
"name" : "FEDORA-2015-4687", "name": "https://bugzilla.suse.com/show_bug.cgi?id=901643",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154117.html" "url": "https://bugzilla.suse.com/show_bug.cgi?id=901643"
}, },
{ {
"name" : "FEDORA-2015-4482", "name": "73114",
"refsource" : "FEDORA", "refsource": "BID",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154267.html" "url": "http://www.securityfocus.com/bid/73114"
}, },
{ {
"name" : "FEDORA-2015-4549", "name": "FEDORA-2015-4687",
"refsource" : "FEDORA", "refsource": "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154257.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154117.html"
}, },
{ {
"name" : "GLSA-201603-02", "name": "FEDORA-2015-4549",
"refsource" : "GENTOO", "refsource": "FEDORA",
"url" : "https://security.gentoo.org/glsa/201603-02" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154257.html"
}, },
{ {
"name" : "SUSE-SU-2015:0487", "name": "openSUSE-SU-2015:0486",
"refsource" : "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00012.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00011.html"
}, },
{ {
"name" : "openSUSE-SU-2015:0486", "name": "GLSA-201603-02",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00011.html" "url": "https://security.gentoo.org/glsa/201603-02"
}, },
{ {
"name" : "73114", "name": "SUSE-SU-2015:0487",
"refsource" : "BID", "refsource": "SUSE",
"url" : "http://www.securityfocus.com/bid/73114" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00012.html"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@google.com",
"ID" : "CVE-2015-1219", "ID": "CVE-2015-1219",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering." "value": "Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html", "name": "https://code.google.com/p/chromium/issues/detail?id=446164",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html" "url": "https://code.google.com/p/chromium/issues/detail?id=446164"
}, },
{ {
"name" : "https://code.google.com/p/chromium/issues/detail?id=446164", "name": "USN-2521-1",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://code.google.com/p/chromium/issues/detail?id=446164" "url": "http://www.ubuntu.com/usn/USN-2521-1"
}, },
{ {
"name" : "https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a", "name": "72901",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a" "url": "http://www.securityfocus.com/bid/72901"
}, },
{ {
"name" : "GLSA-201503-12", "name": "https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a",
"refsource" : "GENTOO", "refsource": "CONFIRM",
"url" : "https://security.gentoo.org/glsa/201503-12" "url": "https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a"
}, },
{ {
"name" : "RHSA-2015:0627", "name": "GLSA-201503-12",
"refsource" : "REDHAT", "refsource": "GENTOO",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0627.html" "url": "https://security.gentoo.org/glsa/201503-12"
}, },
{ {
"name" : "USN-2521-1", "name": "RHSA-2015:0627",
"refsource" : "UBUNTU", "refsource": "REDHAT",
"url" : "http://www.ubuntu.com/usn/USN-2521-1" "url": "http://rhn.redhat.com/errata/RHSA-2015-0627.html"
}, },
{ {
"name" : "72901", "name": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/72901" "url": "http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-1396", "ID": "CVE-2015-1396",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-1410", "ID": "CVE-2015-1410",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-1620", "ID": "CVE-2015-1620",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2015-1623", "ID": "CVE-2015-1623",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2015-0056 and CVE-2015-1626." "value": "Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability,\" a different vulnerability than CVE-2015-0056 and CVE-2015-1626."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "MS15-018", "name": "MS15-018",
"refsource" : "MS", "refsource": "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018"
}, },
{ {
"name" : "72928", "name": "1031888",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/72928" "url": "http://www.securitytracker.com/id/1031888"
}, },
{ {
