"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-23 20:01:03 +00:00
parent 7ab39a1484
commit bfa41a9942
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
94 changed files with 7586 additions and 7493 deletions

View File

@ -1,100 +1,101 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2014-9654",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-9654",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923."
"lang": "eng",
"value": "The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://bugs.icu-project.org/trac/ticket/11371",
"refsource":"CONFIRM",
"url":"http://bugs.icu-project.org/trac/ticket/11371"
"name": "http://bugs.icu-project.org/trac/ticket/11371",
"refsource": "CONFIRM",
"url": "http://bugs.icu-project.org/trac/ticket/11371"
},
{
"name":"https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5",
"refsource":"CONFIRM",
"url":"https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5"
"name": "https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5",
"refsource": "CONFIRM",
"url": "https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5"
},
{
"name":"https://code.google.com/p/chromium/issues/detail?id=432209",
"refsource":"CONFIRM",
"url":"https://code.google.com/p/chromium/issues/detail?id=432209"
"name": "https://code.google.com/p/chromium/issues/detail?id=432209",
"refsource": "CONFIRM",
"url": "https://code.google.com/p/chromium/issues/detail?id=432209"
},
{
"name":"1035410",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1035410"
"name": "1035410",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1035410"
},
{
"name":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"
},
{
"name":"GLSA-201503-06",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201503-06"
"name": "GLSA-201503-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201503-06"
},
{
"name":"http://bugs.icu-project.org/trac/changeset/36801",
"refsource":"CONFIRM",
"url":"http://bugs.icu-project.org/trac/changeset/36801"
"name": "http://bugs.icu-project.org/trac/changeset/36801",
"refsource": "CONFIRM",
"url": "http://bugs.icu-project.org/trac/changeset/36801"
},
{
"name":"[oss-security] 20150205 Re: CVE request - ICU",
"refsource":"MLIST",
"url":"http://openwall.com/lists/oss-security/2015/02/05/15"
"name": "[oss-security] 20150205 Re: CVE request - ICU",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2015/02/05/15"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,95 +1,96 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2014-9911",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-9911",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Stack-based buffer overflow in the ures_getByKeyWithFallback function in common/uresbund.cpp in International Components for Unicode (ICU) before 54.1 for C/C++ allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted uloc_getDisplayName call."
"lang": "eng",
"value": "Stack-based buffer overflow in the ures_getByKeyWithFallback function in common/uresbund.cpp in International Components for Unicode (ICU) before 54.1 for C/C++ allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted uloc_getDisplayName call."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://bugs.icu-project.org/trac/changeset/35699",
"refsource":"CONFIRM",
"url":"http://bugs.icu-project.org/trac/changeset/35699"
"name": "http://bugs.icu-project.org/trac/changeset/35699",
"refsource": "CONFIRM",
"url": "http://bugs.icu-project.org/trac/changeset/35699"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1383569",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1383569"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1383569",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383569"
},
{
"name":"1037556",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037556"
"name": "1037556",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037556"
},
{
"name":"94520",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/94520"
"name": "94520",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94520"
},
{
"name":"[oss-security] 20161124 Re: CVE request: icu: stack-based buffer overflow in uloc_getDisplayName",
"refsource":"MLIST",
"url":"http://www.openwall.com/lists/oss-security/2016/11/25/1"
"name": "[oss-security] 20161124 Re: CVE request: icu: stack-based buffer overflow in uloc_getDisplayName",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/25/1"
},
{
"name":"https://bugs.php.net/bug.php?id=67397",
"refsource":"CONFIRM",
"url":"https://bugs.php.net/bug.php?id=67397"
"name": "https://bugs.php.net/bug.php?id=67397",
"refsource": "CONFIRM",
"url": "https://bugs.php.net/bug.php?id=67397"
},
{
"name":"http://bugs.icu-project.org/trac/ticket/1089",
"refsource":"CONFIRM",
"url":"http://bugs.icu-project.org/trac/ticket/1089"
"name": "http://bugs.icu-project.org/trac/ticket/1089",
"refsource": "CONFIRM",
"url": "http://bugs.icu-project.org/trac/ticket/1089"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2015-1832",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1832",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"XML external entity (XXE) vulnerability in the SqlXmlUtil code in Apache Derby before 10.12.1.1, when a Java Security Manager is not in place, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving XmlVTI and the XML datatype."
"lang": "eng",
"value": "XML external entity (XXE) vulnerability in the SqlXmlUtil code in Apache Derby before 10.12.1.1, when a Java Security Manager is not in place, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving XmlVTI and the XML datatype."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://issues.apache.org/jira/browse/DERBY-6807",
"refsource":"CONFIRM",
"url":"https://issues.apache.org/jira/browse/DERBY-6807"
"name": "https://issues.apache.org/jira/browse/DERBY-6807",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/DERBY-6807"
},
{
"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21990100",
"refsource":"CONFIRM",
"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21990100"
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21990100",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21990100"
},
{
"name":"93132",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/93132"
"name": "93132",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93132"
},
{
"name":"https://svn.apache.org/viewvc?view=revision&revision=1691461",
"refsource":"CONFIRM",
"url":"https://svn.apache.org/viewvc?view=revision&revision=1691461"
"name": "https://svn.apache.org/viewvc?view=revision&revision=1691461",
"refsource": "CONFIRM",
"url": "https://svn.apache.org/viewvc?view=revision&revision=1691461"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,160 +1,161 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2015-3253",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3253",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object."
"lang": "eng",
"value": "The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"RHSA-2017:2596",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2596"
"name": "RHSA-2017:2596",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2596"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name":"RHSA-2016:1376",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1376"
"name": "RHSA-2016:1376",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"name":"GLSA-201610-01",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201610-01"
"name": "GLSA-201610-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201610-01"
},
{
"name":"http://groovy-lang.org/security.html",
"refsource":"CONFIRM",
"url":"http://groovy-lang.org/security.html"
"name": "http://groovy-lang.org/security.html",
"refsource": "CONFIRM",
"url": "http://groovy-lang.org/security.html"
},
{
"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"refsource":"CONFIRM",
"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755"
},
{
"name":"http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html",
"refsource":"MISC",
"url":"http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html"
"name": "http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/132714/Apache-Groovy-2.4.3-Code-Execution.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20160623-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20160623-0001/"
"name": "https://security.netapp.com/advisory/ntap-20160623-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20160623-0001/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"RHSA-2016:0066",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-0066.html"
"name": "RHSA-2016:0066",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-0066.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
},
{
"name":"91787",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/91787"
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name":"http://www.zerodayinitiative.com/advisories/ZDI-15-365/",
"refsource":"MISC",
"url":"http://www.zerodayinitiative.com/advisories/ZDI-15-365/"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-15-365/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-365/"
},
{
"name":"RHSA-2017:2486",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2486"
"name": "RHSA-2017:2486",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2486"
},
{
"name":"1034815",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1034815"
"name": "1034815",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1034815"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name":"75919",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/75919"
"name": "75919",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/75919"
},
{
"name":"20150716 [CVE-2015-3253] Apache Groovy Zero-Day Vulnerability Disclosure",
"refsource":"BUGTRAQ",
"url":"http://www.securityfocus.com/archive/1/536012/100/0/threaded"
"name": "20150716 [CVE-2015-3253] Apache Groovy Zero-Day Vulnerability Disclosure",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/536012/100/0/threaded"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,90 +1,91 @@
{
"CVE_data_meta":{
"ASSIGNER":"product-security@apple.com",
"ID":"CVE-2015-5922",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2015-5922",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Unspecified vulnerability in International Components for Unicode (ICU) before 53.1.0, as used in Apple OS X before 10.11 and watchOS before 2, has unknown impact and attack vectors."
"lang": "eng",
"value": "Unspecified vulnerability in International Components for Unicode (ICU) before 53.1.0, as used in Apple OS X before 10.11 and watchOS before 2, has unknown impact and attack vectors."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"1033703",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1033703"
"name": "1033703",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033703"
},
{
"name":"APPLE-SA-2015-09-30-3",
"refsource":"APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
"name": "APPLE-SA-2015-09-30-3",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"
},
{
"name":"https://support.apple.com/HT205267",
"refsource":"CONFIRM",
"url":"https://support.apple.com/HT205267"
"name": "https://support.apple.com/HT205267",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205267"
},
{
"name":"APPLE-SA-2015-09-21-1",
"refsource":"APPLE",
"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
"name": "APPLE-SA-2015-09-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html"
},
{
"name":"https://support.apple.com/HT205213",
"refsource":"CONFIRM",
"url":"https://support.apple.com/HT205213"
"name": "https://support.apple.com/HT205213",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT205213"
},
{
"name":"76911",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/76911"
"name": "76911",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/76911"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,110 +1,111 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2015-9251",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9251",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed."
"lang": "eng",
"value": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/jquery/jquery/issues/2432",
"refsource":"MISC",
"url":"https://github.com/jquery/jquery/issues/2432"
"name": "https://github.com/jquery/jquery/issues/2432",
"refsource": "MISC",
"url": "https://github.com/jquery/jquery/issues/2432"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf",
"refsource":"MISC",
"url":"https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf"
"name": "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf",
"refsource": "MISC",
"url": "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf"
},
{
"name":"https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2",
"refsource":"MISC",
"url":"https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2"
"name": "https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2",
"refsource": "MISC",
"url": "https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2"
},
{
"name":"https://snyk.io/vuln/npm:jquery:20150627",
"refsource":"MISC",
"url":"https://snyk.io/vuln/npm:jquery:20150627"
"name": "https://snyk.io/vuln/npm:jquery:20150627",
"refsource": "MISC",
"url": "https://snyk.io/vuln/npm:jquery:20150627"
},
{
"name":"https://github.com/jquery/jquery/pull/2588",
"refsource":"MISC",
"url":"https://github.com/jquery/jquery/pull/2588"
"name": "https://github.com/jquery/jquery/pull/2588",
"refsource": "MISC",
"url": "https://github.com/jquery/jquery/pull/2588"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"105658",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105658"
"name": "105658",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105658"
},
{
"name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04",
"refsource":"MISC",
"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04"
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04"
},
{
"name":"https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc",
"refsource":"MISC",
"url":"https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc"
"name": "https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc",
"refsource": "MISC",
"url": "https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,115 +1,116 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2016-1000031",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1000031",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution"
"lang": "eng",
"value": "Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution"
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"93604",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/93604"
"name": "93604",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93604"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190212-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190212-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190212-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190212-0001/"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://issues.apache.org/jira/browse/WW-4812",
"refsource":"CONFIRM",
"url":"https://issues.apache.org/jira/browse/WW-4812"
"name": "https://issues.apache.org/jira/browse/WW-4812",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/WW-4812"
},
{
"name":"http://www.zerodayinitiative.com/advisories/ZDI-16-570/",
"refsource":"MISC",
"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-570/"
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-570/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-570/"
},
{
"name":"https://www.tenable.com/security/research/tra-2016-30",
"refsource":"MISC",
"url":"https://www.tenable.com/security/research/tra-2016-30"
"name": "https://www.tenable.com/security/research/tra-2016-30",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2016-30"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"https://www.tenable.com/security/research/tra-2016-12",
"refsource":"MISC",
"url":"https://www.tenable.com/security/research/tra-2016-12"
"name": "https://www.tenable.com/security/research/tra-2016-12",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2016-12"
},
{
"name":"https://issues.apache.org/jira/browse/FILEUPLOAD-279",
"refsource":"CONFIRM",
"url":"https://issues.apache.org/jira/browse/FILEUPLOAD-279"
"name": "https://issues.apache.org/jira/browse/FILEUPLOAD-279",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/FILEUPLOAD-279"
},
{
"name":"https://www.tenable.com/security/research/tra-2016-23",
"refsource":"MISC",
"url":"https://www.tenable.com/security/research/tra-2016-23"
"name": "https://www.tenable.com/security/research/tra-2016-23",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2016-23"
},
{
"name":"[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior",
"refsource":"MLIST",
"url":"https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080@%3Cannounce.apache.org%3E"
"name": "[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080@%3Cannounce.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,145 +1,146 @@
{
"CVE_data_meta":{
"ASSIGNER":"vultures@jpcert.or.jp",
"ID":"CVE-2016-1181",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1181",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899."
"lang": "eng",
"value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"JVNDB-2016-000096",
"refsource":"JVNDB",
"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000096"
"name": "JVNDB-2016-000096",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000096"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180629-0006/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180629-0006/"
"name": "https://security.netapp.com/advisory/ntap-20180629-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180629-0006/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name":"https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8",
"refsource":"CONFIRM",
"url":"https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8"
"name": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8",
"refsource": "CONFIRM",
"url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1343538",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343538"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538"
},
{
"name":"91068",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/91068"
"name": "91068",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91068"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"1036056",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1036056"
"name": "1036056",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036056"
},
{
"name":"JVN#03188560",
"refsource":"JVN",
"url":"http://jvn.jp/en/jp/JVN03188560/index.html"
"name": "JVN#03188560",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN03188560/index.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"91787",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/91787"
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name":"https://security-tracker.debian.org/tracker/CVE-2016-1181",
"refsource":"CONFIRM",
"url":"https://security-tracker.debian.org/tracker/CVE-2016-1181"
"name": "https://security-tracker.debian.org/tracker/CVE-2016-1181",
"refsource": "CONFIRM",
"url": "https://security-tracker.debian.org/tracker/CVE-2016-1181"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,140 +1,141 @@
{
"CVE_data_meta":{
"ASSIGNER":"vultures@jpcert.or.jp",
"ID":"CVE-2016-1182",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2016-1182",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899."
"lang": "eng",
"value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"JVNDB-2016-000097",
"refsource":"JVNDB",
"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000097"
"name": "JVNDB-2016-000097",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000097"
},
{
"name":"JVN#65044642",
"refsource":"JVN",
"url":"http://jvn.jp/en/jp/JVN65044642/index.html"
"name": "JVN#65044642",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN65044642/index.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180629-0006/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180629-0006/"
"name": "https://security.netapp.com/advisory/ntap-20180629-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180629-0006/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
},
{
"name":"https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8",
"refsource":"CONFIRM",
"url":"https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8"
"name": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8",
"refsource": "CONFIRM",
"url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"1036056",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1036056"
"name": "1036056",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036056"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1343540",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343540"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540"
},
{
"name":"91067",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/91067"
"name": "91067",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91067"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"91787",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/91787"
"name": "91787",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91787"
},
{
"name":"https://security-tracker.debian.org/tracker/CVE-2016-1182",
"refsource":"CONFIRM",
"url":"https://security-tracker.debian.org/tracker/CVE-2016-1182"
"name": "https://security-tracker.debian.org/tracker/CVE-2016-1182",
"refsource": "CONFIRM",
"url": "https://security-tracker.debian.org/tracker/CVE-2016-1182"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,170 +1,171 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2016-2141",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-2141",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors."
"lang": "eng",
"value": "JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2016:1347",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1347"
"name": "RHSA-2016:1347",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1347"
},
{
"name":"RHSA-2016:2035",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2035.html"
"name": "RHSA-2016:2035",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2035.html"
},
{
"name":"RHSA-2016:1389",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1389"
"name": "RHSA-2016:1389",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1389"
},
{
"name":"RHSA-2016:1345",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1345"
"name": "RHSA-2016:1345",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1345"
},
{
"name":"RHSA-2016:1376",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1376"
"name": "RHSA-2016:1376",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1376"
},
{
"name":"RHSA-2016:1330",
"refsource":"REDHAT",
"url":"https://rhn.redhat.com/errata/RHSA-2016-1330.html"
"name": "RHSA-2016:1330",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1330.html"
},
{
"name":"RHSA-2016:1439",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-1439.html"
"name": "RHSA-2016:1439",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1439.html"
},
{
"name":"RHSA-2016:1331",
"refsource":"REDHAT",
"url":"https://rhn.redhat.com/errata/RHSA-2016-1331.html"
"name": "RHSA-2016:1331",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1331.html"
},
{
"name":"91481",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/91481"
"name": "91481",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91481"
},
{
"name":"RHSA-2016:1434",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1434"
"name": "RHSA-2016:1434",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1434"
},
{
"name":"RHSA-2016:1328",
"refsource":"REDHAT",
"url":"https://rhn.redhat.com/errata/RHSA-2016-1328.html"
"name": "RHSA-2016:1328",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1328.html"
},
{
"name":"RHSA-2016:1433",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1433"
"name": "RHSA-2016:1433",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1433"
},
{
"name":"https://issues.jboss.org/browse/JGRP-2021",
"refsource":"CONFIRM",
"url":"https://issues.jboss.org/browse/JGRP-2021"
"name": "https://issues.jboss.org/browse/JGRP-2021",
"refsource": "CONFIRM",
"url": "https://issues.jboss.org/browse/JGRP-2021"
},
{
"name":"RHSA-2016:1374",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1374"
"name": "RHSA-2016:1374",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1374"
},
{
"name":"RHSA-2016:1432",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1432"
"name": "RHSA-2016:1432",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1432"
},
{
"name":"RHSA-2016:1346",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2016:1346"
"name": "RHSA-2016:1346",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2016:1346"
},
{
"name":"RHSA-2016:1334",
"refsource":"REDHAT",
"url":"https://rhn.redhat.com/errata/RHSA-2016-1334.html"
"name": "RHSA-2016:1334",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1334.html"
},
{
"name":"RHSA-2016:1333",
"refsource":"REDHAT",
"url":"https://rhn.redhat.com/errata/RHSA-2016-1333.html"
"name": "RHSA-2016:1333",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1333.html"
},
{
"name":"RHSA-2016:1329",
"refsource":"REDHAT",
"url":"https://rhn.redhat.com/errata/RHSA-2016-1329.html"
"name": "RHSA-2016:1329",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1329.html"
},
{
"name":"RHSA-2016:1332",
"refsource":"REDHAT",
"url":"https://rhn.redhat.com/errata/RHSA-2016-1332.html"
"name": "RHSA-2016:1332",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2016-1332.html"
},
{
"name":"RHSA-2016:1435",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-1435.html"
"name": "RHSA-2016:1435",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-1435.html"
},
{
"name":"1036165",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1036165"
"name": "1036165",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036165"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,285 +1,286 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2016-3092",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3092",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string."
"lang": "eng",
"value": "The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"JVNDB-2016-000121",
"refsource":"JVNDB",
"url":"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121"
"name": "JVNDB-2016-000121",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190212-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190212-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190212-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190212-0001/"
},
{
"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759",
"refsource":"CONFIRM",
"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759"
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1743480",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1743480"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743480",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743480"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"GLSA-201705-09",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201705-09"
"name": "GLSA-201705-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-09"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1743738",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1743738"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743738",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743738"
},
{
"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840",
"refsource":"CONFIRM",
"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840"
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840"
},
{
"name":"http://tomcat.apache.org/security-9.html",
"refsource":"CONFIRM",
"url":"http://tomcat.apache.org/security-9.html"
"name": "http://tomcat.apache.org/security-9.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-9.html"
},
{
"name":"USN-3024-1",
"refsource":"UBUNTU",
"url":"http://www.ubuntu.com/usn/USN-3024-1"
"name": "USN-3024-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3024-1"
},
{
"name":"RHSA-2016:2069",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2069.html"
"name": "RHSA-2016:2069",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2069.html"
},
{
"name":"1037029",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037029"
"name": "1037029",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037029"
},
{
"name":"RHSA-2016:2068",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2068.html"
"name": "RHSA-2016:2068",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2068.html"
},
{
"name":"http://tomcat.apache.org/security-7.html",
"refsource":"CONFIRM",
"url":"http://tomcat.apache.org/security-7.html"
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name":"1036900",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1036900"
"name": "1036900",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036900"
},
{
"name":"91453",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/91453"
"name": "91453",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91453"
},
{
"name":"http://tomcat.apache.org/security-8.html",
"refsource":"CONFIRM",
"url":"http://tomcat.apache.org/security-8.html"
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name":"RHSA-2016:2072",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2072.html"
"name": "RHSA-2016:2072",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2072.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1743722",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1743722"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743722",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743722"
},
{
"name":"DSA-3611",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2016/dsa-3611"
"name": "DSA-3611",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3611"
},
{
"name":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371",
"refsource":"CONFIRM",
"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371"
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371"
},
{
"name":"RHSA-2016:2807",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2807.html"
"name": "RHSA-2016:2807",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2807.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"openSUSE-SU-2016:2252",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html"
"name": "openSUSE-SU-2016:2252",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html"
},
{
"name":"JVN#89379547",
"refsource":"JVN",
"url":"http://jvn.jp/en/jp/JVN89379547/index.html"
"name": "JVN#89379547",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN89379547/index.html"
},
{
"name":"1036427",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1036427"
"name": "1036427",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036427"
},
{
"name":"RHSA-2016:2070",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2070.html"
"name": "RHSA-2016:2070",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2070.html"
},
{
"name":"RHSA-2017:0457",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2017-0457.html"
"name": "RHSA-2017:0457",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html"
},
{
"name":"RHSA-2016:2808",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2808.html"
"name": "RHSA-2016:2808",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2808.html"
},
{
"name":"1039606",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039606"
"name": "1039606",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039606"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1743742",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1743742"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743742",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743742"
},
{
"name":"RHSA-2016:2599",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2599.html"
"name": "RHSA-2016:2599",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2599.html"
},
{
"name":"DSA-3609",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2016/dsa-3609"
"name": "DSA-3609",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3609"
},
{
"name":"RHSA-2017:0455",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:0455"
"name": "RHSA-2017:0455",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0455"
},
{
"name":"DSA-3614",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2016/dsa-3614"
"name": "DSA-3614",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3614"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name":"[dev] 20160621 CVE-2016-3092: Apache Commons Fileupload information disclosure vulnerability",
"refsource":"MLIST",
"url":"http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E"
"name": "[dev] 20160621 CVE-2016-3092: Apache Commons Fileupload information disclosure vulnerability",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E"
},
{
"name":"RHSA-2017:0456",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:0456"
"name": "RHSA-2017:0456",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0456"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1349468",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1349468"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468"
},
{
"name":"RHSA-2016:2071",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2071.html"
"name": "RHSA-2016:2071",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2071.html"
},
{
"name":"USN-3027-1",
"refsource":"UBUNTU",
"url":"http://www.ubuntu.com/usn/USN-3027-1"
"name": "USN-3027-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3027-1"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,120 +1,121 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2016-4000",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-4000",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object."
"lang": "eng",
"value": "Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://security-tracker.debian.org/tracker/CVE-2016-4000",
"refsource":"MISC",
"url":"https://security-tracker.debian.org/tracker/CVE-2016-4000"
"name": "https://security-tracker.debian.org/tracker/CVE-2016-4000",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2016-4000"
},
{
"name":"https://hg.python.org/jython/rev/d06e29d100c0",
"refsource":"CONFIRM",
"url":"https://hg.python.org/jython/rev/d06e29d100c0"
"name": "https://hg.python.org/jython/rev/d06e29d100c0",
"refsource": "CONFIRM",
"url": "https://hg.python.org/jython/rev/d06e29d100c0"
},
{
"name":"https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451",
"refsource":"MISC",
"url":"https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451"
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451"
},
{
"name":"http://bugs.jython.org/issue2454",
"refsource":"CONFIRM",
"url":"http://bugs.jython.org/issue2454"
"name": "http://bugs.jython.org/issue2454",
"refsource": "CONFIRM",
"url": "http://bugs.jython.org/issue2454"
},
{
"name":"DSA-3893",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3893"
"name": "DSA-3893",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3893"
},
{
"name":"https://hg.python.org/jython/file/v2.7.1rc1/NEWS",
"refsource":"CONFIRM",
"url":"https://hg.python.org/jython/file/v2.7.1rc1/NEWS"
"name": "https://hg.python.org/jython/file/v2.7.1rc1/NEWS",
"refsource": "CONFIRM",
"url": "https://hg.python.org/jython/file/v2.7.1rc1/NEWS"
},
{
"name":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859",
"refsource":"CONFIRM",
"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859"
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859",
"refsource": "CONFIRM",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"GLSA-201710-28",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201710-28"
"name": "GLSA-201710-28",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-28"
},
{
"name":"105647",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105647"
"name": "105647",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105647"
},
{
"refsource":"MLIST",
"name":"[infra-devnull] 20190402 [GitHub] [flink] aloyszhang opened pull request #8100: [FLINK-12082] Bump up the jython-standalone version",
"url":"https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E"
"refsource": "MLIST",
"name": "[infra-devnull] 20190402 [GitHub] [flink] aloyszhang opened pull request #8100: [FLINK-12082] Bump up the jython-standalone version",
"url": "https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2016-6293",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-6293",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument."
"lang": "eng",
"value": "The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4",
"refsource":"MISC",
"url":"http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4"
"name": "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4",
"refsource": "MISC",
"url": "http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4"
},
{
"name":"https://bugs.php.net/72533",
"refsource":"MISC",
"url":"https://bugs.php.net/72533"
"name": "https://bugs.php.net/72533",
"refsource": "MISC",
"url": "https://bugs.php.net/72533"
},
{
"name":"GLSA-201701-58",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201701-58"
"name": "GLSA-201701-58",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-58"
},
{
"name":"[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
"refsource":"MLIST",
"url":"http://openwall.com/lists/oss-security/2016/07/24/2"
"name": "[oss-security] 20160724 Re: Fwd: CVE for PHP 5.5.38 issues",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2016/07/24/2"
},
{
"name":"92127",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/92127"
"name": "92127",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92127"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,130 +1,131 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2016-7055",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-7055",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected."
"lang": "eng",
"value": "There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2018:2185",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2185"
"name": "RHSA-2018:2185",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2185"
},
{
"name":"RHSA-2018:2186",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2186"
"name": "RHSA-2018:2186",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2186"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us",
"refsource":"CONFIRM",
"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us"
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us"
},
{
"name":"FreeBSD-SA-17:02",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"
"name": "FreeBSD-SA-17:02",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"https://www.tenable.com/security/tns-2017-04",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-04"
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name":"GLSA-201702-07",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201702-07"
"name": "GLSA-201702-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-07"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name":"94242",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/94242"
"name": "94242",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94242"
},
{
"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us",
"refsource":"CONFIRM",
"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us"
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us"
},
{
"name":"RHSA-2018:2187",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2187"
"name": "RHSA-2018:2187",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
},
{
"name":"https://www.openssl.org/news/secadv/20161110.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20161110.txt"
"name": "https://www.openssl.org/news/secadv/20161110.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20161110.txt"
},
{
"name":"1037261",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037261"
"name": "1037261",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037261"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,120 +1,121 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2016-7103",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-7103",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function."
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2017:0161",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2017-0161.html"
"name": "RHSA-2017:0161",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0161.html"
},
{
"name":"https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6",
"refsource":"CONFIRM",
"url":"https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6"
"name": "https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6",
"refsource": "CONFIRM",
"url": "https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"RHSA-2016:2933",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2933.html"
"name": "RHSA-2016:2933",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2933.html"
},
{
"name":"https://github.com/jquery/api.jqueryui.com/issues/281",
"refsource":"CONFIRM",
"url":"https://github.com/jquery/api.jqueryui.com/issues/281"
"name": "https://github.com/jquery/api.jqueryui.com/issues/281",
"refsource": "CONFIRM",
"url": "https://github.com/jquery/api.jqueryui.com/issues/281"
},
{
"name":"RHSA-2016:2932",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2016-2932.html"
"name": "RHSA-2016:2932",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2932.html"
},
{
"name":"https://nodesecurity.io/advisories/127",
"refsource":"MISC",
"url":"https://nodesecurity.io/advisories/127"
"name": "https://nodesecurity.io/advisories/127",
"refsource": "MISC",
"url": "https://nodesecurity.io/advisories/127"
},
{
"name":"https://www.tenable.com/security/tns-2016-19",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2016-19"
"name": "https://www.tenable.com/security/tns-2016-19",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-19"
},
{
"name":"104823",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104823"
"name": "104823",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104823"
},
{
"name":"https://jqueryui.com/changelog/1.12.0/",
"refsource":"CONFIRM",
"url":"https://jqueryui.com/changelog/1.12.0/"
"name": "https://jqueryui.com/changelog/1.12.0/",
"refsource": "CONFIRM",
"url": "https://jqueryui.com/changelog/1.12.0/"
},
{
"refsource":"CONFIRM",
"name":"https://security.netapp.com/advisory/ntap-20190416-0007/",
"url":"https://security.netapp.com/advisory/ntap-20190416-0007/"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190416-0007/",
"url": "https://security.netapp.com/advisory/ntap-20190416-0007/"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2016-7415",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-7415",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Stack-based buffer overflow in the Locale class in common/locid.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long locale string."
"lang": "eng",
"value": "Stack-based buffer overflow in the Locale class in common/locid.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long locale string."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://bugs.php.net/bug.php?id=73007",
"refsource":"MISC",
"url":"https://bugs.php.net/bug.php?id=73007"
"name": "https://bugs.php.net/bug.php?id=73007",
"refsource": "MISC",
"url": "https://bugs.php.net/bug.php?id=73007"
},
{
"name":"[oss-security] 20160915 Re: CVE assignment for PHP 5.6.26 and 7.0.11",
"refsource":"MLIST",
"url":"http://www.openwall.com/lists/oss-security/2016/09/15/10"
"name": "[oss-security] 20160915 Re: CVE assignment for PHP 5.6.26 and 7.0.11",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/09/15/10"
},
{
"name":"GLSA-201701-58",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201701-58"
"name": "GLSA-201701-58",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-58"
},
{
"name":"https://www.tenable.com/security/tns-2016-19",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2016-19"
"name": "https://www.tenable.com/security/tns-2016-19",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-19"
},
{
"name":"93022",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/93022"
"name": "93022",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93022"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,222 +1,223 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"ID":"CVE-2016-8735",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2016-8735",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tomcat",
"version":{
"version_data":[
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value":"before 6.0.48"
"version_value": "before 6.0.48"
},
{
"version_value":"7.x before 7.0.73"
"version_value": "7.x before 7.0.73"
},
{
"version_value":"8.x before 8.0.39"
"version_value": "8.x before 8.0.39"
},
{
"version_value":"8.5.x before 8.5.7"
"version_value": "8.5.x before 8.5.7"
},
{
"version_value":"9.x before 9.0.0.M12"
"version_value": "9.x before 9.0.0.M12"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types."
"lang": "eng",
"value": "Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Remote code execution"
"lang": "eng",
"value": "Remote code execution"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1767676",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1767676"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1767676",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1767676"
},
{
"name":"http://tomcat.apache.org/security-9.html",
"refsource":"CONFIRM",
"url":"http://tomcat.apache.org/security-9.html"
"name": "http://tomcat.apache.org/security-9.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-9.html"
},
{
"name":"1037331",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037331"
"name": "1037331",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037331"
},
{
"name":"94463",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/94463"
"name": "94463",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94463"
},
{
"name":"DSA-3738",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2016/dsa-3738"
"name": "DSA-3738",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3738"
},
{
"name":"http://tomcat.apache.org/security-7.html",
"refsource":"CONFIRM",
"url":"http://tomcat.apache.org/security-7.html"
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1767644",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1767644"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1767644",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1767644"
},
{
"name":"http://tomcat.apache.org/security-8.html",
"refsource":"CONFIRM",
"url":"http://tomcat.apache.org/security-8.html"
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1767656",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1767656"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1767656",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1767656"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180607-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180607-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180607-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180607-0001/"
},
{
"name":"http://tomcat.apache.org/security-6.html",
"refsource":"CONFIRM",
"url":"http://tomcat.apache.org/security-6.html"
"name": "http://tomcat.apache.org/security-6.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-6.html"
},
{
"name":"RHSA-2017:0457",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2017-0457.html"
"name": "RHSA-2017:0457",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html"
},
{
"name":"RHSA-2017:0455",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:0455"
"name": "RHSA-2017:0455",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0455"
},
{
"name":"http://svn.apache.org/viewvc?view=revision&revision=1767684",
"refsource":"CONFIRM",
"url":"http://svn.apache.org/viewvc?view=revision&revision=1767684"
"name": "http://svn.apache.org/viewvc?view=revision&revision=1767684",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1767684"
},
{
"name":"RHSA-2017:0456",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:0456"
"name": "RHSA-2017:0456",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0456"
},
{
"name":"http://seclists.org/oss-sec/2016/q4/502",
"refsource":"CONFIRM",
"url":"http://seclists.org/oss-sec/2016/q4/502"
"name": "http://seclists.org/oss-sec/2016/q4/502",
"refsource": "CONFIRM",
"url": "http://seclists.org/oss-sec/2016/q4/502"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,156 +1,157 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@android.com",
"DATE_PUBLIC":"2017-11-06T00:00:00",
"ID":"CVE-2017-0861",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"DATE_PUBLIC": "2017-11-06T00:00:00",
"ID": "CVE-2017-0861",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Android",
"version":{
"version_data":[
"product_name": "Android",
"version": {
"version_data": [
{
"version_value":"Android kernel"
"version_value": "Android kernel"
}
]
}
}
]
},
"vendor_name":"Google Inc."
"vendor_name": "Google Inc."
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors."
"lang": "eng",
"value": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Elevation of privilege"
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2018:3083",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3083"
"name": "RHSA-2018:3083",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3083"
},
{
"name":"DSA-4187",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4187"
"name": "DSA-4187",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name":"USN-3617-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3617-1/"
"name": "USN-3617-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-1/"
},
{
"name":"USN-3619-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3619-2/"
"name": "USN-3619-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3619-2/"
},
{
"name":"USN-3617-3",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3617-3/"
"name": "USN-3617-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-3/"
},
{
"name":"USN-3583-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3583-2/"
"name": "USN-3583-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3583-2/"
},
{
"name":"USN-3632-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3632-1/"
"name": "USN-3632-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3632-1/"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"USN-3583-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3583-1/"
"name": "USN-3583-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3583-1/"
},
{
"name":"https://source.android.com/security/bulletin/pixel/2017-11-01",
"refsource":"CONFIRM",
"url":"https://source.android.com/security/bulletin/pixel/2017-11-01"
"name": "https://source.android.com/security/bulletin/pixel/2017-11-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2017-11-01"
},
{
"name":"[secure-testing-commits] 20171206 r58306 - data/CVE",
"refsource":"MLIST",
"url":"http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html"
"name": "[secure-testing-commits] 20171206 r58306 - data/CVE",
"refsource": "MLIST",
"url": "http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html"
},
{
"name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229",
"refsource":"CONFIRM",
"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229"
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229",
"refsource": "CONFIRM",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229"
},
{
"name":"[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name":"https://security-tracker.debian.org/tracker/CVE-2017-0861",
"refsource":"CONFIRM",
"url":"https://security-tracker.debian.org/tracker/CVE-2017-0861"
"name": "https://security-tracker.debian.org/tracker/CVE-2017-0861",
"refsource": "CONFIRM",
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0861"
},
{
"name":"USN-3617-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3617-2/"
"name": "USN-3617-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-2/"
},
{
"name":"RHSA-2018:3096",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3096"
"name": "RHSA-2018:3096",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3096"
},
{
"name":"USN-3619-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3619-1/"
"name": "USN-3619-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3619-1/"
},
{
"refsource":"BID",
"name":"102329",
"url":"http://www.securityfocus.com/bid/102329"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "BID",
"name": "102329",
"url": "http://www.securityfocus.com/bid/102329"
}
]
}

