diff --git a/2014/3xxx/CVE-2014-3622.json b/2014/3xxx/CVE-2014-3622.json index 89081e7cac9..7eaaae91271 100644 --- a/2014/3xxx/CVE-2014-3622.json +++ b/2014/3xxx/CVE-2014-3622.json @@ -1,8 +1,8 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3622", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,61 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Use-after-free vulnerability in the add_post_var function in the Posthandler component in PHP 5.6.x before 5.6.1 might allow remote attackers to execute arbitrary code by leveraging a third-party filter extension that accesses a certain ksep value." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Other" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHP", + "product": { + "product_data": [ + { + "product_name": "PHP", + "version": { + "version_data": [ + { + "version_value": "5.6.x before 5.6.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "http://php.net/ChangeLog-5.php", + "url": "http://php.net/ChangeLog-5.php" + }, + { + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1151423", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151423" + }, + { + "refsource": "MISC", + "name": "https://bugs.php.net/bug.php?id=68088", + "url": "https://bugs.php.net/bug.php?id=68088" } ] } diff --git a/2016/1000xxx/CVE-2016-1000004.json b/2016/1000xxx/CVE-2016-1000004.json index b526cac2eea..0d4cc5e51e7 100644 --- a/2016/1000xxx/CVE-2016-1000004.json +++ b/2016/1000xxx/CVE-2016-1000004.json @@ -1,8 +1,32 @@ { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", + "DATE_ASSIGNED": "2016-06-21", "ID": "CVE-2016-1000004", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +35,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269", + "url": "https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269" + }, + { + "refsource": "CONFIRM", + "name": "https://www.facebook.com/security/advisories/cve-2016-1000004", + "url": "https://www.facebook.com/security/advisories/cve-2016-1000004" } ] } diff --git a/2016/1000xxx/CVE-2016-1000005.json b/2016/1000xxx/CVE-2016-1000005.json index 0497d51afde..10da809b882 100644 --- a/2016/1000xxx/CVE-2016-1000005.json +++ b/2016/1000xxx/CVE-2016-1000005.json @@ -1,8 +1,32 @@ { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", + "DATE_ASSIGNED": "2016-06-21", "ID": "CVE-2016-1000005", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +35,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "mcrypt_get_block_size did not enforce that the provided \"module\" parameter was a string, leading to type confusion if other types of data were passed in. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89", + "url": "https://github.com/facebook/hhvm/commit/39e7e177473350b3a5c34e8824af3b98e25efa89" + }, + { + "refsource": "CONFIRM", + "name": "https://www.facebook.com/security/advisories/cve-2016-1000005", + "url": "https://www.facebook.com/security/advisories/cve-2016-1000005" } ] } diff --git a/2016/1000xxx/CVE-2016-1000109.json b/2016/1000xxx/CVE-2016-1000109.json index 518b9a9effc..cb54b61bc87 100644 --- a/2016/1000xxx/CVE-2016-1000109.json +++ b/2016/1000xxx/CVE-2016-1000109.json @@ -1,8 +1,32 @@ { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", + "DATE_ASSIGNED": "2016-07-17", "ID": "CVE-2016-1000109", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +35,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://httpoxy.org/", + "url": "https://httpoxy.org/" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25", + "url": "https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25" + }, + { + "refsource": "CONFIRM", + "name": "https://www.facebook.com/security/advisories/cve-2016-1000109", + "url": "https://www.facebook.com/security/advisories/cve-2016-1000109" } ] }