"name" : "1031888", "name": "72928",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id/1031888" "url": "http://www.securityfocus.com/bid/72928"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-4161", "ID": "CVE-2015-4161",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SAP Afaria does not properly restrict access to unspecified functionality, which allows remote attackers to obtain sensitive information, gain privileges, or have other unspecified impact via unknown vectors, SAP Security Note 2155690." "value": "SAP Afaria does not properly restrict access to unspecified functionality, which allows remote attackers to obtain sensitive information, gain privileges, or have other unspecified impact via unknown vectors, SAP Security Note 2155690."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20150522 SAP Security Notes May 2015", "name": "74800",
"refsource" : "FULLDISC", "refsource": "BID",
"url" : "http://seclists.org/fulldisclosure/2015/May/96" "url": "http://www.securityfocus.com/bid/74800"
}, },
{ {
"name" : "74800", "name": "20150522 SAP Security Notes May 2015",
"refsource" : "BID", "refsource": "FULLDISC",
"url" : "http://www.securityfocus.com/bid/74800" "url": "http://seclists.org/fulldisclosure/2015/May/96"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@cisco.com",
"ID" : "CVE-2015-4281", "ID": "CVE-2015-4281",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site request forgery (CSRF) vulnerability in Cisco WebEx Meetings Server 2.5 MR1 allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCus56150 and CSCus56146." "value": "Cross-site request forgery (CSRF) vulnerability in Cisco WebEx Meetings Server 2.5 MR1 allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCus56150 and CSCus56146."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20150721 Cisco WebEx Meetings Server Cross-Site Request Forgery Vulnerability", "name": "20150721 Cisco WebEx Meetings Server Cross-Site Request Forgery Vulnerability",
"refsource" : "CISCO", "refsource": "CISCO",
"url" : "http://tools.cisco.com/security/center/viewAlert.x?alertId=40021" "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=40021"
}, },
{ {
"name" : "75979", "name": "75979",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/75979" "url": "http://www.securityfocus.com/bid/75979"
}, },
{ {
"name" : "1033016", "name": "1033016",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id/1033016" "url": "http://www.securitytracker.com/id/1033016"
} }
] ]
} }

View File

@ -1,126 +1,126 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security@mozilla.org",
"ID" : "CVE-2015-4480", "ID": "CVE-2015-4480",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding." "value": "Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2015/mfsa2015-83.html", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1144107",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.mozilla.org/security/announce/2015/mfsa2015-83.html" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1144107"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1144107", "name": "openSUSE-SU-2015:1454",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1144107" "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "name": "USN-2702-3",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" "url": "http://www.ubuntu.com/usn/USN-2702-3"
}, },
{ {
"name" : "DSA-3333", "name": "openSUSE-SU-2015:1389",
"refsource" : "DEBIAN", "refsource": "SUSE",
"url" : "http://www.debian.org/security/2015/dsa-3333" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html"
}, },
{ {
"name" : "GLSA-201605-06", "name": "openSUSE-SU-2015:1453",
"refsource" : "GENTOO", "refsource": "SUSE",
"url" : "https://security.gentoo.org/glsa/201605-06" "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html"
}, },
{ {
"name" : "RHSA-2015:1586", "name": "RHSA-2015:1586",
"refsource" : "REDHAT", "refsource": "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1586.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1586.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1389", "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1390", "name": "http://www.mozilla.org/security/announce/2015/mfsa2015-83.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-83.html"
}, },
{ {
"name" : "openSUSE-SU-2015:1453", "name": "1033247",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" "url": "http://www.securitytracker.com/id/1033247"
}, },
{ {
"name" : "openSUSE-SU-2015:1454", "name": "USN-2702-2",
"refsource" : "SUSE", "refsource": "UBUNTU",
"url" : "http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" "url": "http://www.ubuntu.com/usn/USN-2702-2"
}, },
{ {
"name" : "USN-2702-1", "name": "USN-2702-1",