View File

@ -1,260 +1,261 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2017-10-03T00:00:00",
"ID":"CVE-2017-12617",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2017-10-03T00:00:00",
"ID": "CVE-2017-12617",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tomcat",
"version":{
"version_data":[
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value":"9.0.0.M1 to 9.0.0"
"version_value": "9.0.0.M1 to 9.0.0"
},
{
"version_value":"8.5.0 to 8.5.22"
"version_value": "8.5.0 to 8.5.22"
},
{
"version_value":"8.0.0.RC1 to 8.0.46"
"version_value": "8.0.0.RC1 to 8.0.46"
},
{
"version_value":"7.0.0 to 7.0.81"
"version_value": "7.0.0 to 7.0.81"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server."
"lang": "eng",
"value": "When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Remote Code Execution"
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2017:3113",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3113"
"name": "RHSA-2017:3113",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3113"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"RHSA-2017:3080",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3080"
"name": "RHSA-2017:3080",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3080"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
},
{
"name":"RHSA-2018:0269",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0269"
"name": "RHSA-2018:0269",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0269"
},
{
"name":"42966",
"refsource":"EXPLOIT-DB",
"url":"https://www.exploit-db.com/exploits/42966/"
"name": "42966",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42966/"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us"
},
{
"name":"RHSA-2018:0270",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0270"
"name": "RHSA-2018:0270",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0270"
},
{
"name":"RHSA-2018:0271",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0271"
"name": "RHSA-2018:0271",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0271"
},
{
"name":"[debian-lts-announce] 20171107 [SECURITY] [DLA 1166-1] tomcat7 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html"
"name": "[debian-lts-announce] 20171107 [SECURITY] [DLA 1166-1] tomcat7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html"
},
{
"name":"RHSA-2018:2939",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2939"
"name": "RHSA-2018:2939",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2939"
},
{
"name":"RHSA-2018:0465",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0465"
"name": "RHSA-2018:0465",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0465"
},
{
"name":"USN-3665-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3665-1/"
"name": "USN-3665-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3665-1/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"RHSA-2018:0268",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0268"
"name": "RHSA-2018:0268",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0268"
},
{
"name":"RHSA-2017:3114",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3114"
"name": "RHSA-2017:3114",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3114"
},
{
"name":"43008",
"refsource":"EXPLOIT-DB",
"url":"https://www.exploit-db.com/exploits/43008/"
"name": "43008",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43008/"
},
{
"name":"1039552",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039552"
"name": "1039552",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039552"
},
{
"name":"100954",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/100954"
"name": "100954",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100954"
},
{
"name":"RHSA-2018:0275",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0275"
"name": "RHSA-2018:0275",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0275"
},
{
"name":"RHSA-2018:0466",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0466"
"name": "RHSA-2018:0466",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0466"
},
{
"name":"[announce] 20171003 [SECURITY] CVE-2017-12617 Apache Tomcat Remote Code Execution via JSP upload",
"refsource":"MLIST",
"url":"https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E"
"name": "[announce] 20171003 [SECURITY] CVE-2017-12617 Apache Tomcat Remote Code Execution via JSP upload",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E"
},
{
"name":"https://security.netapp.com/advisory/ntap-20171018-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20171018-0002/"
"name": "https://security.netapp.com/advisory/ntap-20171018-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171018-0002/"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180117-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180117-0002/"
"name": "https://security.netapp.com/advisory/ntap-20180117-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180117-0002/"
},
{
"name":"RHSA-2017:3081",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3081"
"name": "RHSA-2017:3081",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3081"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"CONFIRM",
"name":"https://support.f5.com/csp/article/K53173544",
"url":"https://support.f5.com/csp/article/K53173544"
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K53173544",
"url": "https://support.f5.com/csp/article/K53173544"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,70 +1,71 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2017-14952",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-14952",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a \"redundant UVector entry clean up function call\" issue."
"lang": "eng",
"value": "Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a \"redundant UVector entry clean up function call\" issue."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.sourcebrella.com/blog/double-free-vulnerability-international-components-unicode-icu/",
"refsource":"MISC",
"url":"http://www.sourcebrella.com/blog/double-free-vulnerability-international-components-unicode-icu/"
"name": "http://www.sourcebrella.com/blog/double-free-vulnerability-international-components-unicode-icu/",
"refsource": "MISC",
"url": "http://www.sourcebrella.com/blog/double-free-vulnerability-international-components-unicode-icu/"
},
{
"name":"http://bugs.icu-project.org/trac/changeset/40324/trunk/icu4c/source/i18n/zonemeta.cpp",
"refsource":"CONFIRM",
"url":"http://bugs.icu-project.org/trac/changeset/40324/trunk/icu4c/source/i18n/zonemeta.cpp"
"name": "http://bugs.icu-project.org/trac/changeset/40324/trunk/icu4c/source/i18n/zonemeta.cpp",
"refsource": "CONFIRM",
"url": "http://bugs.icu-project.org/trac/changeset/40324/trunk/icu4c/source/i18n/zonemeta.cpp"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,160 +1,161 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2017-15265",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-15265",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c."
"lang": "eng",
"value": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"[oss-security] 20171011 Linux kernel: alsa: use-after-free in /dev/snd/seq CVE-2017-15265",
"refsource":"MLIST",
"url":"http://www.openwall.com/lists/oss-security/2017/10/11/3"
"name": "[oss-security] 20171011 Linux kernel: alsa: use-after-free in /dev/snd/seq CVE-2017-15265",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/10/11/3"
},
{
"name":"101288",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/101288"
"name": "101288",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101288"
},
{
"name":"[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html"
"name": "[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html"
},
{
"name":"https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026",
"refsource":"CONFIRM",
"url":"https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026"
"name": "https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"1039561",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039561"
"name": "1039561",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039561"
},
{
"name":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026",
"refsource":"CONFIRM",
"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026"
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026"
},
{
"name":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8",
"refsource":"CONFIRM",
"url":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8"
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8"
},
{
"name":"RHSA-2018:1062",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1062"
"name": "RHSA-2018:1062",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"RHSA-2018:3823",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3823"
"name": "RHSA-2018:3823",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3823"
},
{
"name":"https://bugzilla.suse.com/show_bug.cgi?id=1062520",
"refsource":"CONFIRM",
"url":"https://bugzilla.suse.com/show_bug.cgi?id=1062520"
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1062520",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1062520"
},
{
"name":"RHSA-2018:0676",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0676"
"name": "RHSA-2018:0676",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0676"
},
{
"name":"https://source.android.com/security/bulletin/2018-02-01",
"refsource":"CONFIRM",
"url":"https://source.android.com/security/bulletin/2018-02-01"
"name": "https://source.android.com/security/bulletin/2018-02-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-02-01"
},
{
"name":"[alsa-devel] 20171011 [PATCH] ALSA: seq: Fix use-after-free at creating a port",
"refsource":"MLIST",
"url":"http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html"
"name": "[alsa-devel] 20171011 [PATCH] ALSA: seq: Fix use-after-free at creating a port",
"refsource": "MLIST",
"url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html"
},
{
"name":"RHSA-2018:1170",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1170"
"name": "RHSA-2018:1170",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1170"
},
{
"name":"USN-3698-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3698-1/"
"name": "USN-3698-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3698-1/"
},
{
"name":"RHSA-2018:1130",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1130"
"name": "RHSA-2018:1130",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1130"
},
{
"name":"RHSA-2018:3822",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3822"
"name": "RHSA-2018:3822",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3822"
},
{
"name":"USN-3698-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3698-2/"
"name": "USN-3698-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3698-2/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,90 +1,91 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2017-17484",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-17484",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC."
"lang": "eng",
"value": "The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://ssl.icu-project.org/trac/ticket/13490",
"refsource":"MISC",
"url":"https://ssl.icu-project.org/trac/ticket/13490"
"name": "https://ssl.icu-project.org/trac/ticket/13490",
"refsource": "MISC",
"url": "https://ssl.icu-project.org/trac/ticket/13490"
},
{
"name":"https://ssl.icu-project.org/trac/changeset/40714",
"refsource":"MISC",
"url":"https://ssl.icu-project.org/trac/changeset/40714"
"name": "https://ssl.icu-project.org/trac/changeset/40714",
"refsource": "MISC",
"url": "https://ssl.icu-project.org/trac/changeset/40714"
},
{
"name":"https://github.com/znc/znc/issues/1459",
"refsource":"MISC",
"url":"https://github.com/znc/znc/issues/1459"
"name": "https://github.com/znc/znc/issues/1459",
"refsource": "MISC",
"url": "https://github.com/znc/znc/issues/1459"
},
{
"name":"https://ssl.icu-project.org/trac/attachment/ticket/13490/poc.cpp",
"refsource":"MISC",
"url":"https://ssl.icu-project.org/trac/attachment/ticket/13490/poc.cpp"
"name": "https://ssl.icu-project.org/trac/attachment/ticket/13490/poc.cpp",
"refsource": "MISC",
"url": "https://ssl.icu-project.org/trac/attachment/ticket/13490/poc.cpp"
},
{
"name":"https://ssl.icu-project.org/trac/ticket/13510",
"refsource":"MISC",
"url":"https://ssl.icu-project.org/trac/ticket/13510"
"name": "https://ssl.icu-project.org/trac/ticket/13510",
"refsource": "MISC",
"url": "https://ssl.icu-project.org/trac/ticket/13510"
},
{
"name":"https://ssl.icu-project.org/trac/changeset/40715",
"refsource":"MISC",
"url":"https://ssl.icu-project.org/trac/changeset/40715"
"name": "https://ssl.icu-project.org/trac/changeset/40715",
"refsource": "MISC",
"url": "https://ssl.icu-project.org/trac/changeset/40715"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,129 +1,130 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2017-01-26",
"ID":"CVE-2017-3730",
"STATE":"PUBLIC",
"TITLE":"Bad (EC)DHE parameters cause a client crash"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2017-01-26",
"ID": "CVE-2017-3730",
"STATE": "PUBLIC",
"TITLE": "Bad (EC)DHE parameters cause a client crash"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"openssl-1.1.0"
"version_value": "openssl-1.1.0"
},
{
"version_value":"openssl-1.1.0a"
"version_value": "openssl-1.1.0a"
},
{
"version_value":"openssl-1.1.0b"
"version_value": "openssl-1.1.0b"
},
{
"version_value":"openssl-1.1.0c"
"version_value": "openssl-1.1.0c"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Guido Vranken"
"lang": "eng",
"value": "Guido Vranken"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack."
"lang": "eng",
"value": "In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Moderate",
"value":"Moderate"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Moderate",
"value": "Moderate"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"NULL pointer deference"
"lang": "eng",
"value": "NULL pointer deference"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"41192",
"refsource":"EXPLOIT-DB",
"url":"https://www.exploit-db.com/exploits/41192/"
"name": "41192",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41192/"
},
{
"name":"95812",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/95812"
"name": "95812",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95812"
},
{
"name":"https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa",
"refsource":"MISC",
"url":"https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa"
"name": "https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa",
"refsource": "MISC",
"url": "https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa"
},
{
"name":"https://www.openssl.org/news/secadv/20170126.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20170126.txt"
"name": "https://www.openssl.org/news/secadv/20170126.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20170126.txt"
},
{
"name":"1037717",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037717"
"name": "1037717",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037717"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"GLSA-201702-07",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201702-07"
"name": "GLSA-201702-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-07"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,212 +1,213 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2017-01-26",
"ID":"CVE-2017-3731",
"STATE":"PUBLIC",
"TITLE":"Truncated packet could crash via OOB read"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2017-01-26",
"ID": "CVE-2017-3731",
"STATE": "PUBLIC",
"TITLE": "Truncated packet could crash via OOB read"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"openssl-1.1.0"
"version_value": "openssl-1.1.0"
},
{
"version_value":"openssl-1.1.0a"
"version_value": "openssl-1.1.0a"
},
{
"version_value":"openssl-1.1.0b"
"version_value": "openssl-1.1.0b"
},
{
"version_value":"openssl-1.1.0c"
"version_value": "openssl-1.1.0c"
},
{
"version_value":"openssl-1.0.2"
"version_value": "openssl-1.0.2"
},
{
"version_value":"openssl-1.0.2a"
"version_value": "openssl-1.0.2a"
},
{
"version_value":"openssl-1.0.2b"
"version_value": "openssl-1.0.2b"
},
{
"version_value":"openssl-1.0.2c"
"version_value": "openssl-1.0.2c"
},
{
"version_value":"openssl-1.0.2d"
"version_value": "openssl-1.0.2d"
},
{
"version_value":"openssl-1.0.2e"
"version_value": "openssl-1.0.2e"
},
{
"version_value":"openssl-1.0.2f"
"version_value": "openssl-1.0.2f"
},
{
"version_value":"openssl-1.0.2g"
"version_value": "openssl-1.0.2g"
},
{
"version_value":"openssl-1.0.2h"
"version_value": "openssl-1.0.2h"
},
{
"version_value":"openssl-1.0.2i"
"version_value": "openssl-1.0.2i"
},
{
"version_value":"openssl-1.0.2j"
"version_value": "openssl-1.0.2j"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Robert \u015awi\u0119cki of Google"
"lang": "eng",
"value": "Robert \u015awi\u0119cki of Google"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k."
"lang": "eng",
"value": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Moderate",
"value":"Moderate"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Moderate",
"value": "Moderate"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"out-of-bounds read"
"lang": "eng",
"value": "out-of-bounds read"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2018:2185",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2185"
"name": "RHSA-2018:2185",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2185"
},
{
"name":"RHSA-2018:2186",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2186"
"name": "RHSA-2018:2186",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2186"
},
{
"name":"https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20171019-0002/"
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"95813",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/95813"
"name": "95813",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95813"
},
{
"name":"RHSA-2017:0286",
"refsource":"REDHAT",
"url":"http://rhn.redhat.com/errata/RHSA-2017-0286.html"
"name": "RHSA-2017:0286",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html"
},
{
"name":"FreeBSD-SA-17:02",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"
"name": "FreeBSD-SA-17:02",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"
},
{
"name":"https://www.openssl.org/news/secadv/20170126.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20170126.txt"
"name": "https://www.openssl.org/news/secadv/20170126.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20170126.txt"
},
{
"name":"1037717",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037717"
"name": "1037717",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037717"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"https://www.tenable.com/security/tns-2017-04",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-04"
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name":"https://source.android.com/security/bulletin/pixel/2017-11-01",
"refsource":"CONFIRM",
"url":"https://source.android.com/security/bulletin/pixel/2017-11-01"
"name": "https://source.android.com/security/bulletin/pixel/2017-11-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2017-11-01"
},
{
"name":"GLSA-201702-07",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201702-07"
"name": "GLSA-201702-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-07"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name":"DSA-3773",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3773"
"name": "DSA-3773",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3773"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"
},
{
"name":"http://securityadvisories.paloaltonetworks.com/Home/Detail/82",
"refsource":"CONFIRM",
"url":"http://securityadvisories.paloaltonetworks.com/Home/Detail/82"
"name": "http://securityadvisories.paloaltonetworks.com/Home/Detail/82",
"refsource": "CONFIRM",
"url": "http://securityadvisories.paloaltonetworks.com/Home/Detail/82"
},
{
"name":"RHSA-2018:2187",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2187"
"name": "RHSA-2018:2187",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
},
{
"name":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21",
"refsource":"MISC",
"url":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21"
"name": "https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21",
"refsource": "MISC",
"url": "https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,202 +1,203 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2017-01-26",
"ID":"CVE-2017-3732",
"STATE":"PUBLIC",
"TITLE":"BN_mod_exp may produce incorrect results on x86_64"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2017-01-26",
"ID": "CVE-2017-3732",
"STATE": "PUBLIC",
"TITLE": "BN_mod_exp may produce incorrect results on x86_64"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"openssl-1.1.0"
"version_value": "openssl-1.1.0"
},
{
"version_value":"openssl-1.1.0a"
"version_value": "openssl-1.1.0a"
},
{
"version_value":"openssl-1.1.0b"
"version_value": "openssl-1.1.0b"
},
{
"version_value":"openssl-1.1.0c"
"version_value": "openssl-1.1.0c"
},
{
"version_value":"openssl-1.0.2"
"version_value": "openssl-1.0.2"
},
{
"version_value":"openssl-1.0.2a"
"version_value": "openssl-1.0.2a"
},
{
"version_value":"openssl-1.0.2b"
"version_value": "openssl-1.0.2b"
},
{
"version_value":"openssl-1.0.2c"
"version_value": "openssl-1.0.2c"
},
{
"version_value":"openssl-1.0.2d"
"version_value": "openssl-1.0.2d"
},
{
"version_value":"openssl-1.0.2e"
"version_value": "openssl-1.0.2e"
},
{
"version_value":"openssl-1.0.2f"
"version_value": "openssl-1.0.2f"
},
{
"version_value":"openssl-1.0.2g"
"version_value": "openssl-1.0.2g"
},
{
"version_value":"openssl-1.0.2h"
"version_value": "openssl-1.0.2h"
},
{
"version_value":"openssl-1.0.2i"
"version_value": "openssl-1.0.2i"
},
{
"version_value":"openssl-1.0.2j"
"version_value": "openssl-1.0.2j"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"OSS-Fuzz project"
"lang": "eng",
"value": "OSS-Fuzz project"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem."
"lang": "eng",
"value": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Moderate",
"value":"Moderate"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Moderate",
"value": "Moderate"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"carry-propagating bug"
"lang": "eng",
"value": "carry-propagating bug"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2018:2185",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2185"
"name": "RHSA-2018:2185",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2185"
},
{
"name":"RHSA-2018:2186",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2186"
"name": "RHSA-2018:2186",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2186"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"RHSA-2018:2713",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2713"
"name": "RHSA-2018:2713",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2713"
},
{
"name":"https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b",
"refsource":"MISC",
"url":"https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b"
"name": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b",
"refsource": "MISC",
"url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b"
},
{
"name":"FreeBSD-SA-17:02",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"
"name": "FreeBSD-SA-17:02",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"
},
{
"name":"https://www.openssl.org/news/secadv/20170126.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20170126.txt"
"name": "https://www.openssl.org/news/secadv/20170126.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20170126.txt"
},
{
"name":"1037717",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037717"
"name": "1037717",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037717"
},
{
"name":"RHSA-2018:2575",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2575"
"name": "RHSA-2018:2575",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2575"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"https://www.tenable.com/security/tns-2017-04",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-04"
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name":"GLSA-201702-07",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201702-07"
"name": "GLSA-201702-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-07"
},
{
"name":"RHSA-2018:2568",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2568"
"name": "RHSA-2018:2568",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2568"
},
{
"name":"95814",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/95814"
"name": "95814",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95814"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"
},
{
"name":"RHSA-2018:2187",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2187"
"name": "RHSA-2018:2187",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,122 +1,123 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2017-02-16",
"ID":"CVE-2017-3733",
"STATE":"PUBLIC",
"TITLE":"Encrypt-Then-Mac renegotiation crash"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2017-02-16",
"ID": "CVE-2017-3733",
"STATE": "PUBLIC",
"TITLE": "Encrypt-Then-Mac renegotiation crash"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"openssl-1.1.0"
"version_value": "openssl-1.1.0"
},
{
"version_value":"openssl-1.1.0a"
"version_value": "openssl-1.1.0a"
},
{
"version_value":"openssl-1.1.0b"
"version_value": "openssl-1.1.0b"
},
{
"version_value":"openssl-1.1.0c"
"version_value": "openssl-1.1.0c"
},
{
"version_value":"openssl-1.1.0d"
"version_value": "openssl-1.1.0d"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Joe Orton (Red Hat)"
"lang": "eng",
"value": "Joe Orton (Red Hat)"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected."
"lang": "eng",
"value": "During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#High",
"value":"High"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#High",
"value": "High"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"protocol error"
"lang": "eng",
"value": "protocol error"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"96269",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/96269"
"name": "96269",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96269"
},
{
"name":"https://www.openssl.org/news/secadv/20170216.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20170216.txt"
"name": "https://www.openssl.org/news/secadv/20170216.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20170216.txt"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us",
"refsource":"CONFIRM",
"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us"
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2",
"refsource":"MISC",
"url":"https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2"
"name": "https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2",
"refsource": "MISC",
"url": "https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2"
},
{
"name":"1037846",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1037846"
"name": "1037846",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037846"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,179 +1,180 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2017-08-28T00:00:00",
"ID":"CVE-2017-3735",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2017-08-28T00:00:00",
"ID": "CVE-2017-3735",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"1.1.0"
"version_value": "1.1.0"
},
{
"version_value":"1.0.2"
"version_value": "1.0.2"
}
]
}
}
]
},
"vendor_name":"OpenSSL Software Foundation"
"vendor_name": "OpenSSL Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g."
"lang": "eng",
"value": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"out of bounds read"
"lang": "eng",
"value": "out of bounds read"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"1039726",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039726"
"name": "1039726",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039726"
},
{
"name":"https://security.netapp.com/advisory/ntap-20171107-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20171107-0002/"
"name": "https://security.netapp.com/advisory/ntap-20171107-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171107-0002/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"USN-3611-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3611-2/"
"name": "USN-3611-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3611-2/"
},
{
"name":"DSA-4018",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2017/dsa-4018"
"name": "DSA-4018",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4018"
},
{
"name":"GLSA-201712-03",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201712-03"
"name": "GLSA-201712-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201712-03"
},
{
"name":"https://support.apple.com/HT208331",
"refsource":"CONFIRM",
"url":"https://support.apple.com/HT208331"
"name": "https://support.apple.com/HT208331",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208331"
},
{
"name":"[debian-lts-announce] 20171109 [SECURITY] [DLA-1157-1] openssl security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html"
"name": "[debian-lts-announce] 20171109 [SECURITY] [DLA-1157-1] openssl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html"
},
{
"name":"https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822",
"refsource":"MISC",
"url":"https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822"
"name": "https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822",
"refsource": "MISC",
"url": "https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822"
},
{
"name":"RHSA-2018:3505",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3505"
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name":"https://security.netapp.com/advisory/ntap-20170927-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20170927-0001/"
"name": "https://security.netapp.com/advisory/ntap-20170927-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170927-0001/"
},
{
"name":"https://www.tenable.com/security/tns-2017-15",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-15"
"name": "https://www.tenable.com/security/tns-2017-15",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-15"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"https://www.openssl.org/news/secadv/20171102.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20171102.txt"
"name": "https://www.openssl.org/news/secadv/20171102.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20171102.txt"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"DSA-4017",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2017/dsa-4017"
"name": "DSA-4017",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4017"
},
{
"name":"RHSA-2018:3221",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3221"
"name": "RHSA-2018:3221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name":"100515",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/100515"
"name": "100515",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100515"
},
{
"name":"https://www.tenable.com/security/tns-2017-14",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-14"
"name": "https://www.tenable.com/security/tns-2017-14",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-14"
},
{
"name":"FreeBSD-SA-17:11",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc"
"name": "FreeBSD-SA-17:11",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc"
},
{
"name":"https://www.openssl.org/news/secadv/20170828.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20170828.txt"
"name": "https://www.openssl.org/news/secadv/20170828.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20170828.txt"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,189 +1,190 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2017-11-02T00:00:00",
"ID":"CVE-2017-3736",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2017-11-02T00:00:00",
"ID": "CVE-2017-3736",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"1.1.0 - 1.1.0f"
"version_value": "1.1.0 - 1.1.0f"
},
{
"version_value":"1.0.2 - 1.0.2l"
"version_value": "1.0.2 - 1.0.2l"
}
]
}
}
]
},
"vendor_name":"OpenSSL Software Foundation"
"vendor_name": "OpenSSL Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen."
"lang": "eng",
"value": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"carry-propagating bug"
"lang": "eng",
"value": "carry-propagating bug"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://security.netapp.com/advisory/ntap-20171107-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20171107-0002/"
"name": "https://security.netapp.com/advisory/ntap-20171107-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171107-0002/"
},
{
"name":"RHSA-2018:2185",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2185"
"name": "RHSA-2018:2185",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2185"
},
{
"name":"https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871",
"refsource":"MISC",
"url":"https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871"
"name": "https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871",
"refsource": "MISC",
"url": "https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871"
},
{
"name":"RHSA-2018:2186",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2186"
"name": "RHSA-2018:2186",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2186"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"RHSA-2018:2713",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2713"
"name": "RHSA-2018:2713",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2713"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"DSA-4018",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2017/dsa-4018"
"name": "DSA-4018",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4018"
},
{
"name":"GLSA-201712-03",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201712-03"
"name": "GLSA-201712-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201712-03"
},
{
"name":"RHSA-2018:0998",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0998"
"name": "RHSA-2018:0998",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0998"
},
{
"name":"RHSA-2018:2575",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2575"
"name": "RHSA-2018:2575",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2575"
},
{
"name":"https://www.tenable.com/security/tns-2017-15",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-15"
"name": "https://www.tenable.com/security/tns-2017-15",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-15"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"101666",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/101666"
"name": "101666",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101666"
},
{
"name":"RHSA-2018:2568",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2568"
"name": "RHSA-2018:2568",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2568"
},
{
"name":"https://www.openssl.org/news/secadv/20171102.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20171102.txt"
"name": "https://www.openssl.org/news/secadv/20171102.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20171102.txt"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"DSA-4017",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2017/dsa-4017"
"name": "DSA-4017",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4017"
},
{
"name":"https://www.tenable.com/security/tns-2017-14",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-14"
"name": "https://www.tenable.com/security/tns-2017-14",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-14"
},
{
"name":"FreeBSD-SA-17:11",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc"
"name": "FreeBSD-SA-17:11",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc"
},
{
"name":"1039727",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039727"
"name": "1039727",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039727"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us"
},
{
"name":"RHSA-2018:2187",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2187"
"name": "RHSA-2018:2187",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180117-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180117-0002/"
"name": "https://security.netapp.com/advisory/ntap-20180117-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180117-0002/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,189 +1,190 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2017-12-07T00:00:00",
"ID":"CVE-2017-3738",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2017-12-07T00:00:00",
"ID": "CVE-2017-3738",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"1.0.2-1.02m"
"version_value": "1.0.2-1.02m"
},
{
"version_value":"1.1.0-1.1.0g"
"version_value": "1.1.0-1.1.0g"
}
]
}
}
]
},
"vendor_name":"OpenSSL Software Foundation"
"vendor_name": "OpenSSL Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository."
"lang": "eng",
"value": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"carry-propagating bug"
"lang": "eng",
"value": "carry-propagating bug"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.tenable.com/security/tns-2018-07",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-07"
"name": "https://www.tenable.com/security/tns-2018-07",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-07"
},
{
"name":"https://www.tenable.com/security/tns-2018-04",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-04"
"name": "https://www.tenable.com/security/tns-2018-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-04"
},
{
"name":"RHSA-2018:2185",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2185"
"name": "RHSA-2018:2185",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2185"
},
{
"name":"RHSA-2018:2186",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2186"
"name": "RHSA-2018:2186",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2186"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"FreeBSD-SA-17:12",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc"
"name": "FreeBSD-SA-17:12",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc"
},
{
"name":"GLSA-201712-03",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201712-03"
"name": "GLSA-201712-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201712-03"
},
{
"name":"1039978",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039978"
"name": "1039978",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039978"
},
{
"name":"DSA-4157",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4157"
"name": "DSA-4157",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4157"
},
{
"name":"https://www.openssl.org/news/secadv/20171207.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20171207.txt"
"name": "https://www.openssl.org/news/secadv/20171207.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20171207.txt"
},
{
"name":"RHSA-2018:0998",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0998"
"name": "RHSA-2018:0998",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0998"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a",
"refsource":"MISC",
"url":"https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a"
"name": "https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a",
"refsource": "MISC",
"url": "https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a"
},
{
"name":"https://www.tenable.com/security/tns-2018-06",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-06"
"name": "https://www.tenable.com/security/tns-2018-06",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-06"
},
{
"name":"DSA-4065",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2017/dsa-4065"
"name": "DSA-4065",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4065"
},
{
"name":"https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/",
"refsource":"CONFIRM",
"url":"https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/"
"name": "https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"102118",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/102118"
"name": "102118",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102118"
},
{
"name":"https://www.tenable.com/security/tns-2017-16",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2017-16"
"name": "https://www.tenable.com/security/tns-2017-16",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-16"
},
{
"name":"https://www.openssl.org/news/secadv/20180327.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20180327.txt"
"name": "https://www.openssl.org/news/secadv/20180327.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20180327.txt"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us"
},
{
"name":"RHSA-2018:2187",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2187"
"name": "RHSA-2018:2187",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
},
{
"name":"https://security.netapp.com/advisory/ntap-20171208-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20171208-0001/"
"name": "https://security.netapp.com/advisory/ntap-20171208-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171208-0001/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,141 +1,141 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@tibco.com",
"DATE_PUBLIC":"2017-11-17T17:00:00.000Z",
"ID":"CVE-2017-5533",
"STATE":"PUBLIC",
"TITLE":"TIBCO JasperReports Server credentials disclosure"
"CVE_data_meta": {
"ASSIGNER": "security@tibco.com",
"DATE_PUBLIC": "2017-11-17T17:00:00.000Z",
"ID": "CVE-2017-5533",
"STATE": "PUBLIC",
"TITLE": "TIBCO JasperReports Server credentials disclosure"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"TIBCO JasperReports Server",
"version":{
"version_data":[
"product_name": "TIBCO JasperReports Server",
"version": {
"version_data": [
{
"version_value":"6.4.0"
"version_value": "6.4.0"
}
]
}
},
{
"product_name":"TIBCO JasperReports Server Community Edition",
"version":{
"version_data":[
"product_name": "TIBCO JasperReports Server Community Edition",
"version": {
"version_data": [
{
"version_value":"6.4.0"
"version_value": "6.4.0"
}
]
}
},
{
"product_name":"TIBCO JasperReports Server for ActiveMatrix BPM",
"version":{
"version_data":[
"product_name": "TIBCO JasperReports Server for ActiveMatrix BPM",
"version": {
"version_data": [
{
"version_value":"6.4.0"
"version_value": "6.4.0"
}
]
}
},
{
"product_name":"TIBCO Jaspersoft for AWS with Multi-Tenancy",
"version":{
"version_data":[
"product_name": "TIBCO Jaspersoft for AWS with Multi-Tenancy",
"version": {
"version_data": [
{
"version_value":"6.4.0"
"version_value": "6.4.0"
}
]
}
},
{
"product_name":"TIBCO Jaspersoft Reporting and Analytics for AWS",
"version":{
"version_data":[
"product_name": "TIBCO Jaspersoft Reporting and Analytics for AWS",
"version": {
"version_data": [
{
"version_value":"6.4.0"
"version_value": "6.4.0"
}
]
}
}
]
},
"vendor_name":"TIBCO Software Inc."
"vendor_name": "TIBCO Software Inc."
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"A vulnerability in the server content cache of TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability which fails to prevent remote access to all the contents of the web application, including key configuration files. Affected releases are TIBCO JasperReports Server 6.4.0, TIBCO JasperReports Server Community Edition 6.4.0, TIBCO JasperReports Server for ActiveMatrix BPM 6.4.0, TIBCO Jaspersoft for AWS with Multi-Tenancy 6.4.0, TIBCO Jaspersoft Reporting and Analytics for AWS 6.4.0."
"lang": "eng",
"value": "A vulnerability in the server content cache of TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability which fails to prevent remote access to all the contents of the web application, including key configuration files. Affected releases are TIBCO JasperReports Server 6.4.0, TIBCO JasperReports Server Community Edition 6.4.0, TIBCO JasperReports Server for ActiveMatrix BPM 6.4.0, TIBCO Jaspersoft for AWS with Multi-Tenancy 6.4.0, TIBCO Jaspersoft Reporting and Analytics for AWS 6.4.0."
}
]
},
"impact":{
"cvss":{
"attackComplexity":"LOW",
"attackVector":"NETWORK",
"availabilityImpact":"NONE",
"baseScore":9.3,
"baseSeverity":"CRITICAL",
"confidentialityImpact":"HIGH",
"integrityImpact":"LOW",
"privilegesRequired":"NONE",
"scope":"CHANGED",
"userInteraction":"NONE",
"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
"version":"3.0"
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
"version": "3.0"
}
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"The impact includes the possible access to web application configuration files that contain the credentials used by the server. Those credentials could then be used to affect external systems accessed by the JasperReports Server."
"lang": "eng",
"value": "The impact includes the possible access to web application configuration files that contain the credentials used by the server. Those credentials could then be used to affect external systems accessed by the JasperReports Server."
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.tibco.com/support/advisories/2017/11/tibco-security-advisory-november-15-2017-tibco-jasperreports-server-2017",
"refsource":"CONFIRM",
"url":"http://www.tibco.com/support/advisories/2017/11/tibco-security-advisory-november-15-2017-tibco-jasperreports-server-2017"
"name": "http://www.tibco.com/support/advisories/2017/11/tibco-security-advisory-november-15-2017-tibco-jasperreports-server-2017",
"refsource": "CONFIRM",
"url": "http://www.tibco.com/support/advisories/2017/11/tibco-security-advisory-november-15-2017-tibco-jasperreports-server-2017"
},
{
"name":"101878",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/101878"
"name": "101878",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101878"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
},
"solution": "TIBCO has released updated versions of the affected components which address these issues.\n\nFor each affected system, update to the corresponding software versions:\n\n TIBCO JasperReports Server versions 6.4.0 update to version 6.4.2 or higher\n\n TIBCO JasperReports Server Community Edition version 6.4.0 update to version 6.4.2 or higher\n\n TIBCO JasperReports Server for ActiveMatrix BPM version 6.4.0 update to version 6.4.2 or higher\n\n TIBCO Jaspersoft for AWS with Multi-Tenancy version 6.4.0 update to version 6.4.2 or higher\n \n TIBCO Jaspersoft Reporting and Analytics for AWS version 6.4.0 update to version 6.4.2 or higher\n"
}

View File

@ -1,205 +1,206 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"ID":"CVE-2017-5645",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2017-5645",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Log4j",
"version":{
"version_data":[
"product_name": "Apache Log4j",
"version": {
"version_data": [
{
"version_value":"All versions between 2.0-alpha1 and 2.8.1"
"version_value": "All versions between 2.0-alpha1 and 2.8.1"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code."
"lang": "eng",
"value": "In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Remote Code Execution."
"lang": "eng",
"value": "Remote Code Execution."
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2017:2888",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2888"
"name": "RHSA-2017:2888",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2888"
},
{
"name":"RHSA-2017:2809",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2809"
"name": "RHSA-2017:2809",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2809"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"97702",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/97702"
"name": "97702",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97702"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"1041294",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041294"
"name": "1041294",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041294"
},
{
"name":"RHSA-2017:2810",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2810"
"name": "RHSA-2017:2810",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2810"
},
{
"name":"RHSA-2017:1801",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1801"
"name": "RHSA-2017:1801",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1801"
},
{
"name":"RHSA-2017:2889",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2889"
"name": "RHSA-2017:2889",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2889"
},
{
"name":"RHSA-2017:2635",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2635"
"name": "RHSA-2017:2635",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2635"
},
{
"name":"RHSA-2017:2638",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2638"
"name": "RHSA-2017:2638",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2638"
},
{
"name":"https://security.netapp.com/advisory/ntap-20181107-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20181107-0002/"
"name": "https://security.netapp.com/advisory/ntap-20181107-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181107-0002/"
},
{
"name":"RHSA-2017:1417",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1417"
"name": "RHSA-2017:1417",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1417"
},
{
"name":"RHSA-2017:2423",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2423"
"name": "RHSA-2017:2423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2423"
},
{
"name":"RHSA-2017:2808",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2808"
"name": "RHSA-2017:2808",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2808"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"1040200",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040200"
"name": "1040200",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040200"
},
{
"name":"RHSA-2017:2636",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2636"
"name": "RHSA-2017:2636",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2636"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"RHSA-2017:3399",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3399"
"name": "RHSA-2017:3399",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3399"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180726-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180726-0002/"
"name": "https://security.netapp.com/advisory/ntap-20180726-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"name":"RHSA-2017:2637",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2637"
"name": "RHSA-2017:2637",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2637"
},
{
"name":"RHSA-2017:3244",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3244"
"name": "RHSA-2017:3244",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3244"
},
{
"name":"https://issues.apache.org/jira/browse/LOG4J2-1863",
"refsource":"CONFIRM",
"url":"https://issues.apache.org/jira/browse/LOG4J2-1863"
"name": "https://issues.apache.org/jira/browse/LOG4J2-1863",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/LOG4J2-1863"
},
{
"name":"RHSA-2017:3400",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3400"
"name": "RHSA-2017:3400",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3400"
},
{
"name":"RHSA-2017:2633",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2633"
"name": "RHSA-2017:2633",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2633"
},
{
"name":"RHSA-2017:2811",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2811"
"name": "RHSA-2017:2811",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2811"
},
{
"name":"RHSA-2017:1802",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1802"
"name": "RHSA-2017:1802",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1802"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,234 +1,235 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"ID":"CVE-2017-5664",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2017-5664",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tomcat",
"version":{
"version_data":[
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value":"9.0.0.M1 to 9.0.0.M20"
"version_value": "9.0.0.M1 to 9.0.0.M20"
},
{
"version_value":"8.5.0 to 8.5.14"
"version_value": "8.5.0 to 8.5.14"
},
{
"version_value":"8.0.0.RC1 to 8.0.43"
"version_value": "8.0.0.RC1 to 8.0.43"
},
{
"version_value":"7.0.0 to 7.0.77"
"version_value": "7.0.0 to 7.0.77"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method."
"lang": "eng",
"value": "The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Security Constrainy Bypass"
"lang": "eng",
"value": "Security Constrainy Bypass"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"DSA-3891",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3891"
"name": "DSA-3891",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3891"
},
{
"name":"https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20171019-0002/"
"name": "https://security.netapp.com/advisory/ntap-20171019-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171019-0002/"
},
{
"name":"98888",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/98888"
"name": "98888",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98888"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"RHSA-2017:3080",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3080"
"name": "RHSA-2017:3080",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3080"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
},
{
"name":"RHSA-2017:1801",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1801"
"name": "RHSA-2017:1801",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1801"
},
{
"name":"RHSA-2017:2635",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2635"
"name": "RHSA-2017:2635",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2635"
},
{
"name":"RHSA-2017:2638",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2638"
"name": "RHSA-2017:2638",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2638"
},
{
"name":"RHSA-2017:2494",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2494"
"name": "RHSA-2017:2494",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2494"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"[tomcat-users] 20170606 [SECURITY] CVE-2017-5664 Apache Tomcat Security Constraint Bypass",
"refsource":"MLIST",
"url":"https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066@%3Cannounce.tomcat.apache.org%3E"
"name": "[tomcat-users] 20170606 [SECURITY] CVE-2017-5664 Apache Tomcat Security Constraint Bypass",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066@%3Cannounce.tomcat.apache.org%3E"
},
{
"name":"RHSA-2017:2636",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2636"
"name": "RHSA-2017:2636",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2636"
},
{
"name":"RHSA-2017:1809",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1809"
"name": "RHSA-2017:1809",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1809"
},
{
"name":"RHSA-2017:2637",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2637"
"name": "RHSA-2017:2637",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2637"
},
{
"name":"1038641",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1038641"
"name": "1038641",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038641"
},
{
"name":"DSA-3892",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3892"
"name": "DSA-3892",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3892"
},
{
"name":"RHSA-2017:2633",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2633"
"name": "RHSA-2017:2633",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2633"
},
{
"name":"RHSA-2017:1802",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1802"
"name": "RHSA-2017:1802",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1802"
},
{
"name":"RHSA-2017:2493",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2493"
"name": "RHSA-2017:2493",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2493"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,371 +1,372 @@
{
"CVE_data_meta":{
"ASSIGNER":"secure@intel.com",
"DATE_PUBLIC":"2018-01-03T00:00:00",
"ID":"CVE-2017-5753",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-01-03T00:00:00",
"ID": "CVE-2017-5753",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Most Modern Operating Systems",
"version":{
"version_data":[
"product_name": "Most Modern Operating Systems",
"version": {
"version_data": [
{
"version_value":"All"
"version_value": "All"
}
]
}
}
]
},
"vendor_name":"Intel Corporation"
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"name":"[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
},
{
"name":"DSA-4187",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4187"
"name": "DSA-4187",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name":"USN-3542-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3542-2/"
"name": "USN-3542-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3542-2/"
},
{
"name":"GLSA-201810-06",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201810-06"
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name":"USN-3540-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3540-2/"
"name": "USN-3540-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"name":"https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"refsource":"CONFIRM",
"url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"
"name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
"refsource":"CONFIRM",
"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"name":"USN-3597-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3597-1/"
"name": "USN-3597-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"name":"[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
},
{
"name":"SUSE-SU-2018:0012",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
"name": "SUSE-SU-2018:0012",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"name":"SUSE-SU-2018:0011",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
"name": "SUSE-SU-2018:0011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"name":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
"refsource":"MISC",
"url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
"name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
"refsource": "MISC",
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"name":"https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource":"CONFIRM",
"url":"https://cert.vde.com/en-us/advisories/vde-2018-002"
"name": "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name":"USN-3580-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3580-1/"
"name": "USN-3580-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3580-1/"
},
{
"name":"https://support.f5.com/csp/article/K91229003",
"refsource":"CONFIRM",
"url":"https://support.f5.com/csp/article/K91229003"
"name": "https://support.f5.com/csp/article/K91229003",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"name":"openSUSE-SU-2018:0022",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
"name": "openSUSE-SU-2018:0022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"name":"DSA-4188",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4188"
"name": "DSA-4188",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"name":"RHSA-2018:0292",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0292"
"name": "RHSA-2018:0292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"name":"http://xenbits.xen.org/xsa/advisory-254.html",
"refsource":"CONFIRM",
"url":"http://xenbits.xen.org/xsa/advisory-254.html"
"name": "http://xenbits.xen.org/xsa/advisory-254.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180104-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180104-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180104-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"name":"https://www.synology.com/support/security/Synology_SA_18_01",
"refsource":"CONFIRM",
"url":"https://www.synology.com/support/security/Synology_SA_18_01"
"name": "https://www.synology.com/support/security/Synology_SA_18_01",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"name":"https://01.org/security/advisories/intel-oss-10002",
"refsource":"CONFIRM",
"url":"https://01.org/security/advisories/intel-oss-10002"
"name": "https://01.org/security/advisories/intel-oss-10002",
"refsource": "CONFIRM",
"url": "https://01.org/security/advisories/intel-oss-10002"
},
{
"name":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
"refsource":"MISC",
"url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
"name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
},
{
"name":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
"refsource":"CONFIRM",
"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"name":"[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"name":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource":"CONFIRM",
"url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name":"VU#584653",
"refsource":"CERT-VN",
"url":"http://www.kb.cert.org/vuls/id/584653"
"name": "VU#584653",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"name":"VU#180049",
"refsource":"CERT-VN",
"url":"https://www.kb.cert.org/vuls/id/180049"
"name": "VU#180049",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name":"https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource":"CONFIRM",
"url":"https://cert.vde.com/en-us/advisories/vde-2018-003"
"name": "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"name":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
"refsource":"CONFIRM",
"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
"refsource": "CONFIRM",
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf",
"refsource":"CONFIRM",
"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
},
{
"name":"USN-3549-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3549-1/"
"name": "USN-3549-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3549-1/"
},
{
"name":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
"refsource":"CONFIRM",
"url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
"name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"name":"https://support.citrix.com/article/CTX231399",
"refsource":"CONFIRM",
"url":"https://support.citrix.com/article/CTX231399"
"name": "https://support.citrix.com/article/CTX231399",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX231399"
},
{
"name":"https://spectreattack.com/",
"refsource":"MISC",
"url":"https://spectreattack.com/"
"name": "https://spectreattack.com/",
"refsource": "MISC",
"url": "https://spectreattack.com/"
},
{
"name":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
"refsource":"CONFIRM",
"url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
"name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
"refsource": "CONFIRM",
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"name":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
"refsource":"CONFIRM",
"url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
"name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
"refsource": "CONFIRM",
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"name":"1040071",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040071"
"name": "1040071",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040071"
},
{
"name":"102371",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/102371"
"name": "102371",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102371"
},
{
"name":"USN-3597-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3597-2/"
"name": "USN-3597-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"name":"SUSE-SU-2018:0010",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
"name": "SUSE-SU-2018:0010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"name":"USN-3540-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3540-1/"
"name": "USN-3540-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3540-1/"
},
{
"name":"20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource":"CISCO",
"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"name":"USN-3516-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/usn/usn-3516-1/"
"name": "USN-3516-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"name":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
"refsource":"CONFIRM",
"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
"refsource": "CONFIRM",
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
},
{
"name":"43427",
"refsource":"EXPLOIT-DB",
"url":"https://www.exploit-db.com/exploits/43427/"
"name": "43427",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43427/"
},
{
"name":"USN-3541-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3541-1/"
"name": "USN-3541-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3541-1/"
},
{
"name":"USN-3541-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3541-2/"
"name": "USN-3541-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"name":"USN-3542-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3542-1/"
"name": "USN-3542-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3542-1/"
},
{
"name":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"refsource":"MISC",
"url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
"name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"refsource": "MISC",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"name":"https://support.lenovo.com/us/en/solutions/LEN-18282",
"refsource":"CONFIRM",
"url":"https://support.lenovo.com/us/en/solutions/LEN-18282"
"name": "https://support.lenovo.com/us/en/solutions/LEN-18282",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"name":"openSUSE-SU-2018:0023",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
"name": "openSUSE-SU-2018:0023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"refsource":"MLIST",
"name":"[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"refsource":"MLIST",
"name":"[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update",
"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,371 +1,372 @@
{
"CVE_data_meta":{
"ASSIGNER":"secure@intel.com",
"DATE_PUBLIC":"2018-01-03T00:00:00",
"ID":"CVE-2017-5754",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-01-03T00:00:00",
"ID": "CVE-2017-5754",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Most Modern Operating Systems",
"version":{
"version_data":[
"product_name": "Most Modern Operating Systems",
"version": {
"version_data": [
{
"version_value":"All"
"version_value": "All"
}
]
}
}
]
},
"vendor_name":"Intel Corporation"
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache."
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
},
{
"name":"USN-3523-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3523-1/"
"name": "USN-3523-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3523-1/"
},
{
"name":"USN-3525-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/usn/usn-3525-1/"
"name": "USN-3525-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3525-1/"
},
{
"name":"https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin",
"refsource":"CONFIRM",
"url":"https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin"
"name": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin",
"refsource": "CONFIRM",
"url": "https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin"
},
{
"name":"GLSA-201810-06",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201810-06"
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name":"DSA-4082",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4082"
"name": "DSA-4082",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4082"
},
{
"name":"https://support.citrix.com/article/CTX234679",
"refsource":"CONFIRM",
"url":"https://support.citrix.com/article/CTX234679"
"name": "https://support.citrix.com/article/CTX234679",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX234679"
},
{
"name":"USN-3540-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3540-2/"
"name": "USN-3540-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3540-2/"
},
{
"name":"USN-3522-3",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3522-3/"
"name": "USN-3522-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3522-3/"
},
{
"name":"https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"refsource":"CONFIRM",
"url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"
"name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"name":"[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html"
"name": "[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html"
},
{
"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
"refsource":"CONFIRM",
"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"name":"USN-3597-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3597-1/"
"name": "USN-3597-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-1/"
},
{
"name":"SUSE-SU-2018:0012",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
"name": "SUSE-SU-2018:0012",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
},
{
"name":"SUSE-SU-2018:0011",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
"name": "SUSE-SU-2018:0011",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
},
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
},
{
"name":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
"refsource":"MISC",
"url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
"name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
"refsource": "MISC",
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
},
{
"name":"https://01.org/security/advisories/intel-oss-10003",
"refsource":"CONFIRM",
"url":"https://01.org/security/advisories/intel-oss-10003"
"name": "https://01.org/security/advisories/intel-oss-10003",
"refsource": "CONFIRM",
"url": "https://01.org/security/advisories/intel-oss-10003"
},
{
"name":"https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource":"CONFIRM",
"url":"https://cert.vde.com/en-us/advisories/vde-2018-002"
"name": "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name":"DSA-4120",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4120"
"name": "DSA-4120",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4120"
},
{
"name":"https://support.f5.com/csp/article/K91229003",
"refsource":"CONFIRM",
"url":"https://support.f5.com/csp/article/K91229003"
"name": "https://support.f5.com/csp/article/K91229003",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K91229003"
},
{
"name":"USN-3524-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/usn/usn-3524-2/"
"name": "USN-3524-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3524-2/"
},
{
"name":"DSA-4078",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4078"
"name": "DSA-4078",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4078"
},
{
"name":"https://source.android.com/security/bulletin/2018-04-01",
"refsource":"CONFIRM",
"url":"https://source.android.com/security/bulletin/2018-04-01"
"name": "https://source.android.com/security/bulletin/2018-04-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2018-04-01"
},
{
"name":"openSUSE-SU-2018:0022",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
"name": "openSUSE-SU-2018:0022",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
},
{
"name":"RHSA-2018:0292",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0292"
"name": "RHSA-2018:0292",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
},
{
"name":"http://xenbits.xen.org/xsa/advisory-254.html",
"refsource":"CONFIRM",
"url":"http://xenbits.xen.org/xsa/advisory-254.html"
"name": "http://xenbits.xen.org/xsa/advisory-254.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180104-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180104-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180104-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
},
{
"name":"https://www.synology.com/support/security/Synology_SA_18_01",
"refsource":"CONFIRM",
"url":"https://www.synology.com/support/security/Synology_SA_18_01"
"name": "https://www.synology.com/support/security/Synology_SA_18_01",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
},
{
"name":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
"refsource":"CONFIRM",
"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource":"CONFIRM",
"url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name":"VU#584653",
"refsource":"CERT-VN",
"url":"http://www.kb.cert.org/vuls/id/584653"
"name": "VU#584653",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/584653"
},
{
"name":"USN-3522-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/usn/usn-3522-2/"
"name": "USN-3522-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3522-2/"
},
{
"name":"VU#180049",
"refsource":"CERT-VN",
"url":"https://www.kb.cert.org/vuls/id/180049"
"name": "VU#180049",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name":"USN-3583-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3583-1/"
"name": "USN-3583-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3583-1/"
},
{
"name":"https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource":"CONFIRM",
"url":"https://cert.vde.com/en-us/advisories/vde-2018-003"
"name": "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
},
{
"name":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
"refsource":"CONFIRM",
"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
"refsource": "CONFIRM",
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
},
{
"name":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
"refsource":"CONFIRM",
"url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
"name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
},
{
"name":"https://support.citrix.com/article/CTX231399",
"refsource":"CONFIRM",
"url":"https://support.citrix.com/article/CTX231399"
"name": "https://support.citrix.com/article/CTX231399",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX231399"
},
{
"name":"102378",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/102378"
"name": "102378",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102378"
},
{
"name":"FreeBSD-SA-18:03",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
"name": "FreeBSD-SA-18:03",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
},
{
"name":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
"refsource":"CONFIRM",
"url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
"name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
"refsource": "CONFIRM",
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
},
{
"name":"106128",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/106128"
"name": "106128",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106128"
},
{
"name":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
"refsource":"CONFIRM",
"url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
"name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
"refsource": "CONFIRM",
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"name":"1040071",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040071"
"name": "1040071",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040071"
},
{
"name":"USN-3597-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3597-2/"
"name": "USN-3597-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3597-2/"
},
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
},
{
"name":"SUSE-SU-2018:0010",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
"name": "SUSE-SU-2018:0010",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
},
{
"name":"20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource":"CISCO",
"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"name":"USN-3523-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/usn/usn-3523-2/"
"name": "USN-3523-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3523-2/"
},
{
"name":"USN-3516-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/usn/usn-3516-1/"
"name": "USN-3516-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
},
{
"name":"USN-3541-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3541-2/"
"name": "USN-3541-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3541-2/"
},
{
"name":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"refsource":"MISC",
"url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
"name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"refsource": "MISC",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"name":"https://support.lenovo.com/us/en/solutions/LEN-18282",
"refsource":"CONFIRM",
"url":"https://support.lenovo.com/us/en/solutions/LEN-18282"
"name": "https://support.lenovo.com/us/en/solutions/LEN-18282",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
},
{
"name":"https://meltdownattack.com/",
"refsource":"MISC",
"url":"https://meltdownattack.com/"
"name": "https://meltdownattack.com/",
"refsource": "MISC",
"url": "https://meltdownattack.com/"
},
{
"name":"openSUSE-SU-2018:0023",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
"name": "openSUSE-SU-2018:0023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
},
{
"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
"refsource":"CONFIRM",
"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
"refsource": "CONFIRM",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
},
{
"name":"USN-3522-4",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3522-4/"
"name": "USN-3522-4",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3522-4/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,282 +1,283 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"DATE_PUBLIC":"2017-04-11T00:00:00",
"ID":"CVE-2017-7525",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"DATE_PUBLIC": "2017-04-11T00:00:00",
"ID": "CVE-2017-7525",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"jackson-databind",
"version":{
"version_data":[
"product_name": "jackson-databind",
"version": {
"version_data": [
{
"version_value":"before 2.6.7.1"
"version_value": "before 2.6.7.1"
},
{
"version_value":"before 2.7.9.1"
"version_value": "before 2.7.9.1"
},
{
"version_value":"before 2.8.9"
"version_value": "before 2.8.9"
}
]
}
}
]
},
"vendor_name":"FasterXML"
"vendor_name": "FasterXML"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper."
"lang": "eng",
"value": "A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-184"
"lang": "eng",
"value": "CWE-184"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"1040360",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040360"
"name": "1040360",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040360"
},
{
"name":"RHSA-2017:1840",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1840"
"name": "RHSA-2017:1840",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1840"
},
{
"name":"RHSA-2017:2547",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2547"
"name": "RHSA-2017:2547",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2547"
},
{
"name":"RHSA-2017:1836",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1836"
"name": "RHSA-2017:1836",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1836"
},
{
"name":"https://github.com/FasterXML/jackson-databind/issues/1723",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/1723"
"name": "https://github.com/FasterXML/jackson-databind/issues/1723",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/1723"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"RHSA-2017:1835",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1835"
"name": "RHSA-2017:1835",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1835"
},
{
"name":"https://github.com/FasterXML/jackson-databind/issues/1599",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/1599"
"name": "https://github.com/FasterXML/jackson-databind/issues/1599",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/1599"
},
{
"name":"RHSA-2018:1449",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1449"
"name": "RHSA-2018:1449",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1449"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1462702",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1462702"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1462702",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462702"
},
{
"name":"1039744",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039744"
"name": "1039744",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039744"
},
{
"name":"https://security.netapp.com/advisory/ntap-20171214-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20171214-0002/"
"name": "https://security.netapp.com/advisory/ntap-20171214-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20171214-0002/"
},
{
"name":"1039947",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039947"
"name": "1039947",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039947"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us"
},
{
"name":"RHSA-2017:2635",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2635"
"name": "RHSA-2017:2635",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2635"
},
{
"name":"RHSA-2017:2638",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2638"
"name": "RHSA-2017:2638",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2638"
},
{
"name":"RHSA-2018:1450",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1450"
"name": "RHSA-2018:1450",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1450"
},
{
"name":"RHSA-2017:3458",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3458"
"name": "RHSA-2017:3458",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3458"
},
{
"name":"RHSA-2018:0294",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0294"
"name": "RHSA-2018:0294",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0294"
},
{
"name":"RHSA-2017:1837",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1837"
"name": "RHSA-2017:1837",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1837"
},
{
"name":"RHSA-2017:1834",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1834"
"name": "RHSA-2017:1834",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1834"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"RHSA-2017:2546",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2546"
"name": "RHSA-2017:2546",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2546"
},
{
"name":"RHSA-2017:2636",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2636"
"name": "RHSA-2017:2636",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2636"
},
{
"name":"RHSA-2017:3455",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3455"
"name": "RHSA-2017:3455",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3455"
},
{
"name":"RHSA-2017:2477",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2477"
"name": "RHSA-2017:2477",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2477"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"RHSA-2017:3456",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3456"
"name": "RHSA-2017:3456",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3456"
},
{
"name":"RHSA-2018:0342",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0342"
"name": "RHSA-2018:0342",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0342"
},
{
"name":"https://cwiki.apache.org/confluence/display/WW/S2-055",
"refsource":"CONFIRM",
"url":"https://cwiki.apache.org/confluence/display/WW/S2-055"
"name": "https://cwiki.apache.org/confluence/display/WW/S2-055",
"refsource": "CONFIRM",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-055"
},
{
"name":"RHSA-2017:1839",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:1839"
"name": "RHSA-2017:1839",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1839"
},
{
"name":"99623",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/99623"
"name": "99623",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99623"
},
{
"name":"RHSA-2017:2637",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2637"
"name": "RHSA-2017:2637",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2637"
},
{
"name":"RHSA-2017:3454",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3454"
"name": "RHSA-2017:3454",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3454"
},
{
"name":"DSA-4004",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2017/dsa-4004"
"name": "DSA-4004",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4004"
},
{
"name":"RHSA-2017:3141",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3141"
"name": "RHSA-2017:3141",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3141"
},
{
"name":"RHSA-2017:2633",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2633"
"name": "RHSA-2017:2633",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2633"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Closed] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url":"https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Closed] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url": "https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url":"https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url": "https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url":"https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url": "https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Resolved] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url":"https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Resolved] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url": "https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url":"https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Updated] (SOLR-13110) CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...",
"url": "https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2017-7867",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-7867",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function."
"lang": "eng",
"value": "International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://bugs.icu-project.org/trac/changeset/39671",
"refsource":"MISC",
"url":"http://bugs.icu-project.org/trac/changeset/39671"
"name": "http://bugs.icu-project.org/trac/changeset/39671",
"refsource": "MISC",
"url": "http://bugs.icu-project.org/trac/changeset/39671"
},
{
"name":"DSA-3830",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3830"
"name": "DSA-3830",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3830"
},
{
"name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213",
"refsource":"MISC",
"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213"
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=213"
},
{
"name":"GLSA-201710-03",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201710-03"
"name": "GLSA-201710-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-03"
},
{
"name":"97672",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/97672"
"name": "97672",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97672"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2017-7868",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-7868",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function."
"lang": "eng",
"value": "International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"97674",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/97674"
"name": "97674",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97674"
},
{
"name":"http://bugs.icu-project.org/trac/changeset/39671",
"refsource":"MISC",
"url":"http://bugs.icu-project.org/trac/changeset/39671"
"name": "http://bugs.icu-project.org/trac/changeset/39671",
"refsource": "MISC",
"url": "http://bugs.icu-project.org/trac/changeset/39671"
},
{
"name":"DSA-3830",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3830"
"name": "DSA-3830",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3830"
},
{
"name":"GLSA-201710-03",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201710-03"
"name": "GLSA-201710-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-03"
},
{
"name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=437",
"refsource":"MISC",
"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=437"
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=437",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=437"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2017-8105",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-8105",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c."
"lang": "eng",
"value": "FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791",
"refsource":"MISC",
"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791"
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791",
"refsource": "MISC",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791"
},
{
"name":"GLSA-201706-14",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201706-14"
"name": "GLSA-201706-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-14"
},
{
"name":"99093",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/99093"
"name": "99093",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99093"
},
{
"name":"DSA-3839",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3839"
"name": "DSA-3839",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3839"
},
{
"name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935",
"refsource":"MISC",
"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935"
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2017-8287",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-8287",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c."
"lang": "eng",
"value": "FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"GLSA-201706-14",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201706-14"
"name": "GLSA-201706-14",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-14"
},
{
"name":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0",
"refsource":"MISC",
"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0"
"name": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0",
"refsource": "MISC",
"url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0"
},
{
"name":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941",
"refsource":"MISC",
"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941"
"name": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941"
},
{
"name":"DSA-3839",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3839"
"name": "DSA-3839",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3839"
},
{
"refsource":"BID",
"name":"99091",
"url":"http://www.securityfocus.com/bid/99091"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "BID",
"name": "99091",
"url": "http://www.securityfocus.com/bid/99091"
}
]
}