"refsource" : "UBUNTU", "refsource": "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-2702-1" "url": "http://www.ubuntu.com/usn/USN-2702-1"
}, },
{ {
"name" : "USN-2702-2", "name": "GLSA-201605-06",
"refsource" : "UBUNTU", "refsource": "GENTOO",
"url" : "http://www.ubuntu.com/usn/USN-2702-2" "url": "https://security.gentoo.org/glsa/201605-06"
}, },
{ {
"name" : "USN-2702-3", "name": "DSA-3333",
"refsource" : "UBUNTU", "refsource": "DEBIAN",
"url" : "http://www.ubuntu.com/usn/USN-2702-3" "url": "http://www.debian.org/security/2015/dsa-3333"
}, },
{ {
"name" : "1033247", "name": "openSUSE-SU-2015:1390",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1033247" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-4688", "ID": "CVE-2015-4688",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Ellucian (formerly SunGard) Banner Student 8.5.1.2 through 8.7 allow remote attackers to enumerate user accounts via a series of requests." "value": "Ellucian (formerly SunGard) Banner Student 8.5.1.2 through 8.7 allow remote attackers to enumerate user accounts via a series of requests."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20151202 Ellucian Banner Student Vulnerability Disclosure", "name": "http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/537029/100/0/threaded" "url": "http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html", "name": "20151202 Ellucian Banner Student Vulnerability Disclosure",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://packetstormsecurity.com/files/134622/Banner-Student-XSS-Information-Disclosure-Open-Redirect.html" "url": "http://www.securityfocus.com/archive/1/537029/100/0/threaded"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-5139", "ID": "CVE-2015-5139",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2015-5270", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2015-5270",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
} }
] ]
} }

View File

@ -1,181 +1,181 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2015-5296", "ID": "CVE-2015-5296",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c." "value": "Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1290292", "name": "https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1290292" "url": "https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9"
}, },
{ {
"name" : "https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1", "name": "FEDORA-2015-0e0879cc8a",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html"
}, },
{ {
"name" : "https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9", "name": "https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://git.samba.org/?p=samba.git;a=commit;h=a819d2b440aafa3138d95ff6e8b824da885a70e9" "url": "https://git.samba.org/?p=samba.git;a=commit;h=1ba49b8f389eda3414b14410c7fbcb4041ca06b1"
}, },
{ {
"name" : "https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895", "name": "openSUSE-SU-2016:1064",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
}, },
{ {
"name" : "https://www.samba.org/samba/security/CVE-2015-5296.html", "name": "USN-2855-2",
"refsource" : "CONFIRM", "refsource": "UBUNTU",
"url" : "https://www.samba.org/samba/security/CVE-2015-5296.html" "url": "http://www.ubuntu.com/usn/USN-2855-2"
}, },
{ {
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993", "name": "SUSE-SU-2016:0032",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html", "name": "SUSE-SU-2015:2304",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html"
}, },
{ {
"name" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html", "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
}, },
{ {
"name" : "DSA-3433", "name": "SUSE-SU-2015:2305",
"refsource" : "DEBIAN", "refsource": "SUSE",
"url" : "http://www.debian.org/security/2016/dsa-3433" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html"
}, },
{ {
"name" : "FEDORA-2015-0e0879cc8a", "name": "79732",
"refsource" : "FEDORA", "refsource": "BID",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html" "url": "http://www.securityfocus.com/bid/79732"
}, },
{ {
"name" : "FEDORA-2015-b36076d32e", "name": "SUSE-SU-2016:0164",
"refsource" : "FEDORA", "refsource": "SUSE",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html"
}, },
{ {
"name" : "GLSA-201612-47", "name": "openSUSE-SU-2015:2354",
"refsource" : "GENTOO", "refsource": "SUSE",
"url" : "https://security.gentoo.org/glsa/201612-47" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1064", "name": "FEDORA-2015-b36076d32e",