View File

@ -1,235 +1,236 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"ID":"CVE-2017-9798",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2017-9798",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache HTTP Server",
"version":{
"version_data":[
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value":"Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27"
"version_value": "Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c."
"lang": "eng",
"value": "Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"use-after-free"
"lang": "eng",
"value": "use-after-free"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2017:3113",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3113"
"name": "RHSA-2017:3113",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3113"
},
{
"name":"100872",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/100872"
"name": "100872",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100872"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"RHSA-2017:2882",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2882"
"name": "RHSA-2017:2882",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2882"
},
{
"name":"RHSA-2017:2972",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:2972"
"name": "RHSA-2017:2972",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2972"
},
{
"name":"https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch",
"refsource":"MISC",
"url":"https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch"
"name": "https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch",
"refsource": "MISC",
"url": "https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch"
},
{
"name":"https://support.apple.com/HT208331",
"refsource":"CONFIRM",
"url":"https://support.apple.com/HT208331"
"name": "https://support.apple.com/HT208331",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208331"
},
{
"name":"1039387",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1039387"
"name": "1039387",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039387"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us"
},
{
"name":"RHSA-2017:3475",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3475"
"name": "RHSA-2017:3475",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3475"
},
{
"name":"https://github.com/hannob/optionsbleed",
"refsource":"MISC",
"url":"https://github.com/hannob/optionsbleed"
"name": "https://github.com/hannob/optionsbleed",
"refsource": "MISC",
"url": "https://github.com/hannob/optionsbleed"
},
{
"name":"https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch",
"refsource":"MISC",
"url":"https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch"
"name": "https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch",
"refsource": "MISC",
"url": "https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch"
},
{
"name":"RHSA-2017:3240",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3240"
"name": "RHSA-2017:3240",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3240"
},
{
"name":"RHSA-2017:3195",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3195"
"name": "RHSA-2017:3195",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3195"
},
{
"name":"RHSA-2017:3018",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3018"
"name": "RHSA-2017:3018",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3018"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"RHSA-2017:3239",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3239"
"name": "RHSA-2017:3239",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3239"
},
{
"name":"RHSA-2017:3476",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3476"
"name": "RHSA-2017:3476",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3476"
},
{
"name":"105598",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105598"
"name": "105598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105598"
},
{
"name":"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798",
"refsource":"CONFIRM",
"url":"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798"
"name": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"RHSA-2017:3114",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3114"
"name": "RHSA-2017:3114",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3114"
},
{
"name":"RHSA-2017:3477",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3477"
"name": "RHSA-2017:3477",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3477"
},
{
"name":"http://openwall.com/lists/oss-security/2017/09/18/2",
"refsource":"MISC",
"url":"http://openwall.com/lists/oss-security/2017/09/18/2"
"name": "http://openwall.com/lists/oss-security/2017/09/18/2",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2017/09/18/2"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180601-0003/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180601-0003/"
"name": "https://security.netapp.com/advisory/ntap-20180601-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180601-0003/"
},
{
"name":"RHSA-2017:3194",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3194"
"name": "RHSA-2017:3194",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3194"
},
{
"name":"https://security-tracker.debian.org/tracker/CVE-2017-9798",
"refsource":"MISC",
"url":"https://security-tracker.debian.org/tracker/CVE-2017-9798"
"name": "https://security-tracker.debian.org/tracker/CVE-2017-9798",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2017-9798"
},
{
"name":"RHSA-2017:3193",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2017:3193"
"name": "RHSA-2017:3193",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3193"
},
{
"name":"DSA-3980",
"refsource":"DEBIAN",
"url":"http://www.debian.org/security/2017/dsa-3980"
"name": "DSA-3980",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3980"
},
{
"name":"https://github.com/apache/httpd/commit/29afdd2550b3d30a8defece2b95ae81edcf66ac9",
"refsource":"MISC",
"url":"https://github.com/apache/httpd/commit/29afdd2550b3d30a8defece2b95ae81edcf66ac9"
"name": "https://github.com/apache/httpd/commit/29afdd2550b3d30a8defece2b95ae81edcf66ac9",
"refsource": "MISC",
"url": "https://github.com/apache/httpd/commit/29afdd2550b3d30a8defece2b95ae81edcf66ac9"
},
{
"name":"https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
"refsource":"MISC",
"url":"https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
"name": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
"refsource": "MISC",
"url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
},
{
"name":"42745",
"refsource":"EXPLOIT-DB",
"url":"https://www.exploit-db.com/exploits/42745/"
"name": "42745",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42745/"
},
{
"name":"GLSA-201710-32",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201710-32"
"name": "GLSA-201710-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201710-32"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,75 +1,76 @@
{
"CVE_data_meta":{
"ASSIGNER":"psirt@cisco.com",
"ID":"CVE-2018-0161",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0161",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Cisco IOS",
"version":{
"version_data":[
"product_name": "Cisco IOS",
"version": {
"version_data": [
{
"version_value":"Cisco IOS"
"version_value": "Cisco IOS"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Catalyst Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition, aka a GET MIB Object ID Denial of Service Vulnerability. The vulnerability is due to a condition that could occur when the affected software processes an SNMP read request that contains a request for the ciscoFlashMIB object ID (OID). An attacker could trigger this vulnerability by issuing an SNMP GET request for the ciscoFlashMIB OID on an affected device. A successful exploit could cause the affected device to restart due to a SYS-3-CPUHOG. This vulnerability affects the following Cisco devices if they are running a vulnerable release of Cisco IOS Software and are configured to use SNMP Version 2 (SNMPv2) or SNMP Version 3 (SNMPv3): Cisco Catalyst 2960-L Series Switches, Cisco Catalyst Digital Building Series Switches 8P, Cisco Catalyst Digital Building Series Switches 8U. Cisco Bug IDs: CSCvd89541."
"lang": "eng",
"value": "A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Catalyst Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition, aka a GET MIB Object ID Denial of Service Vulnerability. The vulnerability is due to a condition that could occur when the affected software processes an SNMP read request that contains a request for the ciscoFlashMIB object ID (OID). An attacker could trigger this vulnerability by issuing an SNMP GET request for the ciscoFlashMIB OID on an affected device. A successful exploit could cause the affected device to restart due to a SYS-3-CPUHOG. This vulnerability affects the following Cisco devices if they are running a vulnerable release of Cisco IOS Software and are configured to use SNMP Version 2 (SNMPv2) or SNMP Version 3 (SNMPv3): Cisco Catalyst 2960-L Series Switches, Cisco Catalyst Digital Building Series Switches 8P, Cisco Catalyst Digital Building Series Switches 8U. Cisco Bug IDs: CSCvd89541."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-399"
"lang": "eng",
"value": "CWE-399"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"103573",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103573"
"name": "103573",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103573"
},
{
"name":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp",
"refsource":"CONFIRM",
"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp"
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp"
},
{
"name":"1040589",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040589"
"name": "1040589",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040589"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,140 +1,141 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@debian.org",
"ID":"CVE-2018-0495",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2018-0495",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Libgcrypt before 1.7.10 and 1.8.x before 1.8.3",
"version":{
"version_data":[
"product_name": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3",
"version": {
"version_data": [
{
"version_value":"Libgcrypt before 1.7.10 and 1.8.x before 1.8.3"
"version_value": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host."
"lang": "eng",
"value": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"side-channel attack"
"lang": "eng",
"value": "side-channel attack"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965",
"refsource":"MISC",
"url":"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965"
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965",
"refsource": "MISC",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965"
},
{
"name":"1041144",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041144"
"name": "1041144",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041144"
},
{
"name":"USN-3850-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3850-1/"
"name": "USN-3850-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3850-1/"
},
{
"name":"1041147",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041147"
"name": "1041147",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041147"
},
{
"name":"https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"refsource":"MISC",
"url":"https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
"name": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/",
"refsource": "MISC",
"url": "https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"
},
{
"name":"USN-3689-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3689-1/"
"name": "USN-3689-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3689-1/"
},
{
"name":"https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html",
"refsource":"MISC",
"url":"https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html"
"name": "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html",
"refsource": "MISC",
"url": "https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html"
},
{
"name":"USN-3689-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3689-2/"
"name": "USN-3689-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3689-2/"
},
{
"name":"USN-3692-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3692-2/"
"name": "USN-3692-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-2/"
},
{
"name":"[debian-lts-announce] 20180629 [SECURITY] [DLA 1405-1] libgcrypt20 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html"
"name": "[debian-lts-announce] 20180629 [SECURITY] [DLA 1405-1] libgcrypt20 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html"
},
{
"name":"DSA-4231",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4231"
"name": "DSA-4231",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4231"
},
{
"name":"RHSA-2018:3505",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3505"
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name":"USN-3850-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3850-2/"
"name": "USN-3850-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3850-2/"
},
{
"name":"USN-3692-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3692-1/"
"name": "USN-3692-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-1/"
},
{
"name":"RHSA-2018:3221",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3221"
"name": "RHSA-2018:3221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name":"https://dev.gnupg.org/T4011",
"refsource":"MISC",
"url":"https://dev.gnupg.org/T4011"
"name": "https://dev.gnupg.org/T4011",
"refsource": "MISC",
"url": "https://dev.gnupg.org/T4011"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,203 +1,204 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2018-06-12",
"ID":"CVE-2018-0732",
"STATE":"PUBLIC",
"TITLE":"Client DoS due to large DH parameter"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2018-06-12",
"ID": "CVE-2018-0732",
"STATE": "PUBLIC",
"TITLE": "Client DoS due to large DH parameter"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
"version_value": "Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
},
{
"version_value":"Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)"
"version_value": "Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Guido Vranken"
"lang": "eng",
"value": "Guido Vranken"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)."
"lang": "eng",
"value": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Low",
"value":"Low"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Client side Denial of Service"
"lang": "eng",
"value": "Client side Denial of Service"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
"name": "[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
},
{
"name":"https://www.tenable.com/security/tns-2018-14",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-14"
"name": "https://www.tenable.com/security/tns-2018-14",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-14"
},
{
"name":"https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
"refsource":"CONFIRM",
"url":"https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
"refsource": "CONFIRM",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://www.tenable.com/security/tns-2018-13",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-13"
"name": "https://www.tenable.com/security/tns-2018-13",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"name":"104442",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104442"
"name": "104442",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104442"
},
{
"name":"DSA-4355",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4355"
"name": "DSA-4355",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name":"RHSA-2018:2552",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2552"
"name": "RHSA-2018:2552",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2552"
},
{
"name":"GLSA-201811-03",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201811-03"
"name": "GLSA-201811-03",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-03"
},
{
"name":"https://www.tenable.com/security/tns-2018-17",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-17"
"name": "https://www.tenable.com/security/tns-2018-17",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"name":"https://www.tenable.com/security/tns-2018-12",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-12"
"name": "https://www.tenable.com/security/tns-2018-12",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-12"
},
{
"name":"USN-3692-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3692-2/"
"name": "USN-3692-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-2/"
},
{
"name":"https://security.netapp.com/advisory/ntap-20181105-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20181105-0001/"
"name": "https://security.netapp.com/advisory/ntap-20181105-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181105-0001/"
},
{
"name":"RHSA-2018:2553",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2553"
"name": "RHSA-2018:2553",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2553"
},
{
"name":"RHSA-2018:3505",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3505"
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name":"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"refsource":"CONFIRM",
"url":"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
"name": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098"
},
{
"name":"USN-3692-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3692-1/"
"name": "USN-3692-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-1/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"https://www.openssl.org/news/secadv/20180612.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20180612.txt"
"name": "https://www.openssl.org/news/secadv/20180612.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20180612.txt"
},
{
"name":"RHSA-2018:3221",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3221"
"name": "RHSA-2018:3221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name":"DSA-4348",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4348"
"name": "DSA-4348",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name":"1041090",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041090"
"name": "1041090",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041090"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190118-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190118-0002/"
"name": "https://security.netapp.com/advisory/ntap-20190118-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,135 +1,136 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2018-03-27",
"ID":"CVE-2018-0733",
"STATE":"PUBLIC",
"TITLE":"Incorrect CRYPTO_memcmp on HP-UX PA-RISC"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2018-03-27",
"ID": "CVE-2018-0733",
"STATE": "PUBLIC",
"TITLE": "Incorrect CRYPTO_memcmp on HP-UX PA-RISC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g)"
"version_value": "Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g)"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Peter Waltenberg (IBM)"
"lang": "eng",
"value": "Peter Waltenberg (IBM)"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g)."
"lang": "eng",
"value": "Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g)."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Moderate",
"value":"Moderate"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Moderate",
"value": "Moderate"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Message forgery"
"lang": "eng",
"value": "Message forgery"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.tenable.com/security/tns-2018-07",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-07"
"name": "https://www.tenable.com/security/tns-2018-07",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-07"
},
{
"name":"https://www.tenable.com/security/tns-2018-04",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-04"
"name": "https://www.tenable.com/security/tns-2018-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-04"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"GLSA-201811-21",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201811-21"
"name": "GLSA-201811-21",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-21"
},
{
"name":"103517",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103517"
"name": "103517",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103517"
},
{
"name":"https://www.tenable.com/security/tns-2018-06",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-06"
"name": "https://www.tenable.com/security/tns-2018-06",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-06"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180330-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180330-0002/"
"name": "https://security.netapp.com/advisory/ntap-20180330-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180330-0002/"
},
{
"name":"1040576",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040576"
"name": "1040576",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040576"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56d5a4bfcaf37fa420aef2bb881aa55e61cf5f2f",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56d5a4bfcaf37fa420aef2bb881aa55e61cf5f2f"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56d5a4bfcaf37fa420aef2bb881aa55e61cf5f2f",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56d5a4bfcaf37fa420aef2bb881aa55e61cf5f2f"
},
{
"name":"https://www.openssl.org/news/secadv/20180327.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20180327.txt"
"name": "https://www.openssl.org/news/secadv/20180327.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20180327.txt"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,156 +1,157 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2018-10-30",
"ID":"CVE-2018-0734",
"STATE":"PUBLIC",
"TITLE":"Timing attack against DSA"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2018-10-30",
"ID": "CVE-2018-0734",
"STATE": "PUBLIC",
"TITLE": "Timing attack against DSA"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"Fixed in OpenSSL 1.1.1a (Affected 1.1.1)"
"version_value": "Fixed in OpenSSL 1.1.1a (Affected 1.1.1)"
},
{
"version_value":"Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i)"
"version_value": "Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i)"
},
{
"version_value":"Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p)"
"version_value": "Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p)"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Samuel Weiser"
"lang": "eng",
"value": "Samuel Weiser"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p)."
"lang": "eng",
"value": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p)."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Low",
"value":"Low"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Constant time issue"
"lang": "eng",
"value": "Constant time issue"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"USN-3840-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3840-1/"
"name": "USN-3840-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3840-1/"
},
{
"name":"DSA-4355",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4355"
"name": "DSA-4355",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name":"https://security.netapp.com/advisory/ntap-20181105-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20181105-0002/"
"name": "https://security.netapp.com/advisory/ntap-20181105-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181105-0002/"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f"
},
{
"name":"https://www.tenable.com/security/tns-2018-17",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-17"
"name": "https://www.tenable.com/security/tns-2018-17",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"name":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/",
"refsource":"CONFIRM",
"url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"
"name": "https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"
},
{
"name":"https://www.tenable.com/security/tns-2018-16",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-16"
"name": "https://www.tenable.com/security/tns-2018-16",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-16"
},
{
"name":"105758",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105758"
"name": "105758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105758"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7"
},
{
"name":"DSA-4348",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4348"
"name": "DSA-4348",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac"
},
{
"name":"https://www.openssl.org/news/secadv/20181030.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20181030.txt"
"name": "https://www.openssl.org/news/secadv/20181030.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20181030.txt"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190118-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190118-0002/"
"name": "https://security.netapp.com/advisory/ntap-20190118-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/"
},
{
"refsource":"CONFIRM",
"name":"https://security.netapp.com/advisory/ntap-20190423-0002/",
"url":"https://security.netapp.com/advisory/ntap-20190423-0002/"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190423-0002/",
"url": "https://security.netapp.com/advisory/ntap-20190423-0002/"
}
]
}

View File

@ -1,133 +1,134 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2018-10-29",
"ID":"CVE-2018-0735",
"STATE":"PUBLIC",
"TITLE":"Timing attack against ECDSA signature generation"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2018-10-29",
"ID": "CVE-2018-0735",
"STATE": "PUBLIC",
"TITLE": "Timing attack against ECDSA signature generation"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i)"
"version_value": "Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i)"
},
{
"version_value":"Fixed in OpenSSL 1.1.1a (Affected 1.1.1)"
"version_value": "Fixed in OpenSSL 1.1.1a (Affected 1.1.1)"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Samuel Weiser"
"lang": "eng",
"value": "Samuel Weiser"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1)."
"lang": "eng",
"value": "The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1)."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Low",
"value":"Low"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Constant time issue"
"lang": "eng",
"value": "Constant time issue"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"105750",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105750"
"name": "105750",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105750"
},
{
"name":"USN-3840-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3840-1/"
"name": "USN-3840-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3840-1/"
},
{
"name":"https://security.netapp.com/advisory/ntap-20181105-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20181105-0002/"
"name": "https://security.netapp.com/advisory/ntap-20181105-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181105-0002/"
},
{
"name":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/",
"refsource":"CONFIRM",
"url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"
"name": "https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"
},
{
"name":"1041986",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041986"
"name": "1041986",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041986"
},
{
"name":"[debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html"
"name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html"
},
{
"name":"DSA-4348",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4348"
"name": "DSA-4348",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4"
},
{
"name":"https://www.openssl.org/news/secadv/20181029.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20181029.txt"
"name": "https://www.openssl.org/news/secadv/20181029.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20181029.txt"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,198 +1,199 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2018-04-16",
"ID":"CVE-2018-0737",
"STATE":"PUBLIC",
"TITLE":"Cache timing vulnerability in RSA Key Generation"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2018-04-16",
"ID": "CVE-2018-0737",
"STATE": "PUBLIC",
"TITLE": "Cache timing vulnerability in RSA Key Generation"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
"version_value": "Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
},
{
"version_value":"Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o)"
"version_value": "Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o)"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia"
"lang": "eng",
"value": "Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o)."
"lang": "eng",
"value": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o)."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Low",
"value":"Low"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Constant time issue"
"lang": "eng",
"value": "Constant time issue"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
"name": "[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"
},
{
"name":"https://www.tenable.com/security/tns-2018-14",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-14"
"name": "https://www.tenable.com/security/tns-2018-14",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-14"
},
{
"name":"https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
"refsource":"CONFIRM",
"url":"https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
"refsource": "CONFIRM",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=349a41da1ad88ad87825414752a8ff5fdd6a6c3f"
},
{
"name":"https://www.tenable.com/security/tns-2018-13",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-13"
"name": "https://www.tenable.com/security/tns-2018-13",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-13"
},
{
"name":"DSA-4355",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4355"
"name": "DSA-4355",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6939eab03a6e23d2bd2c3f5e34fe1d48e542e787"
},
{
"name":"USN-3628-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3628-2/"
"name": "USN-3628-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3628-2/"
},
{
"name":"GLSA-201811-21",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201811-21"
"name": "GLSA-201811-21",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-21"
},
{
"name":"https://www.openssl.org/news/secadv/20180416.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20180416.txt"
"name": "https://www.openssl.org/news/secadv/20180416.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20180416.txt"
},
{
"name":"https://www.tenable.com/security/tns-2018-17",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-17"
"name": "https://www.tenable.com/security/tns-2018-17",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"name":"https://www.tenable.com/security/tns-2018-12",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-12"
"name": "https://www.tenable.com/security/tns-2018-12",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-12"
},
{
"name":"USN-3692-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3692-2/"
"name": "USN-3692-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-2/"
},
{
"name":"RHSA-2018:3505",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3505"
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name":"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"refsource":"CONFIRM",
"url":"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
"name": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"
},
{
"name":"103766",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103766"
"name": "103766",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103766"
},
{
"name":"USN-3692-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3692-1/"
"name": "USN-3692-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3692-1/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"RHSA-2018:3221",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3221"
"name": "RHSA-2018:3221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name":"DSA-4348",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4348"
"name": "DSA-4348",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180726-0003/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180726-0003/"
"name": "https://security.netapp.com/advisory/ntap-20180726-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0003/"
},
{
"name":"1040685",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040685"
"name": "1040685",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040685"
},
{
"name":"USN-3628-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3628-1/"
"name": "USN-3628-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3628-1/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,218 +1,219 @@
{
"CVE_data_meta":{
"ASSIGNER":"openssl-security@openssl.org",
"DATE_PUBLIC":"2018-03-27",
"ID":"CVE-2018-0739",
"STATE":"PUBLIC",
"TITLE":"Constructed ASN.1 types with a recursive definition could exceed the stack"
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2018-03-27",
"ID": "CVE-2018-0739",
"STATE": "PUBLIC",
"TITLE": "Constructed ASN.1 types with a recursive definition could exceed the stack"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"OpenSSL",
"version":{
"version_data":[
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value":"Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g)"
"version_value": "Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g)"
},
{
"version_value":"Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n)"
"version_value": "Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n)"
}
]
}
}
]
},
"vendor_name":"OpenSSL"
"vendor_name": "OpenSSL"
}
]
}
},
"credit":[
"credit": [
{
"lang":"eng",
"value":"OSS-fuzz"
"lang": "eng",
"value": "OSS-fuzz"
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n)."
"lang": "eng",
"value": "Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n)."
}
]
},
"impact":[
"impact": [
{
"lang":"eng",
"url":"https://www.openssl.org/policies/secpolicy.html#Moderate",
"value":"Moderate"
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Moderate",
"value": "Moderate"
}
],
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Stack overflow"
"lang": "eng",
"value": "Stack overflow"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.tenable.com/security/tns-2018-07",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-07"
"name": "https://www.tenable.com/security/tns-2018-07",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-07"
},
{
"name":"https://www.tenable.com/security/tns-2018-04",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-04"
"name": "https://www.tenable.com/security/tns-2018-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-04"
},
{
"name":"https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
"refsource":"CONFIRM",
"url":"https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
"refsource": "CONFIRM",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/",
"refsource":"CONFIRM",
"url":"https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/"
"name": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"USN-3611-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3611-2/"
"name": "USN-3611-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3611-2/"
},
{
"name":"DSA-4158",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4158"
"name": "DSA-4158",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4158"
},
{
"name":"GLSA-201811-21",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201811-21"
"name": "GLSA-201811-21",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201811-21"
},
{
"name":"RHSA-2019:0367",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0367"
"name": "RHSA-2019:0367",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0367"
},
{
"name":"DSA-4157",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4157"
"name": "DSA-4157",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4157"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33"
},
{
"name":"RHSA-2018:3505",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3505"
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d",
"refsource":"CONFIRM",
"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d"
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9310d45087ae546e27e61ddf8f6367f29848220d"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"https://www.tenable.com/security/tns-2018-06",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-06"
"name": "https://www.tenable.com/security/tns-2018-06",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-06"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180330-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180330-0002/"
"name": "https://security.netapp.com/advisory/ntap-20180330-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180330-0002/"
},
{
"name":"103518",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103518"
"name": "103518",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103518"
},
{
"name":"1040576",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040576"
"name": "1040576",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040576"
},
{
"name":"RHSA-2018:3221",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3221"
"name": "RHSA-2018:3221",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3221"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180726-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180726-0002/"
"name": "https://security.netapp.com/advisory/ntap-20180726-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"name":"105609",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105609"
"name": "105609",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105609"
},
{
"name":"USN-3611-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3611-1/"
"name": "USN-3611-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3611-1/"
},
{
"name":"[debian-lts-announce] 20180330 [SECURITY] [DLA 1330-1] openssl security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html"
"name": "[debian-lts-announce] 20180330 [SECURITY] [DLA 1330-1] openssl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00033.html"
},
{
"name":"https://www.openssl.org/news/secadv/20180327.txt",
"refsource":"CONFIRM",
"url":"https://www.openssl.org/news/secadv/20180327.txt"
"name": "https://www.openssl.org/news/secadv/20180327.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20180327.txt"
},
{
"name":"RHSA-2019:0366",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0366"
"name": "RHSA-2019:0366",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0366"
},
{
"name":"RHSA-2018:3090",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3090"
"name": "RHSA-2018:3090",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3090"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,127 +1,128 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"DATE_ASSIGNED":"2018-01-15",
"ID":"CVE-2018-1000004",
"REQUESTER":"a4651386@163.com",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-01-15",
"ID": "CVE-2018-1000004",
"REQUESTER": "a4651386@163.com",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition."
"lang": "eng",
"value": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"USN-3631-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3631-2/"
"name": "USN-3631-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3631-2/"
},
{
"name":"DSA-4187",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4187"
"name": "DSA-4187",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name":"USN-3631-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3631-1/"
"name": "USN-3631-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3631-1/"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"104606",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104606"
"name": "104606",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104606"
},
{
"name":"RHSA-2018:1062",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1062"
"name": "RHSA-2018:1062",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
},
{
"name":"RHSA-2018:0654",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0654"
"name": "RHSA-2018:0654",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0654"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"RHSA-2018:0676",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0676"
"name": "RHSA-2018:0676",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0676"
},
{
"name":"[oss-security] 20180116 sound driver Conditional competition",
"refsource":"MLIST",
"url":"http://seclists.org/oss-sec/2018/q1/51"
"name": "[oss-security] 20180116 sound driver Conditional competition",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2018/q1/51"
},
{
"name":"[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name":"USN-3798-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3798-1/"
"name": "USN-3798-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3798-1/"
},
{
"name":"USN-3798-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3798-2/"
"name": "USN-3798-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3798-2/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,133 +1,134 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"DATE_ASSIGNED":"2018-04-30T12:00:00",
"DATE_REQUESTED":"2018-04-30T14:00:00",
"ID":"CVE-2018-1000180",
"REQUESTER":"dgh@bouncycastle.org",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-04-30T12:00:00",
"DATE_REQUESTED": "2018-04-30T14:00:00",
"ID": "CVE-2018-1000180",
"REQUESTER": "dgh@bouncycastle.org",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later."
"lang": "eng",
"value": "Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test",
"refsource":"MISC",
"url":"https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test"
"name": "https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test",
"refsource": "MISC",
"url": "https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test"
},
{
"name":"RHSA-2018:2428",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2428"
"name": "RHSA-2018:2428",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2428"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"RHSA-2018:2669",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2669"
"name": "RHSA-2018:2669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name":"https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad",
"refsource":"CONFIRM",
"url":"https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad"
"name": "https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad"
},
{
"name":"https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839",
"refsource":"CONFIRM",
"url":"https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839"
"name": "https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839"
},
{
"name":"RHSA-2018:2643",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2643"
"name": "RHSA-2018:2643",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2643"
},
{
"name":"https://www.bouncycastle.org/jira/browse/BJA-694",
"refsource":"CONFIRM",
"url":"https://www.bouncycastle.org/jira/browse/BJA-694"
"name": "https://www.bouncycastle.org/jira/browse/BJA-694",
"refsource": "CONFIRM",
"url": "https://www.bouncycastle.org/jira/browse/BJA-694"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190204-0003/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190204-0003/"
"name": "https://security.netapp.com/advisory/ntap-20190204-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190204-0003/"
},
{
"name":"RHSA-2018:2424",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2424"
"name": "RHSA-2018:2424",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2424"
},
{
"name":"RHSA-2018:2423",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2423"
"name": "RHSA-2018:2423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2423"
},
{
"name":"RHSA-2018:2425",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2425"
"name": "RHSA-2018:2425",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2425"
},
{
"name":"DSA-4233",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4233"
"name": "DSA-4233",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4233"
},
{
"refsource":"BID",
"name":"106567",
"url":"http://www.securityfocus.com/bid/106567"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "BID",
"name": "106567",
"url": "http://www.securityfocus.com/bid/106567"
}
]
}

View File

@ -1,83 +1,84 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"DATE_ASSIGNED":"2018-07-08T15:52:41.190527",
"DATE_REQUESTED":"2018-06-29T04:46:08",
"ID":"CVE-2018-1000613",
"REQUESTER":"dgh@bouncycastle.org",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-08T15:52:41.190527",
"DATE_REQUESTED": "2018-06-29T04:46:08",
"ID": "CVE-2018-1000613",
"REQUESTER": "dgh@bouncycastle.org",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs 1.58 up to but not including 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later."
"lang": "eng",
"value": "Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs 1.58 up to but not including 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574",
"refsource":"CONFIRM",
"url":"https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574"
"name": "https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc",
"refsource":"CONFIRM",
"url":"https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc"
"name": "https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190204-0003/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190204-0003/"
"name": "https://security.netapp.com/advisory/ntap-20190204-0003/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190204-0003/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,115 +1,116 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2018-10901",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-10901",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"kernel:",
"version":{
"version_data":[
"product_name": "kernel:",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"[UNKNOWN]"
"vendor_name": "[UNKNOWN]"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges."
"lang": "eng",
"value": "A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges."
}
]
},
"impact":{
"cvss":[
"impact": {
"cvss": [
[
{
"vectorString":"7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version":"3.0"
"vectorString": "7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-665"
"lang": "eng",
"value": "CWE-665"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"104905",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104905"
"name": "104905",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104905"
},
{
"name":"RHSA-2018:2393",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2393"
"name": "RHSA-2018:2393",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2393"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"RHSA-2018:2391",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2391"
"name": "RHSA-2018:2391",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2391"
},
{
"name":"RHSA-2018:2392",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2392"
"name": "RHSA-2018:2392",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2392"
},
{
"name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3444d7da1839b851eefedd372978d8a982316c36",
"refsource":"CONFIRM",
"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3444d7da1839b851eefedd372978d8a982316c36"
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3444d7da1839b851eefedd372978d8a982316c36",
"refsource": "CONFIRM",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3444d7da1839b851eefedd372978d8a982316c36"
},
{
"name":"RHSA-2018:2394",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2394"
"name": "RHSA-2018:2394",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10901",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10901"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10901",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10901"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,92 +1,93 @@
{
"CVE_data_meta":{
"ASSIGNER":"security_alert@emc.com",
"DATE_PUBLIC":"2018-06-14T04:00:00.000Z",
"ID":"CVE-2018-11039",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-06-14T04:00:00.000Z",
"ID": "CVE-2018-11039",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Spring Framework",
"version":{
"version_data":[
"product_name": "Spring Framework",
"version": {
"version_data": [
{
"affected":"<",
"version_name":"5.0.x",
"version_value":"5.0.7"
"affected": "<",
"version_name": "5.0.x",
"version_value": "5.0.7"
},
{
"affected":"<",
"version_name":"4.3.x ",
"version_value":"4.3.18"
"affected": "<",
"version_name": "4.3.x ",
"version_value": "4.3.18"
}
]
}
}
]
},
"vendor_name":"Pivotal"
"vendor_name": "Pivotal"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack."
"lang": "eng",
"value": "Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Cross Site Tracing"
"lang": "eng",
"value": "Cross Site Tracing"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://pivotal.io/security/cve-2018-11039",
"refsource":"CONFIRM",
"url":"https://pivotal.io/security/cve-2018-11039"
"name": "https://pivotal.io/security/cve-2018-11039",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2018-11039"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"refsource":"BID",
"name":"107984",
"url":"http://www.securityfocus.com/bid/107984"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "BID",
"name": "107984",
"url": "http://www.securityfocus.com/bid/107984"
}
]
},
"source":{
"discovery":"UNKNOWN"
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -1,87 +1,88 @@
{
"CVE_data_meta":{
"ASSIGNER":"security_alert@emc.com",
"DATE_PUBLIC":"2018-06-14T04:00:00.000Z",
"ID":"CVE-2018-11040",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-06-14T04:00:00.000Z",
"ID": "CVE-2018-11040",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Spring Framework",
"version":{
"version_data":[
"product_name": "Spring Framework",
"version": {
"version_data": [
{
"affected":"<",
"version_name":"5.0.x",
"version_value":"5.0.7"
"affected": "<",
"version_name": "5.0.x",
"version_value": "5.0.7"
},
{
"affected":"<",
"version_name":"4.3.x ",
"version_value":"4.3.18"
"affected": "<",
"version_name": "4.3.x ",
"version_value": "4.3.18"
}
]
}
}
]
},
"vendor_name":"Pivotal"
"vendor_name": "Pivotal"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the \"jsonp\" and \"callback\" JSONP parameters, enabling cross-domain requests."
"lang": "eng",
"value": "Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the \"jsonp\" and \"callback\" JSONP parameters, enabling cross-domain requests."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"JSONP enabled by default in MappingJackson2JsonView"
"lang": "eng",
"value": "JSONP enabled by default in MappingJackson2JsonView"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://pivotal.io/security/cve-2018-11040",
"refsource":"CONFIRM",
"url":"https://pivotal.io/security/cve-2018-11040"
"name": "https://pivotal.io/security/cve-2018-11040",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2018-11040"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
},
"source":{
"discovery":"UNKNOWN"
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -1,110 +1,111 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-11218",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11218",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows."
"lang": "eng",
"value": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"104553",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104553"
"name": "104553",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104553"
},
{
"name":"https://github.com/antirez/redis/issues/5017",
"refsource":"MISC",
"url":"https://github.com/antirez/redis/issues/5017"
"name": "https://github.com/antirez/redis/issues/5017",
"refsource": "MISC",
"url": "https://github.com/antirez/redis/issues/5017"
},
{
"name":"DSA-4230",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4230"
"name": "DSA-4230",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4230"
},
{
"name":"RHSA-2019:0052",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0052"
"name": "RHSA-2019:0052",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0052"
},
{
"name":"https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0",
"refsource":"MISC",
"url":"https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0"
"name": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0",
"refsource": "MISC",
"url": "https://github.com/antirez/redis/commit/5ccb6f7a791bf3490357b00a898885759d98bab0"
},
{
"name":"http://antirez.com/news/119",
"refsource":"MISC",
"url":"http://antirez.com/news/119"
"name": "http://antirez.com/news/119",
"refsource": "MISC",
"url": "http://antirez.com/news/119"
},
{
"name":"https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3",
"refsource":"MISC",
"url":"https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3"
"name": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3",
"refsource": "MISC",
"url": "https://github.com/antirez/redis/commit/52a00201fca331217c3b4b8b634f6a0f57d6b7d3"
},
{
"name":"RHSA-2019:0094",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0094"
"name": "RHSA-2019:0094",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0094"
},
{
"name":"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"refsource":"MISC",
"url":"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
"name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"name":"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"refsource":"MISC",
"url":"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
"name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,110 +1,111 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-11219",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11219",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking."
"lang": "eng",
"value": "An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"104552",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104552"
"name": "104552",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104552"
},
{
"name":"https://github.com/antirez/redis/issues/5017",
"refsource":"MISC",
"url":"https://github.com/antirez/redis/issues/5017"
"name": "https://github.com/antirez/redis/issues/5017",
"refsource": "MISC",
"url": "https://github.com/antirez/redis/issues/5017"
},
{
"name":"https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3",
"refsource":"MISC",
"url":"https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3"
"name": "https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3",
"refsource": "MISC",
"url": "https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3"
},
{
"name":"DSA-4230",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4230"
"name": "DSA-4230",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4230"
},
{
"name":"RHSA-2019:0052",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0052"
"name": "RHSA-2019:0052",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0052"
},
{
"name":"http://antirez.com/news/119",
"refsource":"MISC",
"url":"http://antirez.com/news/119"
"name": "http://antirez.com/news/119",
"refsource": "MISC",
"url": "http://antirez.com/news/119"
},
{
"name":"RHSA-2019:0094",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0094"
"name": "RHSA-2019:0094",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0094"
},
{
"name":"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"refsource":"MISC",
"url":"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
"name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"name":"https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936",
"refsource":"MISC",
"url":"https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936"
"name": "https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936",
"refsource": "MISC",
"url": "https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936"
},
{
"name":"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"refsource":"MISC",
"url":"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
"name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,90 +1,91 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-11236",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11236",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution."
"lang": "eng",
"value": "stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2",
"refsource":"MISC",
"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2"
"name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2",
"refsource": "MISC",
"url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2"
},
{
"name":"104255",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104255"
"name": "104255",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104255"
},
{
"name":"https://sourceware.org/bugzilla/show_bug.cgi?id=22786",
"refsource":"MISC",
"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22786"
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22786"
},
{
"name":"RHSA-2018:3092",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3092"
"name": "RHSA-2018:3092",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3092"
},
{
"refsource":"CONFIRM",
"name":"https://security.netapp.com/advisory/ntap-20190329-0001/",
"url":"https://security.netapp.com/advisory/ntap-20190329-0001/"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190329-0001/",
"url": "https://security.netapp.com/advisory/ntap-20190329-0001/"
},
{
"refsource":"CONFIRM",
"name":"https://security.netapp.com/advisory/ntap-20190401-0001/",
"url":"https://security.netapp.com/advisory/ntap-20190401-0001/"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190401-0001/",
"url": "https://security.netapp.com/advisory/ntap-20190401-0001/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,90 +1,91 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-11237",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11237",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper."
"lang": "eng",
"value": "An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://sourceware.org/bugzilla/show_bug.cgi?id=23196",
"refsource":"MISC",
"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=23196"
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=23196"
},
{
"name":"44750",
"refsource":"EXPLOIT-DB",
"url":"https://www.exploit-db.com/exploits/44750/"
"name": "44750",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44750/"
},
{
"name":"104256",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104256"
"name": "104256",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104256"
},
{
"name":"RHSA-2018:3092",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3092"
"name": "RHSA-2018:3092",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3092"
},
{
"refsource":"CONFIRM",
"name":"https://security.netapp.com/advisory/ntap-20190329-0001/",
"url":"https://security.netapp.com/advisory/ntap-20190329-0001/"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190329-0001/",
"url": "https://security.netapp.com/advisory/ntap-20190329-0001/"
},
{
"refsource":"CONFIRM",
"name":"https://security.netapp.com/advisory/ntap-20190401-0001/",
"url":"https://security.netapp.com/advisory/ntap-20190401-0001/"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190401-0001/",
"url": "https://security.netapp.com/advisory/ntap-20190401-0001/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,71 +1,72 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-09-19T00:00:00",
"ID":"CVE-2018-11761",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-09-19T00:00:00",
"ID": "CVE-2018-11761",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tika",
"version":{
"version_data":[
"product_name": "Apache Tika",
"version": {
"version_data": [
{
"version_value":"0.1 to 1.18"
"version_value": "0.1 to 1.18"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack."
"lang": "eng",
"value": "In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Denial of Service via XML Entity Expansion"
"lang": "eng",
"value": "Denial of Service via XML Entity Expansion"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"105514",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105514"
"name": "105514",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105514"
},
{
"name":"[tika-dev] 20180919 [CVE-2018-11761] Apache Tika DoS XML Entity Expansion Vulnerability",
"refsource":"MLIST",
"url":"https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E"
"name": "[tika-dev] 20180919 [CVE-2018-11761] Apache Tika DoS XML Entity Expansion Vulnerability",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,111 +1,112 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-09-25T00:00:00",
"ID":"CVE-2018-11763",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-09-25T00:00:00",
"ID": "CVE-2018-11763",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache HTTP Server",
"version":{
"version_data":[
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value":"2.4.17 to 2.4.34"
"version_value": "2.4.17 to 2.4.34"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol."
"lang": "eng",
"value": "In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"mod_http2, DoS via continuous SETTINGS frames"
"lang": "eng",
"value": "mod_http2, DoS via continuous SETTINGS frames"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"RHSA-2018:3558",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3558"
"name": "RHSA-2018:3558",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3558"
},
{
"name":"105414",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105414"
"name": "105414",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105414"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190204-0004/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190204-0004/"
"name": "https://security.netapp.com/advisory/ntap-20190204-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190204-0004/"
},
{
"name":"RHSA-2019:0367",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0367"
"name": "RHSA-2019:0367",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0367"
},
{
"name":"USN-3783-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3783-1/"
"name": "USN-3783-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3783-1/"
},
{
"name":"https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource":"CONFIRM",
"url":"https://httpd.apache.org/security/vulnerabilities_24.html"
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name":"1041713",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041713"
"name": "1041713",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041713"
},
{
"name":"RHSA-2019:0366",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0366"
"name": "RHSA-2019:0366",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0366"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,101 +1,102 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-09-10T00:00:00",
"ID":"CVE-2018-11775",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-09-10T00:00:00",
"ID": "CVE-2018-11775",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache ActiveMQ",
"version":{
"version_data":[
"product_name": "Apache ActiveMQ",
"version": {
"version_data": [
{
"version_value":"5.0.0 - 5.15.5"
"version_value": "5.0.0 - 5.15.5"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default."
"lang": "eng",
"value": "TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Missing TLS Hostname Verification"
"lang": "eng",
"value": "Missing TLS Hostname Verification"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"1041618",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041618"
"name": "1041618",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041618"
},
{
"name":"105335",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105335"
"name": "105335",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105335"
},
{
"name":"http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt",
"refsource":"CONFIRM",
"url":"http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt"
"name": "http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt",
"refsource": "CONFIRM",
"url": "http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt"
},
{
"refsource":"MLIST",
"name":"[activemq-commits] 20190327 [CONF] Apache ActiveMQ > Security Advisories",
"url":"https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E"
"refsource": "MLIST",
"name": "[activemq-commits] 20190327 [CONF] Apache ActiveMQ > Security Advisories",
"url": "https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[activemq-dev] 20190327 Re: Website",
"url":"https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E"
"refsource": "MLIST",
"name": "[activemq-dev] 20190327 Re: Website",
"url": "https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/",
"url":"https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E"
"refsource": "MLIST",
"name": "[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/",
"url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[activemq-dev] 20190328 Re: Website",
"url":"https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E"
"refsource": "MLIST",
"name": "[activemq-dev] 20190328 Re: Website",
"url": "https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,177 +1,178 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-10-03T00:00:00",
"ID":"CVE-2018-11784",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-10-03T00:00:00",
"ID": "CVE-2018-11784",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tomcat",
"version":{
"version_data":[
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value":"9.0.0.M1 to 9.0.11"
"version_value": "9.0.0.M1 to 9.0.11"
},
{
"version_value":"8.5.0 to 8.5.33"
"version_value": "8.5.0 to 8.5.33"
},
{
"version_value":"7.0.23 to 7.0.90"
"version_value": "7.0.23 to 7.0.90"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice."
"lang": "eng",
"value": "When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Open Redirect"
"lang": "eng",
"value": "Open Redirect"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"[announce] 20181003 [SECURITY] CVE-2018-11784 Apache Tomcat - Open Redirect",
"refsource":"MLIST",
"url":"https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E"
"name": "[announce] 20181003 [SECURITY] CVE-2018-11784 Apache Tomcat - Open Redirect",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E"
},
{
"name":"https://security.netapp.com/advisory/ntap-20181014-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20181014-0002/"
"name": "https://security.netapp.com/advisory/ntap-20181014-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181014-0002/"
},
{
"name":"105524",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105524"
"name": "105524",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105524"
},
{
"name":"RHSA-2019:0131",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0131"
"name": "RHSA-2019:0131",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0131"
},
{
"name":"RHSA-2019:0485",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0485"
"name": "RHSA-2019:0485",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0485"
},
{
"name":"RHSA-2019:0130",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0130"
"name": "RHSA-2019:0130",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0130"
},
{
"name":"[debian-lts-announce] 20181014 [SECURITY] [DLA 1544-1] tomcat7 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html"
"name": "[debian-lts-announce] 20181014 [SECURITY] [DLA 1544-1] tomcat7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html"
},
{
"name":"USN-3787-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3787-1/"
"name": "USN-3787-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3787-1/"
},
{
"name":"[debian-lts-announce] 20181015 [SECURITY] [DLA 1545-1] tomcat8 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html"
"name": "[debian-lts-announce] 20181015 [SECURITY] [DLA 1545-1] tomcat8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"FEDORA",
"name":"FEDORA-2018-b18f9dd65b",
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/"
"refsource": "FEDORA",
"name": "FEDORA-2018-b18f9dd65b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,95 +1,96 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-12022",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-12022",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload."
"lang": "eng",
"value": "An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/",
"refsource":"MISC",
"name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/"
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/"
},
{
"url":"https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf",
"refsource":"MISC",
"name":"https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf"
"url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf",
"refsource": "MISC",
"name": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf"
},
{
"refsource":"CONFIRM",
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1671098",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1671098"
"refsource": "CONFIRM",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1671098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671098"
},
{
"refsource":"CONFIRM",
"name":"https://github.com/FasterXML/jackson-databind/issues/2052",
"url":"https://github.com/FasterXML/jackson-databind/issues/2052"
"refsource": "CONFIRM",
"name": "https://github.com/FasterXML/jackson-databind/issues/2052",
"url": "https://github.com/FasterXML/jackson-databind/issues/2052"
},
{
"refsource":"CONFIRM",
"name":"https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a",
"url":"https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a"
"refsource": "CONFIRM",
"name": "https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a",
"url": "https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a"
},
{
"refsource":"MISC",
"name":"https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url":"https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
"refsource": "MISC",
"name": "https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062",
"url": "https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,100 +1,101 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-12023",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-12023",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload."
"lang": "eng",
"value": "An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"refsource":"CONFIRM",
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"refsource": "CONFIRM",
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"refsource":"CONFIRM",
"name":"https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"refsource": "CONFIRM",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/",
"refsource":"MISC",
"name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/"
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/"
},
{
"url":"https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf",
"refsource":"MISC",
"name":"https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf"
"url": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf",
"refsource": "MISC",
"name": "https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf"
},
{
"url":"http://www.securityfocus.com/bid/105659",
"refsource":"MISC",
"name":"http://www.securityfocus.com/bid/105659"
"url": "http://www.securityfocus.com/bid/105659",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/105659"
},
{
"refsource":"MISC",
"name":"https://github.com/FasterXML/jackson-databind/issues/2058",
"url":"https://github.com/FasterXML/jackson-databind/issues/2058"
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2058",
"url": "https://github.com/FasterXML/jackson-databind/issues/2058"
},
{
"refsource":"MISC",
"name":"https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a",
"url":"https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a"
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a",
"url": "https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,106 +1,107 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@eclipse.org",
"ID":"CVE-2018-12539",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@eclipse.org",
"ID": "CVE-2018-12539",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Eclipse OpenJ9",
"version":{
"version_data":[
"product_name": "Eclipse OpenJ9",
"version": {
"version_data": [
{
"version_affected":"=",
"version_value":"0.8"
"version_affected": "=",
"version_value": "0.8"
}
]
}
}
]
},
"vendor_name":"The Eclipse Foundation"
"vendor_name": "The Eclipse Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no."
"lang": "eng",
"value": "In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-419: Unprotected Primary Channel"
"lang": "eng",
"value": "CWE-419: Unprotected Primary Channel"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2018:2713",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2713"
"name": "RHSA-2018:2713",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2713"
},
{
"name":"RHSA-2018:2575",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2575"
"name": "RHSA-2018:2575",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2575"
},
{
"name":"RHSA-2018:2576",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2576"
"name": "RHSA-2018:2576",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2576"
},
{
"name":"RHSA-2018:2568",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2568"
"name": "RHSA-2018:2568",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2568"
},
{
"name":"RHSA-2018:2569",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2569"
"name": "RHSA-2018:2569",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2569"
},
{
"name":"RHSA-2018:2712",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2712"
"name": "RHSA-2018:2712",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2712"
},
{
"name":"1041765",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041765"
"name": "1041765",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041765"
},
{
"name":"105126",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105126"
"name": "105126",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105126"
},
{
"name":"https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589",
"refsource":"CONFIRM",
"url":"https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589"
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589",
"refsource": "CONFIRM",
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=534589"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,110 +1,111 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-14718",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-14718",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization."
"lang": "eng",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
"name": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
},
{
"name":"https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/2097"
"name": "https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/2097"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
"name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
},
{
"name":"[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
"name": "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url":"https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url": "https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url":"https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url": "https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url":"https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url": "https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"BID",
"name":"106601",
"url":"http://www.securityfocus.com/bid/106601"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "BID",
"name": "106601",
"url": "http://www.securityfocus.com/bid/106601"
}
]
}

View File

@ -1,95 +1,96 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-14719",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-14719",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization."
"lang": "eng",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
"name": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
},
{
"name":"https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/2097"
"name": "https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/2097"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
"name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
},
{
"name":"[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
"name": "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,110 +1,111 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-14720",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-14720",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization."
"lang": "eng",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
"name": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
},
{
"name":"https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/2097"
"name": "https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/2097"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
"name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
},
{
"name":"[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
"name": "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url":"https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url": "https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url":"https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url": "https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url":"https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"refsource": "MLIST",
"name": "[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...",
"url": "https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,95 +1,96 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-14721",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-14721",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization."
"lang": "eng",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
"name": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44"
},
{
"name":"https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/2097"
"name": "https://github.com/FasterXML/jackson-databind/issues/2097",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/2097"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
"name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7"
},
{
"name":"[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
"name": "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,104 +1,105 @@
{
"CVE_data_meta":{
"ASSIGNER":"security_alert@emc.com",
"DATE_PUBLIC":"2018-10-16T07:00:00.000Z",
"ID":"CVE-2018-15756",
"STATE":"PUBLIC",
"TITLE":"DoS Attack via Range Requests"
"CVE_data_meta": {
"ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-10-16T07:00:00.000Z",
"ID": "CVE-2018-15756",
"STATE": "PUBLIC",
"TITLE": "DoS Attack via Range Requests"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Spring framework",
"version":{
"version_data":[
"product_name": "Spring framework",
"version": {
"version_data": [
{
"affected":"=",
"version_name":"5.1",
"version_value":"5.1"
"affected": "=",
"version_name": "5.1",
"version_value": "5.1"
},
{
"affected":"<=",
"version_name":"5.0.0",
"version_value":"5.0.9"
"affected": "<=",
"version_name": "5.0.0",
"version_value": "5.0.9"
},
{
"affected":"<=",
"version_name":"4.3",
"version_value":"4.3.19"
"affected": "<=",
"version_name": "4.3",
"version_value": "4.3.19"
}
]
}
}
]
},
"vendor_name":"Pivotal"
"vendor_name": "Pivotal"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable."
"lang": "eng",
"value": "Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable."
}
]
},
"impact":{
"cvss":{
"attackComplexity":"LOW",
"attackVector":"NETWORK",
"availabilityImpact":"HIGH",
"baseScore":7.5,
"baseSeverity":"HIGH",
"confidentialityImpact":"NONE",
"integrityImpact":"NONE",
"privilegesRequired":"NONE",
"scope":"UNCHANGED",
"userInteraction":"NONE",
"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version":"3.0"
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Numeric Range Comparison Without Minimum Check"
"lang": "eng",
"value": "Numeric Range Comparison Without Minimum Check"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"105703",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105703"
"name": "105703",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105703"
},
{
"name":"https://pivotal.io/security/cve-2018-15756",
"refsource":"CONFIRM",
"url":"https://pivotal.io/security/cve-2018-15756"
"name": "https://pivotal.io/security/cve-2018-15756",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2018-15756"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
},
"source":{
"discovery":"UNKNOWN"
"source": {
"discovery": "UNKNOWN"
}
}