"refsource" : "SUSE", "refsource": "FEDORA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1106", "name": "openSUSE-SU-2016:1106",
"refsource" : "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
}, },
{ {
"name" : "openSUSE-SU-2016:1107", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
}, },
{ {
"name" : "SUSE-SU-2015:2304", "name": "https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" "url": "https://git.samba.org/?p=samba.git;a=commit;h=d724f835acb9f4886c0001af32cd325dbbf1f895"
}, },
{ {
"name" : "SUSE-SU-2015:2305", "name": "1034493",
"refsource" : "SUSE", "refsource": "SECTRACK",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" "url": "http://www.securitytracker.com/id/1034493"
}, },
{ {
"name" : "SUSE-SU-2016:0032", "name": "DSA-3433",
"refsource" : "SUSE", "refsource": "DEBIAN",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" "url": "http://www.debian.org/security/2016/dsa-3433"
}, },
{ {
"name" : "openSUSE-SU-2015:2354", "name": "openSUSE-SU-2016:1107",
"refsource" : "SUSE", "refsource": "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
}, },
{ {
"name" : "openSUSE-SU-2015:2356", "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
"refsource" : "SUSE", "refsource": "CONFIRM",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
}, },
{ {
"name" : "SUSE-SU-2016:0164", "name": "GLSA-201612-47",
"refsource" : "SUSE", "refsource": "GENTOO",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" "url": "https://security.gentoo.org/glsa/201612-47"
}, },
{ {
"name" : "USN-2855-2", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-2855-2" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290292"
}, },
{ {
"name" : "USN-2855-1", "name": "https://www.samba.org/samba/security/CVE-2015-5296.html",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/USN-2855-1" "url": "https://www.samba.org/samba/security/CVE-2015-5296.html"
}, },
{ {
"name" : "79732", "name": "USN-2855-1",
"refsource" : "BID", "refsource": "UBUNTU",
"url" : "http://www.securityfocus.com/bid/79732" "url": "http://www.ubuntu.com/usn/USN-2855-1"
}, },
{ {
"name" : "1034493", "name": "openSUSE-SU-2015:2356",
"refsource" : "SECTRACK", "refsource": "SUSE",
"url" : "http://www.securitytracker.com/id/1034493" "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html"
} }
] ]
} }

View File

@ -1,96 +1,96 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "product-security@apple.com",
"ID" : "CVE-2015-5797", "ID": "CVE-2015-5797",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3." "value": "WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://support.apple.com/HT205212", "name": "https://support.apple.com/HT205221",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT205212" "url": "https://support.apple.com/HT205221"
}, },
{ {
"name" : "https://support.apple.com/HT205221", "name": "1033609",
"refsource" : "CONFIRM", "refsource": "SECTRACK",
"url" : "https://support.apple.com/HT205221" "url": "http://www.securitytracker.com/id/1033609"
}, },
{ {
"name" : "https://support.apple.com/HT205265", "name": "https://support.apple.com/HT205212",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://support.apple.com/HT205265" "url": "https://support.apple.com/HT205212"
}, },
{ {
"name" : "APPLE-SA-2015-09-16-1", "name": "76763",
"refsource" : "APPLE", "refsource": "BID",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html" "url": "http://www.securityfocus.com/bid/76763"
}, },
{ {
"name" : "APPLE-SA-2015-09-16-3", "name": "https://support.apple.com/HT205265",
"refsource" : "APPLE", "refsource": "CONFIRM",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html" "url": "https://support.apple.com/HT205265"
}, },
{ {
"name" : "APPLE-SA-2015-09-30-2", "name": "APPLE-SA-2015-09-16-3",
"refsource" : "APPLE", "refsource": "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html"
}, },
{ {
"name" : "76763", "name": "APPLE-SA-2015-09-30-2",
"refsource" : "BID", "refsource": "APPLE",
"url" : "http://www.securityfocus.com/bid/76763" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html"
}, },
{ {
"name" : "1033609", "name": "APPLE-SA-2015-09-16-1",
"refsource" : "SECTRACK", "refsource": "APPLE",