View File

@ -1,135 +1,136 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2018-16864",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-16864",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"systemd",
"version":{
"version_data":[
"product_name": "systemd",
"version": {
"version_data": [
{
"version_value":"through v240"
"version_value": "through v240"
}
]
}
}
]
},
"vendor_name":"The systemd Project"
"vendor_name": "The systemd Project"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable."
"lang": "eng",
"value": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable."
}
]
},
"impact":{
"cvss":[
"impact": {
"cvss": [
[
{
"vectorString":"7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version":"3.0"
"vectorString": "7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-770"
"lang": "eng",
"value": "CWE-770"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"106523",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/106523"
"name": "106523",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106523"
},
{
"name":"RHSA-2019:0342",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0342"
"name": "RHSA-2019:0342",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0342"
},
{
"name":"[debian-lts-announce] 20190123 [SECURITY] [DLA 1639-1] systemd security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
"name": "[debian-lts-announce] 20190123 [SECURITY] [DLA 1639-1] systemd security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
},
{
"name":"DSA-4367",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2019/dsa-4367"
"name": "DSA-4367",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4367"
},
{
"name":"RHSA-2019:0204",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0204"
"name": "RHSA-2019:0204",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0204"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190117-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190117-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190117-0001/"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864"
},
{
"name":"https://www.qualys.com/2019/01/09/system-down/system-down.txt",
"refsource":"MISC",
"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"
"name": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
"refsource": "MISC",
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
},
{
"name":"USN-3855-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3855-1/"
"name": "USN-3855-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3855-1/"
},
{
"name":"RHSA-2019:0049",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0049"
"name": "RHSA-2019:0049",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0049"
},
{
"name":"RHSA-2019:0271",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0271"
"name": "RHSA-2019:0271",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0271"
},
{
"name":"RHSA-2019:0361",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0361"
"name": "RHSA-2019:0361",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0361"
},
{
"name":"GLSA-201903-07",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201903-07"
"name": "GLSA-201903-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201903-07"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,135 +1,136 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2018-16865",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-16865",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"systemd",
"version":{
"version_data":[
"product_name": "systemd",
"version": {
"version_data": [
{
"version_value":"through v240"
"version_value": "through v240"
}
]
}
}
]
},
"vendor_name":"The systemd Project"
"vendor_name": "The systemd Project"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable."
"lang": "eng",
"value": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable."
}
]
},
"impact":{
"cvss":[
"impact": {
"cvss": [
[
{
"vectorString":"7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version":"3.0"
"vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-770"
"lang": "eng",
"value": "CWE-770"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2019:0342",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0342"
"name": "RHSA-2019:0342",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0342"
},
{
"name":"[debian-lts-announce] 20190123 [SECURITY] [DLA 1639-1] systemd security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
"name": "[debian-lts-announce] 20190123 [SECURITY] [DLA 1639-1] systemd security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html"
},
{
"name":"106525",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/106525"
"name": "106525",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106525"
},
{
"name":"DSA-4367",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2019/dsa-4367"
"name": "DSA-4367",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4367"
},
{
"name":"RHSA-2019:0204",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0204"
"name": "RHSA-2019:0204",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0204"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190117-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190117-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190117-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190117-0001/"
},
{
"name":"https://www.qualys.com/2019/01/09/system-down/system-down.txt",
"refsource":"MISC",
"url":"https://www.qualys.com/2019/01/09/system-down/system-down.txt"
"name": "https://www.qualys.com/2019/01/09/system-down/system-down.txt",
"refsource": "MISC",
"url": "https://www.qualys.com/2019/01/09/system-down/system-down.txt"
},
{
"name":"USN-3855-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3855-1/"
"name": "USN-3855-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3855-1/"
},
{
"name":"RHSA-2019:0049",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0049"
"name": "RHSA-2019:0049",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0049"
},
{
"name":"RHSA-2019:0271",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0271"
"name": "RHSA-2019:0271",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0271"
},
{
"name":"RHSA-2019:0361",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0361"
"name": "RHSA-2019:0361",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0361"
},
{
"name":"GLSA-201903-07",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201903-07"
"name": "GLSA-201903-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201903-07"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,110 +1,111 @@
{
"CVE_data_meta":{
"ASSIGNER":"secalert@redhat.com",
"ID":"CVE-2018-16890",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-16890",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"curl",
"version":{
"version_data":[
"product_name": "curl",
"version": {
"version_data": [
{
"version_value":"7.64.0"
"version_value": "7.64.0"
}
]
}
}
]
},
"vendor_name":"The curl Project"
"vendor_name": "The curl Project"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds."
"lang": "eng",
"value": "libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds."
}
]
},
"impact":{
"cvss":[
"impact": {
"cvss": [
[
{
"vectorString":"5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version":"3.0"
"vectorString": "5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
}
]
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-125"
"lang": "eng",
"value": "CWE-125"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"DSA-4386",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2019/dsa-4386"
"name": "DSA-4386",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4386"
},
{
"name":"106947",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/106947"
"name": "106947",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106947"
},
{
"name":"https://curl.haxx.se/docs/CVE-2018-16890.html",
"refsource":"MISC",
"url":"https://curl.haxx.se/docs/CVE-2018-16890.html"
"name": "https://curl.haxx.se/docs/CVE-2018-16890.html",
"refsource": "MISC",
"url": "https://curl.haxx.se/docs/CVE-2018-16890.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190315-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190315-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190315-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190315-0001/"
},
{
"name":"USN-3882-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3882-1/"
"name": "USN-3882-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3882-1/"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890"
},
{
"refsource":"MLIST",
"name":"[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.",
"url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E"
"refsource": "MLIST",
"name": "[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.",
"url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E"
},
{
"refsource":"CONFIRM",
"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf",
"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,106 +1,107 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2019-01-22T00:00:00",
"ID":"CVE-2018-17189",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2019-01-22T00:00:00",
"ID": "CVE-2018-17189",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache HTTP Server",
"version":{
"version_data":[
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value":"2.4.17 to 2.4.37"
"version_value": "2.4.17 to 2.4.37"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections."
"lang": "eng",
"value": "In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"mod_http2, DoS via slow request bodies"
"lang": "eng",
"value": "mod_http2, DoS via slow request bodies"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource":"CONFIRM",
"url":"https://httpd.apache.org/security/vulnerabilities_24.html"
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name":"106685",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/106685"
"name": "106685",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106685"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190125-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190125-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190125-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190125-0001/"
},
{
"refsource":"FEDORA",
"name":"FEDORA-2019-0300c36537",
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7N3DUEBFVGQWQEME5HTPTTKDHGHBAC6/"
"refsource": "FEDORA",
"name": "FEDORA-2019-0300c36537",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7N3DUEBFVGQWQEME5HTPTTKDHGHBAC6/"
},
{
"refsource":"FEDORA",
"name":"FEDORA-2019-133a8a7cb5",
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IY7SJQOO3PYFVINZW6H5EK4EZ3HSGZNM/"
"refsource": "FEDORA",
"name": "FEDORA-2019-133a8a7cb5",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IY7SJQOO3PYFVINZW6H5EK4EZ3HSGZNM/"
},
{
"refsource":"GENTOO",
"name":"GLSA-201903-21",
"url":"https://security.gentoo.org/glsa/201903-21"
"refsource": "GENTOO",
"name": "GLSA-201903-21",
"url": "https://security.gentoo.org/glsa/201903-21"
},
{
"refsource":"BUGTRAQ",
"name":"20190403 [SECURITY] [DSA 4422-1] apache2 security update",
"url":"https://seclists.org/bugtraq/2019/Apr/5"
"refsource": "BUGTRAQ",
"name": "20190403 [SECURITY] [DSA 4422-1] apache2 security update",
"url": "https://seclists.org/bugtraq/2019/Apr/5"
},
{
"refsource":"UBUNTU",
"name":"USN-3937-1",
"url":"https://usn.ubuntu.com/3937-1/"
"refsource": "UBUNTU",
"name": "USN-3937-1",
"url": "https://usn.ubuntu.com/3937-1/"
},
{
"refsource":"DEBIAN",
"name":"DSA-4422",
"url":"https://www.debian.org/security/2019/dsa-4422"
"refsource": "DEBIAN",
"name": "DSA-4422",
"url": "https://www.debian.org/security/2019/dsa-4422"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,101 +1,102 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2019-01-22T00:00:00",
"ID":"CVE-2018-17199",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2019-01-22T00:00:00",
"ID": "CVE-2018-17199",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache HTTP Server",
"version":{
"version_data":[
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value":"Apache HTTP Server 2.4.0 to 2.4.37"
"version_value": "Apache HTTP Server 2.4.0 to 2.4.37"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded."
"lang": "eng",
"value": "In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Infufficient Session Expiration"
"lang": "eng",
"value": "Infufficient Session Expiration"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"[debian-lts-announce] 20190129 [SECURITY] [DLA 1647-1] apache2 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html"
"name": "[debian-lts-announce] 20190129 [SECURITY] [DLA 1647-1] apache2 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html"
},
{
"name":"106742",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/106742"
"name": "106742",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106742"
},
{
"name":"https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource":"CONFIRM",
"url":"https://httpd.apache.org/security/vulnerabilities_24.html"
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190125-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190125-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190125-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190125-0001/"
},
{
"refsource":"GENTOO",
"name":"GLSA-201903-21",
"url":"https://security.gentoo.org/glsa/201903-21"
"refsource": "GENTOO",
"name": "GLSA-201903-21",
"url": "https://security.gentoo.org/glsa/201903-21"
},
{
"refsource":"BUGTRAQ",
"name":"20190403 [SECURITY] [DSA 4422-1] apache2 security update",
"url":"https://seclists.org/bugtraq/2019/Apr/5"
"refsource": "BUGTRAQ",
"name": "20190403 [SECURITY] [DSA 4422-1] apache2 security update",
"url": "https://seclists.org/bugtraq/2019/Apr/5"
},
{
"refsource":"UBUNTU",
"name":"USN-3937-1",
"url":"https://usn.ubuntu.com/3937-1/"
"refsource": "UBUNTU",
"name": "USN-3937-1",
"url": "https://usn.ubuntu.com/3937-1/"
},
{
"refsource":"DEBIAN",
"name":"DSA-4422",
"url":"https://www.debian.org/security/2019/dsa-4422"
"refsource": "DEBIAN",
"name": "DSA-4422",
"url": "https://www.debian.org/security/2019/dsa-4422"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,105 +1,106 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-19360",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-19360",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization."
"lang": "eng",
"value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/FasterXML/jackson-databind/issues/2186",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/2186"
"name": "https://github.com/FasterXML/jackson-databind/issues/2186",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/2186"
},
{
"name":"[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
"name": "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
},
{
"name":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8"
"name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8"
},
{
"name":"https://issues.apache.org/jira/browse/TINKERPOP-2121",
"refsource":"CONFIRM",
"url":"https://issues.apache.org/jira/browse/TINKERPOP-2121"
"name": "https://issues.apache.org/jira/browse/TINKERPOP-2121",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/TINKERPOP-2121"
},
{
"name":"https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b"
"name": "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b"
},
{
"refsource":"MLIST",
"name":"[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E"
"refsource": "MLIST",
"name": "[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,105 +1,106 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-19361",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-19361",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization."
"lang": "eng",
"value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/FasterXML/jackson-databind/issues/2186",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/2186"
"name": "https://github.com/FasterXML/jackson-databind/issues/2186",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/2186"
},
{
"name":"[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
"name": "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
},
{
"name":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8"
"name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8"
},
{
"name":"https://issues.apache.org/jira/browse/TINKERPOP-2121",
"refsource":"CONFIRM",
"url":"https://issues.apache.org/jira/browse/TINKERPOP-2121"
"name": "https://issues.apache.org/jira/browse/TINKERPOP-2121",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/TINKERPOP-2121"
},
{
"name":"https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b"
"name": "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b"
},
{
"refsource":"MLIST",
"name":"[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E"
"refsource": "MLIST",
"name": "[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,105 +1,106 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-19362",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-19362",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization."
"lang": "eng",
"value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://github.com/FasterXML/jackson-databind/issues/2186",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/2186"
"name": "https://github.com/FasterXML/jackson-databind/issues/2186",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/2186"
},
{
"name":"[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
"name": "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
},
{
"name":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8"
"name": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8"
},
{
"name":"https://issues.apache.org/jira/browse/TINKERPOP-2121",
"refsource":"CONFIRM",
"url":"https://issues.apache.org/jira/browse/TINKERPOP-2121"
"name": "https://issues.apache.org/jira/browse/TINKERPOP-2121",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/TINKERPOP-2121"
},
{
"name":"https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b"
"name": "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b"
},
{
"refsource":"MLIST",
"name":"[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E"
"refsource": "MLIST",
"name": "[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url":"https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities",
"url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
"refsource": "MLIST",
"name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1",
"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0782",
"url":"https://access.redhat.com/errata/RHSA-2019:0782"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"refsource": "REDHAT",
"name": "RHSA-2019:0782",
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
}
]
}