"url" : "http://www.securitytracker.com/id/1033609" "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-3429", "ID": "CVE-2018-3429",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-3503", "ID": "CVE-2018-3503",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-3614", "ID": "CVE-2018-3614",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "support@hackerone.com", "ASSIGNER": "support@hackerone.com",
"ID" : "CVE-2018-3785", "ID": "CVE-2018-3785",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "git-dummy-commit", "product_name": "git-dummy-commit",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Not fixed" "version_value": "Not fixed"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "https://github.com/stevemao" "vendor_name": "https://github.com/stevemao"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter." "value": "A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "OS Command Injection (CWE-78)" "value": "OS Command Injection (CWE-78)"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://hackerone.com/reports/341710", "name": "https://hackerone.com/reports/341710",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://hackerone.com/reports/341710" "url": "https://hackerone.com/reports/341710"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-6423", "ID": "CVE-2018-6423",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,101 +1,101 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "security@ubuntu.com", "ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC" : "2018-07-11T16:00:00.000Z", "DATE_PUBLIC": "2018-07-11T16:00:00.000Z",
"ID" : "CVE-2018-6553", "ID": "CVE-2018-6553",
"STATE" : "PUBLIC", "STATE": "PUBLIC",
"TITLE" : "AppArmor cupsd Sandbox Bypass Due to Use of Hard Links" "TITLE": "AppArmor cupsd Sandbox Bypass Due to Use of Hard Links"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "cups", "product_name": "cups",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"affected" : "<", "affected": "<",
"platform" : "Ubuntu 18.04 LTS", "platform": "Ubuntu 18.04 LTS",
"version_value" : "2.2.7-1ubuntu2.1" "version_value": "2.2.7-1ubuntu2.1"
}, },
{ {
"affected" : "<", "affected": "<",
"platform" : "Ubuntu 17.10", "platform": "Ubuntu 17.10",
"version_value" : "2.2.4-7ubuntu3.1" "version_value": "2.2.4-7ubuntu3.1"
}, },
{ {
"affected" : "<", "affected": "<",
"platform" : "Ubuntu 16.04 LTS", "platform": "Ubuntu 16.04 LTS",
"version_value" : "2.1.3-4ubuntu0.5" "version_value": "2.1.3-4ubuntu0.5"
}, },
{ {
"affected" : "<", "affected": "<",
"platform" : "Ubuntu 14.04 LTS", "platform": "Ubuntu 14.04 LTS",
"version_value" : "1.7.2-0ubuntu1.10" "version_value": "1.7.2-0ubuntu1.10"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"credit" : [ "credit": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Dan Bastone" "value": "Dan Bastone"
} }
], ],
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS." "value": "The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Escape from sandbox confinement" "value": "Escape from sandbox confinement"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[debian-lts-announce] 20180714 [SECURITY] [DLA 1426-1] cups security update", "name": "USN-3713-1",
"refsource" : "MLIST", "refsource": "UBUNTU",
"url" : "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html" "url": "https://usn.ubuntu.com/usn/usn-3713-1"
}, },
{ {
"name" : "DSA-4243", "name": "DSA-4243",
"refsource" : "DEBIAN", "refsource": "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4243" "url": "https://www.debian.org/security/2018/dsa-4243"
}, },
{ {
"name" : "USN-3713-1", "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1426-1] cups security update",
"refsource" : "UBUNTU", "refsource": "MLIST",
"url" : "https://usn.ubuntu.com/usn/usn-3713-1" "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html"
} }
] ]
}, },
"source" : { "source": {
"advisory" : "USN-3713-1", "advisory": "USN-3713-1",
"discovery" : "EXTERNAL" "discovery": "EXTERNAL"
} }
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-6910", "ID": "CVE-2018-6910",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php." "value": "DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md", "name": "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md" "url": "https://github.com/kongxin520/DedeCMS/blob/master/DedeCMS_5.7_Bug.md"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-7188", "ID": "CVE-2018-7188",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An XSS vulnerability (via an SVG image) in Tiki before 18 allows an authenticated user to gain administrator privileges if an administrator opens a wiki page with a malicious SVG image, related to lib/filegals/filegallib.php." "value": "An XSS vulnerability (via an SVG image) in Tiki before 18 allows an authenticated user to gain administrator privileges if an administrator opens a wiki page with a malicious SVG image, related to lib/filegals/filegallib.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://openwall.com/lists/oss-security/2018/02/16/1", "name": "https://sourceforge.net/p/tikiwiki/code/65327",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://openwall.com/lists/oss-security/2018/02/16/1" "url": "https://sourceforge.net/p/tikiwiki/code/65327"
}, },
{ {
"name" : "https://sourceforge.net/p/tikiwiki/code/65327", "name": "http://openwall.com/lists/oss-security/2018/02/16/1",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://sourceforge.net/p/tikiwiki/code/65327" "url": "http://openwall.com/lists/oss-security/2018/02/16/1"
} }
] ]
} }

View File

@ -1,99 +1,99 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"AKA" : "", "AKA": "",
"ASSIGNER" : "mlhess@drupal.org", "ASSIGNER": "security@drupal.org",
"DATE_PUBLIC" : "", "DATE_PUBLIC": "",
"ID" : "CVE-2018-7603", "ID": "CVE-2018-7603",
"STATE" : "PUBLIC", "STATE": "PUBLIC",
"TITLE" : "Search Autocomplete " "TITLE": "Search Autocomplete "
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "3rd party module - Search Autocomplete", "product_name": "3rd party module - Search Autocomplete",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"affected" : "<", "affected": "<",
"platform" : "", "platform": "",
"version_name" : "7.x-4.x", "version_name": "7.x-4.x",
"version_value" : "7.x-4.8" "version_value": "7.x-4.8"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Drupal" "vendor_name": "Drupal"
} }
] ]
} }
}, },
"configuration" : [], "configuration": [],
"credit" : [ "credit": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Reported By: Simon Kapadia Fixed By: Dominique CLAUSE" "value": "Reported By: Simon Kapadia Fixed By: Dominique CLAUSE"
} }
], ],
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "In Drupal's 3rd party module search auto complete prior to versions 7.x-4.8 there is a Cross Site Scripting vulnerability. This Search Autocomplete module enables you to autocomplete textfield using data from your website (nodes, comments, etc.). The module doesn't sufficiently filter user-entered text among the autocompletion items leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability can be exploited by any user allowed to create one of the autocompletion item, for instance, nodes, users, comments." "value": "In Drupal's 3rd party module search auto complete prior to versions 7.x-4.8 there is a Cross Site Scripting vulnerability. This Search Autocomplete module enables you to autocomplete textfield using data from your website (nodes, comments, etc.). The module doesn't sufficiently filter user-entered text among the autocompletion items leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability can be exploited by any user allowed to create one of the autocompletion item, for instance, nodes, users, comments."
} }
] ]
}, },
"exploit" : [], "exploit": [],
"impact" : { "impact": {
"cvss" : { "cvss": {
"attackComplexity" : "HIGH", "attackComplexity": "HIGH",
"attackVector" : "PHYSICAL", "attackVector": "PHYSICAL",
"availabilityImpact" : "NONE", "availabilityImpact": "NONE",
"baseScore" : 0, "baseScore": 0,
"baseSeverity" : "NONE", "baseSeverity": "NONE",
"confidentialityImpact" : "NONE", "confidentialityImpact": "NONE",
"integrityImpact" : "NONE", "integrityImpact": "NONE",
"privilegesRequired" : "HIGH", "privilegesRequired": "HIGH",
"scope" : "UNCHANGED", "scope": "UNCHANGED",
"userInteraction" : "REQUIRED", "userInteraction": "REQUIRED",
"vectorString" : "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N",
"version" : "3.0" "version": "3.0"
} }
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "A vulnerability in search auto complete a 3rd party Druapl contributed module. Search Autocomplete allows an attacker to execute javascript code to causing xss. Affected releases are Drupal 3rd party module - Search Autocomplete: versions prior to 7.x-4.8." "value": "A vulnerability in search auto complete a 3rd party Druapl contributed module. Search Autocomplete allows an attacker to execute javascript code to causing xss. Affected releases are Drupal 3rd party module - Search Autocomplete: versions prior to 7.x-4.8."