View File

@ -1,91 +1,92 @@
{
"CVE_data_meta":{
"ASSIGNER":"security_alert@emc.com",
"DATE_PUBLIC":"2018-05-09T00:00:00",
"ID":"CVE-2018-1257",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-05-09T00:00:00",
"ID": "CVE-2018-1257",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Spring Framework",
"version":{
"version_data":[
"product_name": "Spring Framework",
"version": {
"version_data": [
{
"version_value":"5.0.x prior to 5.0.6; 4.3.x prior to 4.3.17"
"version_value": "5.0.x prior to 5.0.6; 4.3.x prior to 4.3.17"
}
]
}
}
]
},
"vendor_name":"Pivotal"
"vendor_name": "Pivotal"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack."
"lang": "eng",
"value": "Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"ReDoS"
"lang": "eng",
"value": "ReDoS"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"104260",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104260"
"name": "104260",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104260"
},
{
"name":"RHSA-2018:1809",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1809"
"name": "RHSA-2018:1809",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1809"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"https://pivotal.io/security/cve-2018-1257",
"refsource":"CONFIRM",
"url":"https://pivotal.io/security/cve-2018-1257"
"name": "https://pivotal.io/security/cve-2018-1257",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2018-1257"
},
{
"name":"RHSA-2018:3768",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3768"
"name": "RHSA-2018:3768",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3768"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,102 +1,103 @@
{
"CVE_data_meta":{
"ASSIGNER":"security_alert@emc.com",
"DATE_PUBLIC":"2018-05-09T00:00:00",
"ID":"CVE-2018-1258",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2018-05-09T00:00:00",
"ID": "CVE-2018-1258",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Spring Framework",
"version":{
"version_data":[
"product_name": "Spring Framework",
"version": {
"version_data": [
{
"affected":"=",
"version_value":"5.0.5"
"affected": "=",
"version_value": "5.0.5"
}
]
}
}
]
},
"vendor_name":"Pivotal"
"vendor_name": "Pivotal"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted."
"lang": "eng",
"value": "Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Authorization Bypass"
"lang": "eng",
"value": "Authorization Bypass"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"104222",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104222"
"name": "104222",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104222"
},
{
"name":"1041888",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041888"
"name": "1041888",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041888"
},
{
"name":"1041896",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041896"
"name": "1041896",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041896"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20181018-0002/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20181018-0002/"
"name": "https://security.netapp.com/advisory/ntap-20181018-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181018-0002/"
},
{
"name":"https://pivotal.io/security/cve-2018-1258",
"refsource":"CONFIRM",
"url":"https://pivotal.io/security/cve-2018-1258"
"name": "https://pivotal.io/security/cve-2018-1258",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2018-1258"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,216 +1,217 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-02-23T00:00:00",
"ID":"CVE-2018-1304",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-02-23T00:00:00",
"ID": "CVE-2018-1304",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tomcat",
"version":{
"version_data":[
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value":"Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49, 7.0.0 to 7.0.84"
"version_value": "Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49, 7.0.0 to 7.0.84"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The URL pattern of \"\" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected."
"lang": "eng",
"value": "The URL pattern of \"\" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2018:1448",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1448"
"name": "RHSA-2018:1448",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1448"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180706-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180706-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180706-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180706-0001/"
},
{
"name":"103170",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103170"
"name": "103170",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103170"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"RHSA-2018:1449",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1449"
"name": "RHSA-2018:1449",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1449"
},
{
"name":"RHSA-2018:1450",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1450"
"name": "RHSA-2018:1450",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1450"
},
{
"name":"https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E",
"refsource":"MISC",
"url":"https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E"
"name": "https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E"
},
{
"name":"DSA-4281",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4281"
"name": "DSA-4281",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4281"
},
{
"name":"RHSA-2018:2939",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2939"
"name": "RHSA-2018:2939",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2939"
},
{
"name":"RHSA-2018:0465",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0465"
"name": "RHSA-2018:0465",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0465"
},
{
"name":"USN-3665-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3665-1/"
"name": "USN-3665-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3665-1/"
},
{
"name":"1040427",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040427"
"name": "1040427",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040427"
},
{
"name":"RHSA-2018:1320",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1320"
"name": "RHSA-2018:1320",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1320"
},
{
"name":"RHSA-2018:1451",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1451"
"name": "RHSA-2018:1451",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1451"
},
{
"name":"[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"
"name": "[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"
"name": "[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"
},
{
"name":"RHSA-2018:0466",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0466"
"name": "RHSA-2018:0466",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0466"
},
{
"name":"RHSA-2018:1447",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1447"
"name": "RHSA-2018:1447",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1447"
},
{
"name":"[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"
"name": "[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,191 +1,192 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-02-23T00:00:00",
"ID":"CVE-2018-1305",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-02-23T00:00:00",
"ID": "CVE-2018-1305",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tomcat",
"version":{
"version_data":[
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value":"Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49, 7.0.0 to 7.0.84"
"version_value": "Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49, 7.0.0 to 7.0.84"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them."
"lang": "eng",
"value": "Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"103144",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103144"
"name": "103144",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103144"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180706-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180706-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180706-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180706-0001/"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"DSA-4281",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4281"
"name": "DSA-4281",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4281"
},
{
"name":"RHSA-2018:2939",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2939"
"name": "RHSA-2018:2939",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2939"
},
{
"name":"RHSA-2018:0465",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0465"
"name": "RHSA-2018:0465",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0465"
},
{
"name":"USN-3665-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3665-1/"
"name": "USN-3665-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3665-1/"
},
{
"name":"RHSA-2018:1320",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1320"
"name": "RHSA-2018:1320",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1320"
},
{
"name":"[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"
"name": "[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E",
"refsource":"MISC",
"url":"https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E"
"name": "https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E"
},
{
"name":"[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"
"name": "[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html"
},
{
"name":"RHSA-2018:0466",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0466"
"name": "RHSA-2018:0466",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0466"
},
{
"name":"[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"
"name": "[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html"
},
{
"name":"1040428",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040428"
"name": "1040428",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040428"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,137 +1,138 @@
{
"CVE_data_meta":{
"ASSIGNER":"psirt@us.ibm.com",
"DATE_PUBLIC":"2018-08-16T00:00:00",
"ID":"CVE-2018-1656",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2018-08-16T00:00:00",
"ID": "CVE-2018-1656",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"SDK, Java Technology Edition",
"version":{
"version_data":[
"product_name": "SDK, Java Technology Edition",
"version": {
"version_data": [
{
"version_value":"6.0"
"version_value": "6.0"
},
{
"version_value":"7.0"
"version_value": "7.0"
},
{
"version_value":"8.0"
"version_value": "8.0"
}
]
}
}
]
},
"vendor_name":"IBM"
"vendor_name": "IBM"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882."
"lang": "eng",
"value": "The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882."
}
]
},
"impact":{
"cvssv3":{
"BM":{
"A":"N",
"AC":"L",
"AV":"N",
"C":"N",
"I":"H",
"PR":"N",
"S":"C",
"SCORE":"7.400",
"UI":"R"
"impact": {
"cvssv3": {
"BM": {
"A": "N",
"AC": "L",
"AV": "N",
"C": "N",
"I": "H",
"PR": "N",
"S": "C",
"SCORE": "7.400",
"UI": "R"
},
"TM":{
"E":"U",
"RC":"C",
"RL":"O"
"TM": {
"E": "U",
"RC": "C",
"RL": "O"
}
}
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"File Manipulation"
"lang": "eng",
"value": "File Manipulation"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.ibm.com/support/docview.wss?uid=ibm10719653",
"refsource":"CONFIRM",
"url":"http://www.ibm.com/support/docview.wss?uid=ibm10719653"
"name": "http://www.ibm.com/support/docview.wss?uid=ibm10719653",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=ibm10719653"
},
{
"name":"ibm-java-cve20181656-file-overwrite(144882)",
"refsource":"XF",
"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/144882"
"name": "ibm-java-cve20181656-file-overwrite(144882)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/144882"
},
{
"name":"RHSA-2018:2713",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2713"
"name": "RHSA-2018:2713",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2713"
},
{
"name":"105118",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105118"
"name": "105118",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105118"
},
{
"name":"RHSA-2018:2575",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2575"
"name": "RHSA-2018:2575",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2575"
},
{
"name":"RHSA-2018:2576",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2576"
"name": "RHSA-2018:2576",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2576"
},
{
"name":"RHSA-2018:2568",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2568"
"name": "RHSA-2018:2568",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2568"
},
{
"name":"RHSA-2018:2569",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2569"
"name": "RHSA-2018:2569",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2569"
},
{
"name":"RHSA-2018:2712",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2712"
"name": "RHSA-2018:2712",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2712"
},
{
"name":"1041765",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041765"
"name": "1041765",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041765"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,105 +1,106 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-20685",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20685",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side."
"lang": "eng",
"value": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"DSA-4387",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2019/dsa-4387"
"name": "DSA-4387",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4387"
},
{
"name":"USN-3885-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3885-1/"
"name": "USN-3885-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3885-1/"
},
{
"name":"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"refsource":"MISC",
"url":"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2"
"name": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"refsource": "MISC",
"url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2"
},
{
"name":"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"refsource":"MISC",
"url":"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h"
"name": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"refsource": "MISC",
"url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h"
},
{
"name":"https://security.netapp.com/advisory/ntap-20190215-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20190215-0001/"
"name": "https://security.netapp.com/advisory/ntap-20190215-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190215-0001/"
},
{
"name":"106531",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/106531"
"name": "106531",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106531"
},
{
"name":"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"refsource":"MISC",
"url":"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt"
"name": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"refsource": "MISC",
"url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt"
},
{
"refsource":"GENTOO",
"name":"GLSA-201903-16",
"url":"https://security.gentoo.org/glsa/201903-16"
"refsource": "GENTOO",
"name": "GLSA-201903-16",
"url": "https://security.gentoo.org/glsa/201903-16"
},
{
"refsource":"MLIST",
"name":"[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update",
"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html"
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,311 +1,312 @@
{
"CVE_data_meta":{
"ASSIGNER":"secure@intel.com",
"DATE_PUBLIC":"2018-08-14T00:00:00",
"ID":"CVE-2018-3620",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-08-14T00:00:00",
"ID": "CVE-2018-3620",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Multiple",
"version":{
"version_data":[
"product_name": "Multiple",
"version": {
"version_data": [
{
"version_value":"Multiple"
"version_value": "Multiple"
}
]
}
}
]
},
"vendor_name":"Intel Corporation"
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis."
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"VU#982149",
"refsource":"CERT-VN",
"url":"https://www.kb.cert.org/vuls/id/982149"
"name": "VU#982149",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/982149"
},
{
"name":"1041451",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041451"
"name": "1041451",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041451"
},
{
"name":"http://xenbits.xen.org/xsa/advisory-273.html",
"refsource":"CONFIRM",
"url":"http://xenbits.xen.org/xsa/advisory-273.html"
"name": "http://xenbits.xen.org/xsa/advisory-273.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-273.html"
},
{
"name":"GLSA-201810-06",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201810-06"
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name":"USN-3741-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3741-2/"
"name": "USN-3741-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3741-2/"
},
{
"name":"RHSA-2018:2393",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2393"
"name": "RHSA-2018:2393",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2393"
},
{
"name":"USN-3823-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3823-1/"
"name": "USN-3823-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3823-1/"
},
{
"name":"RHSA-2018:2389",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2389"
"name": "RHSA-2018:2389",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2389"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"RHSA-2018:2403",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2403"
"name": "RHSA-2018:2403",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2403"
},
{
"name":"105080",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105080"
"name": "105080",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105080"
},
{
"name":"RHSA-2018:2395",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2395"
"name": "RHSA-2018:2395",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"name":"RHSA-2018:2384",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2384"
"name": "RHSA-2018:2384",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"name":"https://foreshadowattack.eu/",
"refsource":"MISC",
"url":"https://foreshadowattack.eu/"
"name": "https://foreshadowattack.eu/",
"refsource": "MISC",
"url": "https://foreshadowattack.eu/"
},
{
"name":"http://www.vmware.com/security/advisories/VMSA-2018-0021.html",
"refsource":"CONFIRM",
"url":"http://www.vmware.com/security/advisories/VMSA-2018-0021.html"
"name": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2018-0021.html"
},
{
"name":"USN-3740-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3740-2/"
"name": "USN-3740-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3740-2/"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180815-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180815-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180815-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180815-0001/"
},
{
"name":"FreeBSD-SA-18:09",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc"
"name": "FreeBSD-SA-18:09",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc"
},
{
"name":"DSA-4274",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4274"
"name": "DSA-4274",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4274"
},
{
"name":"FEDORA-2018-1c80fea1cd",
"refsource":"FEDORA",
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/"
"name": "FEDORA-2018-1c80fea1cd",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/"
},
{
"name":"RHSA-2018:2388",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2388"
"name": "RHSA-2018:2388",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2388"
},
{
"name":"USN-3741-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3741-1/"
"name": "USN-3741-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3741-1/"
},
{
"name":"RHSA-2018:2603",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2603"
"name": "RHSA-2018:2603",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2603"
},
{
"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018",
"refsource":"CONFIRM",
"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"RHSA-2018:2402",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2402"
"name": "RHSA-2018:2402",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2402"
},
{
"name":"20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018",
"refsource":"CISCO",
"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel"
"name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel"
},
{
"name":"FEDORA-2018-f8cba144ae",
"refsource":"FEDORA",
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/"
"name": "FEDORA-2018-f8cba144ae",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/"
},
{
"name":"USN-3742-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3742-2/"
"name": "USN-3742-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3742-2/"
},
{
"name":"RHSA-2018:2404",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2404"
"name": "RHSA-2018:2404",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2404"
},
{
"name":"USN-3740-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3740-1/"
"name": "USN-3740-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3740-1/"
},
{
"name":"RHSA-2018:2391",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2391"
"name": "RHSA-2018:2391",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2391"
},
{
"name":"https://support.f5.com/csp/article/K95275140",
"refsource":"CONFIRM",
"url":"https://support.f5.com/csp/article/K95275140"
"name": "https://support.f5.com/csp/article/K95275140",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K95275140"
},
{
"name":"http://support.lenovo.com/us/en/solutions/LEN-24163",
"refsource":"CONFIRM",
"url":"http://support.lenovo.com/us/en/solutions/LEN-24163"
"name": "http://support.lenovo.com/us/en/solutions/LEN-24163",
"refsource": "CONFIRM",
"url": "http://support.lenovo.com/us/en/solutions/LEN-24163"
},
{
"name":"RHSA-2018:2396",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2396"
"name": "RHSA-2018:2396",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"name":"DSA-4279",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4279"
"name": "DSA-4279",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4279"
},
{
"name":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en",
"refsource":"CONFIRM",
"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en"
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en"
},
{
"name":"RHSA-2018:2392",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2392"
"name": "RHSA-2018:2392",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2392"
},
{
"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html",
"refsource":"CONFIRM",
"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html"
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html"
},
{
"name":"[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html"
"name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html"
},
{
"name":"USN-3742-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3742-1/"
"name": "USN-3742-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3742-1/"
},
{
"name":"https://www.synology.com/support/security/Synology_SA_18_45",
"refsource":"CONFIRM",
"url":"https://www.synology.com/support/security/Synology_SA_18_45"
"name": "https://www.synology.com/support/security/Synology_SA_18_45",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_45"
},
{
"name":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009",
"refsource":"CONFIRM",
"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009"
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009"
},
{
"name":"RHSA-2018:2602",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2602"
"name": "RHSA-2018:2602",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2602"
},
{
"name":"[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name":"RHSA-2018:2394",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2394"
"name": "RHSA-2018:2394",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf",
"refsource":"CONFIRM",
"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us"
},
{
"name":"RHSA-2018:2387",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2387"
"name": "RHSA-2018:2387",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"name":"https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"refsource":"CONFIRM",
"url":"https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
"name": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"refsource": "CONFIRM",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,326 +1,327 @@
{
"CVE_data_meta":{
"ASSIGNER":"secure@intel.com",
"DATE_PUBLIC":"2018-08-14T00:00:00",
"ID":"CVE-2018-3646",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-08-14T00:00:00",
"ID": "CVE-2018-3646",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Multiple",
"version":{
"version_data":[
"product_name": "Multiple",
"version": {
"version_data": [
{
"version_value":"Multiple"
"version_value": "Multiple"
}
]
}
}
]
},
"vendor_name":"Intel Corporation"
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis."
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"VU#982149",
"refsource":"CERT-VN",
"url":"https://www.kb.cert.org/vuls/id/982149"
"name": "VU#982149",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/982149"
},
{
"name":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010",
"refsource":"CONFIRM",
"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010"
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010"
},
{
"name":"1041451",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041451"
"name": "1041451",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041451"
},
{
"name":"http://xenbits.xen.org/xsa/advisory-273.html",
"refsource":"CONFIRM",
"url":"http://xenbits.xen.org/xsa/advisory-273.html"
"name": "http://xenbits.xen.org/xsa/advisory-273.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-273.html"
},
{
"name":"GLSA-201810-06",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201810-06"
"name": "GLSA-201810-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201810-06"
},
{
"name":"USN-3741-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3741-2/"
"name": "USN-3741-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3741-2/"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"RHSA-2018:2393",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2393"
"name": "RHSA-2018:2393",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2393"
},
{
"name":"USN-3823-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3823-1/"
"name": "USN-3823-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3823-1/"
},
{
"name":"RHSA-2018:2389",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2389"
"name": "RHSA-2018:2389",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2389"
},
{
"name":"1042004",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1042004"
"name": "1042004",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"RHSA-2018:2403",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2403"
"name": "RHSA-2018:2403",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2403"
},
{
"name":"105080",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105080"
"name": "105080",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105080"
},
{
"name":"RHSA-2018:2395",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2395"
"name": "RHSA-2018:2395",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"name":"RHSA-2018:2384",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2384"
"name": "RHSA-2018:2384",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"name":"https://foreshadowattack.eu/",
"refsource":"MISC",
"url":"https://foreshadowattack.eu/"
"name": "https://foreshadowattack.eu/",
"refsource": "MISC",
"url": "https://foreshadowattack.eu/"
},
{
"name":"USN-3740-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3740-2/"
"name": "USN-3740-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3740-2/"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180815-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180815-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180815-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180815-0001/"
},
{
"name":"FreeBSD-SA-18:09",
"refsource":"FREEBSD",
"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc"
"name": "FreeBSD-SA-18:09",
"refsource": "FREEBSD",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc"
},
{
"name":"DSA-4274",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4274"
"name": "DSA-4274",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4274"
},
{
"name":"FEDORA-2018-1c80fea1cd",
"refsource":"FEDORA",
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/"
"name": "FEDORA-2018-1c80fea1cd",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/"
},
{
"name":"RHSA-2018:2388",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2388"
"name": "RHSA-2018:2388",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2388"
},
{
"name":"USN-3741-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3741-1/"
"name": "USN-3741-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3741-1/"
},
{
"name":"RHSA-2018:2603",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2603"
"name": "RHSA-2018:2603",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2603"
},
{
"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018",
"refsource":"CONFIRM",
"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018"
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"RHSA-2018:2402",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2402"
"name": "RHSA-2018:2402",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2402"
},
{
"name":"20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018",
"refsource":"CISCO",
"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel"
"name": "20180814 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel"
},
{
"name":"FEDORA-2018-f8cba144ae",
"refsource":"FEDORA",
"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/"
"name": "FEDORA-2018-f8cba144ae",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/"
},
{
"name":"USN-3742-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3742-2/"
"name": "USN-3742-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3742-2/"
},
{
"name":"RHSA-2018:2404",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2404"
"name": "RHSA-2018:2404",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2404"
},
{
"name":"USN-3740-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3740-1/"
"name": "USN-3740-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3740-1/"
},
{
"name":"RHSA-2018:2391",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2391"
"name": "RHSA-2018:2391",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2391"
},
{
"name":"http://support.lenovo.com/us/en/solutions/LEN-24163",
"refsource":"CONFIRM",