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://www.drupal.org/sa-contrib-2018-070", "name": "https://www.drupal.org/sa-contrib-2018-070",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://www.drupal.org/sa-contrib-2018-070" "url": "https://www.drupal.org/sa-contrib-2018-070"
} }
] ]
}, },
"solution" : [], "solution": [],
"source" : { "source": {
"advisory" : "https://www.drupal.org/sa-contrib-2018-070", "advisory": "https://www.drupal.org/sa-contrib-2018-070",
"defect" : [], "defect": [],
"discovery" : "UNKNOWN" "discovery": "UNKNOWN"
}, },
"work_around" : [] "work_around": []
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-7723", "ID": "CVE-2018-7723",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The management panel in Piwigo 2.9.3 has stored XSS via the virtual_name parameter in a /admin.php?page=cat_list request, a different issue than CVE-2017-9836. CSRF exploitation, related to CVE-2017-10681, may be possible." "value": "The management panel in Piwigo 2.9.3 has stored XSS via the virtual_name parameter in a /admin.php?page=cat_list request, a different issue than CVE-2017-9836. CSRF exploitation, related to CVE-2017-10681, may be possible."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://github.com/summ3rf/Vulner/blob/master/Piwigo%20Store%20XSS.md", "name": "https://github.com/summ3rf/Vulner/blob/master/Piwigo%20Store%20XSS.md",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://github.com/summ3rf/Vulner/blob/master/Piwigo%20Store%20XSS.md" "url": "https://github.com/summ3rf/Vulner/blob/master/Piwigo%20Store%20XSS.md"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-7738", "ID": "CVE-2018-7738",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion." "value": "In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://bugs.debian.org/892179", "name": "https://github.com/karelzak/util-linux/issues/539",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://bugs.debian.org/892179" "url": "https://github.com/karelzak/util-linux/issues/539"
}, },
{ {
"name" : "https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55", "name": "DSA-4134",
"refsource" : "MISC", "refsource": "DEBIAN",
"url" : "https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55" "url": "https://www.debian.org/security/2018/dsa-4134"
}, },
{ {
"name" : "https://github.com/karelzak/util-linux/issues/539", "name": "103367",
"refsource" : "MISC", "refsource": "BID",
"url" : "https://github.com/karelzak/util-linux/issues/539" "url": "http://www.securityfocus.com/bid/103367"
}, },
{ {
"name" : "DSA-4134", "name": "https://bugs.debian.org/892179",
"refsource" : "DEBIAN", "refsource": "MISC",
"url" : "https://www.debian.org/security/2018/dsa-4134" "url": "https://bugs.debian.org/892179"
}, },
{ {
"name" : "103367", "name": "https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/103367" "url": "https://github.com/karelzak/util-linux/commit/75f03badd7ed9f1dd951863d75e756883d3acc55"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cybersecurity@se.com", "ASSIGNER": "cybersecurity@schneider-electric.com",
"ID" : "CVE-2018-7835", "ID": "CVE-2018-7835",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "IIoT Monitor 3.1.38", "product_name": "IIoT Monitor 3.1.38",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "IIoT Monitor 3.1.38" "version_value": "IIoT Monitor 3.1.38"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Schneider Electric SE" "vendor_name": "Schneider Electric SE"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in IIoT Monitor 3.1.38 which could allow access to files available to SYSTEM user." "value": "An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in IIoT Monitor 3.1.38 which could allow access to files available to SYSTEM user."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/", "name": "106484",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/" "url": "http://www.securityfocus.com/bid/106484"
}, },
{ {
"name" : "106484", "name": "https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/106484" "url": "https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/"
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-8802", "ID": "CVE-2018-8802",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in the management interface in ePortal Manager allows remote attackers to execute arbitrary SQL commands via unspecified parameters." "value": "SQL injection vulnerability in the management interface in ePortal Manager allows remote attackers to execute arbitrary SQL commands via unspecified parameters."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=49", "name": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=49",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=49" "url": "https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=49"
} }
] ]
} }