"url":"http://support.lenovo.com/us/en/solutions/LEN-24163"
"name": "http://support.lenovo.com/us/en/solutions/LEN-24163",
"refsource": "CONFIRM",
"url": "http://support.lenovo.com/us/en/solutions/LEN-24163"
},
{
"name":"RHSA-2018:2396",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2396"
"name": "RHSA-2018:2396",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"name":"DSA-4279",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4279"
"name": "DSA-4279",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4279"
},
{
"name":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en",
"refsource":"CONFIRM",
"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en"
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en"
},
{
"name":"RHSA-2018:2392",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2392"
"name": "RHSA-2018:2392",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2392"
},
{
"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html",
"refsource":"CONFIRM",
"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html"
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html"
},
{
"name":"[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html"
"name": "[debian-lts-announce] 20180828 [SECURITY] [DLA 1481-1] linux-4.9 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html"
},
{
"name":"USN-3742-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3742-1/"
"name": "USN-3742-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3742-1/"
},
{
"name":"https://www.synology.com/support/security/Synology_SA_18_45",
"refsource":"CONFIRM",
"url":"https://www.synology.com/support/security/Synology_SA_18_45"
"name": "https://www.synology.com/support/security/Synology_SA_18_45",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_45"
},
{
"name":"RHSA-2018:2602",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2602"
"name": "RHSA-2018:2602",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2602"
},
{
"name":"[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name":"RHSA-2018:2394",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2394"
"name": "RHSA-2018:2394",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name":"http://www.vmware.com/security/advisories/VMSA-2018-0020.html",
"refsource":"CONFIRM",
"url":"http://www.vmware.com/security/advisories/VMSA-2018-0020.html"
"name": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2018-0020.html"
},
{
"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf",
"refsource":"CONFIRM",
"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us"
},
{
"name":"RHSA-2018:2387",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2387"
"name": "RHSA-2018:2387",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"name":"USN-3756-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3756-1/"
"name": "USN-3756-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"name":"https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"refsource":"CONFIRM",
"url":"https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
"name": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"refsource": "CONFIRM",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"name":"https://support.f5.com/csp/article/K31300402",
"refsource":"CONFIRM",
"url":"https://support.f5.com/csp/article/K31300402"
"name": "https://support.f5.com/csp/article/K31300402",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K31300402"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,90 +1,91 @@
{
"CVE_data_meta":{
"ASSIGNER":"secure@intel.com",
"ID":"CVE-2018-3693",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-3693",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Most Modern Operating Systems",
"version":{
"version_data":[
"product_name": "Most Modern Operating Systems",
"version": {
"version_data": [
{
"version_value":"All"
"version_value": "All"
}
]
}
}
]
},
"vendor_name":"Intel Corporation"
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis."
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://security.netapp.com/advisory/ntap-20180823-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180823-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180823-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180823-0001/"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"RHSA-2018:2395",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2395"
"name": "RHSA-2018:2395",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"name":"RHSA-2018:2384",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2384"
"name": "RHSA-2018:2384",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"name":"https://01.org/security/advisories/intel-oss-10002",
"refsource":"CONFIRM",
"url":"https://01.org/security/advisories/intel-oss-10002"
"name": "https://01.org/security/advisories/intel-oss-10002",
"refsource": "CONFIRM",
"url": "https://01.org/security/advisories/intel-oss-10002"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,145 +1,146 @@
{
"CVE_data_meta":{
"ASSIGNER":"cert@cert.org",
"ID":"CVE-2018-5407",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2018-5407",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Processors supporting Simultaneous Multi-Threading",
"version":{
"version_data":[
"product_name": "Processors supporting Simultaneous Multi-Threading",
"version": {
"version_data": [
{
"version_value":"N/A"
"version_value": "N/A"
}
]
}
}
]
},
"vendor_name":"N/A"
"vendor_name": "N/A"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'."
"lang": "eng",
"value": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"CWE-200"
"lang": "eng",
"value": "CWE-200"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2019:0483",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0483"
"name": "RHSA-2019:0483",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0483"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"https://security.netapp.com/advisory/ntap-20181126-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20181126-0001/"
"name": "https://security.netapp.com/advisory/ntap-20181126-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20181126-0001/"
},
{
"name":"USN-3840-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3840-1/"
"name": "USN-3840-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3840-1/"
},
{
"name":"DSA-4355",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4355"
"name": "DSA-4355",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4355"
},
{
"name":"https://www.tenable.com/security/tns-2018-17",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-17"
"name": "https://www.tenable.com/security/tns-2018-17",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-17"
},
{
"name":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/",
"refsource":"CONFIRM",
"url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"
"name": "https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/",
"refsource": "CONFIRM",
"url": "https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"
},
{
"name":"GLSA-201903-10",
"refsource":"GENTOO",
"url":"https://security.gentoo.org/glsa/201903-10"
"name": "GLSA-201903-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201903-10"
},
{
"name":"https://www.tenable.com/security/tns-2018-16",
"refsource":"CONFIRM",
"url":"https://www.tenable.com/security/tns-2018-16"
"name": "https://www.tenable.com/security/tns-2018-16",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2018-16"
},
{
"name":"45785",
"refsource":"EXPLOIT-DB",
"url":"https://www.exploit-db.com/exploits/45785/"
"name": "45785",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45785/"
},
{
"name":"[debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html"
"name": "[debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html"
},
{
"name":"https://github.com/bbbrumley/portsmash",
"refsource":"MISC",
"url":"https://github.com/bbbrumley/portsmash"
"name": "https://github.com/bbbrumley/portsmash",
"refsource": "MISC",
"url": "https://github.com/bbbrumley/portsmash"
},
{
"name":"DSA-4348",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4348"
"name": "DSA-4348",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4348"
},
{
"name":"105897",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/105897"
"name": "105897",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105897"
},
{
"name":"https://eprint.iacr.org/2018/1060.pdf",
"refsource":"MISC",
"url":"https://eprint.iacr.org/2018/1060.pdf"
"name": "https://eprint.iacr.org/2018/1060.pdf",
"refsource": "MISC",
"url": "https://eprint.iacr.org/2018/1060.pdf"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0651",
"url":"https://access.redhat.com/errata/RHSA-2019:0651"
"refsource": "REDHAT",
"name": "RHSA-2019:0651",
"url": "https://access.redhat.com/errata/RHSA-2019:0651"
},
{
"refsource":"REDHAT",
"name":"RHSA-2019:0652",
"url":"https://access.redhat.com/errata/RHSA-2019:0652"
"refsource": "REDHAT",
"name": "RHSA-2019:0652",
"url": "https://access.redhat.com/errata/RHSA-2019:0652"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,85 +1,86 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-6485",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6485",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption."
"lang": "eng",
"value": "An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"https://sourceware.org/bugzilla/show_bug.cgi?id=22343",
"refsource":"CONFIRM",
"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22343"
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=22343",
"refsource": "CONFIRM",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22343"
},
{
"name":"102912",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/102912"
"name": "102912",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102912"
},
{
"name":"http://bugs.debian.org/878159",
"refsource":"CONFIRM",
"url":"http://bugs.debian.org/878159"
"name": "http://bugs.debian.org/878159",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/878159"
},
{
"name":"RHSA-2018:3092",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:3092"
"name": "RHSA-2018:3092",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3092"
},
{
"refsource":"CONFIRM",
"name":"https://security.netapp.com/advisory/ntap-20190404-0003/",
"url":"https://security.netapp.com/advisory/ntap-20190404-0003/"
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190404-0003/",
"url": "https://security.netapp.com/advisory/ntap-20190404-0003/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,170 +1,171 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-7489",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-7489",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath."
"lang": "eng",
"value": "FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"103203",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103203"
"name": "103203",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103203"
},
{
"name":"RHSA-2018:1448",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1448"
"name": "RHSA-2018:1448",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1448"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"RHSA-2018:1449",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1449"
"name": "RHSA-2018:1449",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1449"
},
{
"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us",
"refsource":"CONFIRM",
"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us"
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us"
},
{
"name":"RHSA-2018:2938",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2938"
"name": "RHSA-2018:2938",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2938"
},
{
"name":"RHSA-2018:1450",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1450"
"name": "RHSA-2018:1450",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1450"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180328-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180328-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180328-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180328-0001/"
},
{
"name":"RHSA-2018:2090",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2090"
"name": "RHSA-2018:2090",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2090"
},
{
"name":"RHSA-2018:2939",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2939"
"name": "RHSA-2018:2939",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2939"
},
{
"name":"1041890",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041890"
"name": "1041890",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041890"
},
{
"name":"1040693",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040693"
"name": "1040693",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040693"
},
{
"name":"https://github.com/FasterXML/jackson-databind/issues/1931",
"refsource":"CONFIRM",
"url":"https://github.com/FasterXML/jackson-databind/issues/1931"
"name": "https://github.com/FasterXML/jackson-databind/issues/1931",
"refsource": "CONFIRM",
"url": "https://github.com/FasterXML/jackson-databind/issues/1931"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
},
{
"name":"RHSA-2018:1786",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1786"
"name": "RHSA-2018:1786",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1786"
},
{
"name":"RHSA-2018:1451",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1451"
"name": "RHSA-2018:1451",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1451"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"DSA-4190",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4190"
"name": "DSA-4190",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4190"
},
{
"name":"RHSA-2018:1447",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1447"
"name": "RHSA-2018:1447",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1447"
},
{
"name":"RHSA-2018:2088",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2088"
"name": "RHSA-2018:2088",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2088"
},
{
"name":"RHSA-2018:2089",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2089"
"name": "RHSA-2018:2089",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2089"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,145 +1,146 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-7566",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-7566",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user."
"lang": "eng",
"value": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"USN-3631-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3631-2/"
"name": "USN-3631-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3631-2/"
},
{
"name":"DSA-4187",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4187"
"name": "DSA-4187",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4187"
},
{
"name":"USN-3631-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3631-1/"
"name": "USN-3631-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3631-1/"
},
{
"name":"RHSA-2018:2390",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2390"
"name": "RHSA-2018:2390",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"name":"RHSA-2018:2395",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2395"
"name": "RHSA-2018:2395",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"name":"RHSA-2018:2384",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2384"
"name": "RHSA-2018:2384",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"name":"DSA-4188",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4188"
"name": "DSA-4188",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4188"
},
{
"name":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource":"CONFIRM",
"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name":"RHSA-2018:2948",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2948"
"name": "RHSA-2018:2948",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da",
"refsource":"CONFIRM",
"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da"
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da",
"refsource": "CONFIRM",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da"
},
{
"name":"103605",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103605"
"name": "103605",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103605"
},
{
"name":"[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
},
{
"name":"[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations",
"refsource":"MLIST",
"url":"http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html"
"name": "[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations",
"refsource": "MLIST",
"url": "http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html"
},
{
"name":"USN-3798-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3798-1/"
"name": "USN-3798-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3798-1/"
},
{
"name":"USN-3798-2",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3798-2/"
"name": "USN-3798-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3798-2/"
},
{
"name":"https://bugzilla.redhat.com/show_bug.cgi?id=1550142",
"refsource":"CONFIRM",
"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"name":"SUSE-SU-2018:0834",
"refsource":"SUSE",
"url":"http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"
"name": "SUSE-SU-2018:0834",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,111 +1,112 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-05-23T00:00:00",
"ID":"CVE-2018-8013",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-05-23T00:00:00",
"ID": "CVE-2018-8013",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Batik",
"version":{
"version_data":[
"product_name": "Apache Batik",
"version": {
"version_data": [
{
"version_value":"1.0 - 1.9.1"
"version_value": "1.0 - 1.9.1"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization."
"lang": "eng",
"value": "In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Information Disclosure"
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource":"CONFIRM",
"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name":"104252",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104252"
"name": "104252",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104252"
},
{
"name":"https://xmlgraphics.apache.org/security.html",
"refsource":"CONFIRM",
"url":"https://xmlgraphics.apache.org/security.html"
"name": "https://xmlgraphics.apache.org/security.html",
"refsource": "CONFIRM",
"url": "https://xmlgraphics.apache.org/security.html"
},
{
"name":"[debian-lts-announce] 20180525 [SECURITY] [DLA 1385-1] batik security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00016.html"
"name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1385-1] batik security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00016.html"
},
{
"name":"DSA-4215",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4215"
"name": "DSA-4215",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4215"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"USN-3661-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3661-1/"
"name": "USN-3661-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3661-1/"
},
{
"name":"[xmlgraphics-batik-dev] 20180523 [CVE-2018-8013] Apache Batik information disclosure vulnerability",
"refsource":"MLIST",
"url":"https://mail-archives.apache.org/mod_mbox/xmlgraphics-batik-dev/201805.mbox/%3c000701d3f28f$d01860a0$704921e0$@gmail.com%3e"
"name": "[xmlgraphics-batik-dev] 20180523 [CVE-2018-8013] Apache Batik information disclosure vulnerability",
"refsource": "MLIST",
"url": "https://mail-archives.apache.org/mod_mbox/xmlgraphics-batik-dev/201805.mbox/%3c000701d3f28f$d01860a0$704921e0$@gmail.com%3e"
},
{
"name":"1040995",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040995"
"name": "1040995",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040995"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,190 +1,191 @@
{
"CVE_data_meta":{
"ASSIGNER":"security@apache.org",
"DATE_PUBLIC":"2018-07-22T00:00:00",
"ID":"CVE-2018-8034",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2018-07-22T00:00:00",
"ID": "CVE-2018-8034",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"Apache Tomcat",
"version":{
"version_data":[
"product_name": "Apache Tomcat",
"version": {
"version_data": [
{
"version_value":"9.0.0.M1 to 9.0.9"
"version_value": "9.0.0.M1 to 9.0.9"
},
{
"version_value":"8.5.0 to 8.5.31"
"version_value": "8.5.0 to 8.5.31"
},
{
"version_value":"8.0.0.RC1 to 8.0.52"
"version_value": "8.0.0.RC1 to 8.0.52"
},
{
"version_value":"7.0.35 to 7.0.88"
"version_value": "7.0.35 to 7.0.88"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88."
"lang": "eng",
"value": "The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"Security Constraint Bypass"
"lang": "eng",
"value": "Security Constraint Bypass"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"USN-3723-1",
"refsource":"UBUNTU",
"url":"https://usn.ubuntu.com/3723-1/"
"name": "USN-3723-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3723-1/"
},
{
"name":"[www-announce] 20180722 [SECURITY] CVE-2018-8034 Apache Tomcat - Security Constraint Bypass",
"refsource":"MLIST",
"url":"http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E"
"name": "[www-announce] 20180722 [SECURITY] CVE-2018-8034 Apache Tomcat - Security Constraint Bypass",
"refsource": "MLIST",
"url": "http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E"
},
{
"name":"RHSA-2019:0451",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0451"
"name": "RHSA-2019:0451",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0451"
},
{
"name":"[debian-lts-announce] 20180730 [SECURITY] [DLA 1453-1] tomcat7 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html"
"name": "[debian-lts-announce] 20180730 [SECURITY] [DLA 1453-1] tomcat7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html"
},
{
"name":"DSA-4281",
"refsource":"DEBIAN",
"url":"https://www.debian.org/security/2018/dsa-4281"
"name": "DSA-4281",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4281"
},
{
"name":"1041374",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1041374"
"name": "1041374",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041374"
},
{
"name":"https://security.netapp.com/advisory/ntap-20180817-0001/",
"refsource":"CONFIRM",
"url":"https://security.netapp.com/advisory/ntap-20180817-0001/"
"name": "https://security.netapp.com/advisory/ntap-20180817-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180817-0001/"
},
{
"name":"RHSA-2019:0131",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0131"
"name": "RHSA-2019:0131",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0131"
},
{
"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource":"CONFIRM",
"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
},
{
"name":"RHSA-2019:0130",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0130"
"name": "RHSA-2019:0130",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0130"
},
{
"name":"RHSA-2019:0450",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2019:0450"
"name": "RHSA-2019:0450",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0450"
},
{
"name":"[debian-lts-announce] 20180902 [SECURITY] [DLA 1491-1] tomcat8 security update",
"refsource":"MLIST",
"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html"
"name": "[debian-lts-announce] 20180902 [SECURITY] [DLA 1491-1] tomcat8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html"
},
{
"name":"104895",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/104895"
"name": "104895",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104895"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url":"https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url":"https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
"refsource": "MLIST",
"name": "[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,210 +1,211 @@
{
"CVE_data_meta":{
"ASSIGNER":"cve@mitre.org",
"ID":"CVE-2018-8088",
"STATE":"PUBLIC"
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-8088",
"STATE": "PUBLIC"
},
"affects":{
"vendor":{
"vendor_data":[
"affects": {
"vendor": {
"vendor_data": [
{
"product":{
"product_data":[
"product": {
"product_data": [
{
"product_name":"n/a",
"version":{
"version_data":[
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value":"n/a"
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name":"n/a"
"vendor_name": "n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang":"eng",
"value":"org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data."
"lang": "eng",
"value": "org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data."
}
]
},
"problemtype":{
"problemtype_data":[
"problemtype": {
"problemtype_data": [
{
"description":[
"description": [
{
"lang":"eng",
"value":"n/a"
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references":{
"reference_data":[
"references": {
"reference_data": [
{
"name":"RHSA-2018:1448",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1448"
"name": "RHSA-2018:1448",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1448"
},
{
"name":"1040627",
"refsource":"SECTRACK",
"url":"http://www.securitytracker.com/id/1040627"
"name": "1040627",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040627"
},
{
"name":"RHSA-2018:1449",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1449"
"name": "RHSA-2018:1449",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1449"
},
{
"name":"https://jira.qos.ch/browse/SLF4J-431",
"refsource":"MISC",
"url":"https://jira.qos.ch/browse/SLF4J-431"
"name": "https://jira.qos.ch/browse/SLF4J-431",
"refsource": "MISC",
"url": "https://jira.qos.ch/browse/SLF4J-431"
},
{
"name":"RHSA-2018:1248",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1248"
"name": "RHSA-2018:1248",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1248"
},
{
"name":"RHSA-2018:1251",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1251"
"name": "RHSA-2018:1251",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1251"
},
{
"name":"RHSA-2018:2143",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2143"
"name": "RHSA-2018:2143",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2143"
},
{
"name":"RHSA-2018:1450",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1450"
"name": "RHSA-2018:1450",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1450"
},
{
"name":"RHSA-2018:2669",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2669"
"name": "RHSA-2018:2669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2669"
},
{
"name":"RHSA-2018:1323",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1323"
"name": "RHSA-2018:1323",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1323"
},
{
"name":"https://jira.qos.ch/browse/SLF4J-430",
"refsource":"MISC",
"url":"https://jira.qos.ch/browse/SLF4J-430"
"name": "https://jira.qos.ch/browse/SLF4J-430",
"refsource": "MISC",
"url": "https://jira.qos.ch/browse/SLF4J-430"
},
{
"name":"RHSA-2018:2420",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2420"
"name": "RHSA-2018:2420",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2420"
},
{
"name":"RHSA-2018:0630",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0630"
"name": "RHSA-2018:0630",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0630"
},
{
"name":"RHSA-2018:1525",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1525"
"name": "RHSA-2018:1525",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1525"
},
{
"name":"RHSA-2018:1575",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1575"
"name": "RHSA-2018:1575",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1575"
},
{
"name":"RHSA-2018:1451",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1451"
"name": "RHSA-2018:1451",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1451"
},
{
"name":"RHSA-2018:0629",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0629"
"name": "RHSA-2018:0629",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0629"
},
{
"name":"RHSA-2018:0628",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0628"
"name": "RHSA-2018:0628",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0628"
},
{
"name":"RHSA-2018:0582",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0582"
"name": "RHSA-2018:0582",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0582"
},
{
"name":"103737",
"refsource":"BID",
"url":"http://www.securityfocus.com/bid/103737"
"name": "103737",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103737"
},
{
"name":"https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405",
"refsource":"MISC",
"url":"https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405"
"name": "https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405",
"refsource": "MISC",
"url": "https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405"
},
{
"name":"RHSA-2018:2419",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2419"
"name": "RHSA-2018:2419",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2419"
},
{
"name":"RHSA-2018:1447",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1447"
"name": "RHSA-2018:1447",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1447"
},
{
"name":"RHSA-2018:1247",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1247"
"name": "RHSA-2018:1247",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1247"
},
{
"name":"RHSA-2018:0627",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0627"
"name": "RHSA-2018:0627",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0627"
},
{
"name":"RHSA-2018:2930",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:2930"
"name": "RHSA-2018:2930",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2930"
},
{
"name":"RHSA-2018:1249",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:1249"
"name": "RHSA-2018:1249",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1249"
},
{
"name":"RHSA-2018:0592",
"refsource":"REDHAT",
"url":"https://access.redhat.com/errata/RHSA-2018:0592"
"name": "RHSA-2018:0592",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0592"
},
{
"refsource":"MLIST",
"name":"[infra-devnull] 20190321 [GitHub] [tika] dadoonet opened pull request #268: Update slf4j to 1.8.0-beta4",
"url":"https://lists.apache.org/thread.html/956ba8e76b6793a6670b2eb0129a5e3003ce2124ca3130fd57d48d0f@%3Cdevnull.infra.apache.org%3E"
"refsource": "MLIST",
"name": "[infra-devnull] 20190321 [GitHub] [tika] dadoonet opened pull request #268: Update slf4j to 1.8.0-beta4",
"url": "https://lists.apache.org/thread.html/956ba8e76b6793a6670b2eb0129a5e3003ce2124ca3130fd57d48d0f@%3Cdevnull.infra.apache.org%3E"
},
{
"refsource":"MLIST",
"name":"[infra-devnull] 20190321 [GitHub] [tika] grossws commented on issue #268: Update slf4j to 1.8.0-beta4",
"url":"https://lists.apache.org/thread.html/95ce76613c869dbccf1d3d29327099ccc71aeec156f76c30853044fa@%3Cdevnull.infra.apache.org%3E"
"refsource": "MLIST",
"name": "[infra-devnull] 20190321 [GitHub] [tika] grossws commented on issue #268: Update slf4j to 1.8.0-beta4",
"url": "https://lists.apache.org/thread.html/95ce76613c869dbccf1d3d29327099ccc71aeec156f76c30853044fa@%3Cdevnull.infra.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}