"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 22:09:32 +00:00
parent 31d1eda3cf
commit e24928df41
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
47 changed files with 3277 additions and 3277 deletions

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-0288", "ID": "CVE-2005-0288",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The change password functionality in Bottomline Webseries Payment Application does not require the old password when users enter a new password, which could allow remote authenticated users to change other users' passwords." "value": "The change password functionality in Bottomline Webseries Payment Application does not require the old password when users enter a new password, which could allow remote authenticated users to change other users' passwords."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20050110 Portcullis Security Advisory 05-008", "name": "1012854",
"refsource" : "BUGTRAQ", "refsource": "SECTRACK",
"url" : "http://marc.info/?l=bugtraq&m=110549684319400&w=2" "url": "http://securitytracker.com/id?1012854"
}, },
{ {
"name" : "12231", "name": "webseries-pa-password-gain-access(18860)",
"refsource" : "BID", "refsource": "XF",
"url" : "http://www.securityfocus.com/bid/12231" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18860"
}, },
{ {
"name" : "1012854", "name": "20050110 Portcullis Security Advisory 05-008",
"refsource" : "SECTRACK", "refsource": "BUGTRAQ",
"url" : "http://securitytracker.com/id?1012854" "url": "http://marc.info/?l=bugtraq&m=110549684319400&w=2"
}, },
{ {
"name" : "13821", "name": "12231",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/13821" "url": "http://www.securityfocus.com/bid/12231"
}, },
{ {
"name" : "webseries-pa-password-gain-access(18860)", "name": "13821",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18860" "url": "http://secunia.com/advisories/13821"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-0466", "ID": "CVE-2005-0466",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-0776", "ID": "CVE-2005-0776",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "adm-photo.php in PhotoPost PHP 5.0 RC3 does not properly verify administrative privileges before manipulating photos, which could allow remote attackers to manipulate other users' photos." "value": "adm-photo.php in PhotoPost PHP 5.0 RC3 does not properly verify administrative privileges before manipulating photos, which could allow remote attackers to manipulate other users' photos."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20050311 PhotoPost PHP 5.0 RC3, and later, multiple vulnerabilities", "name": "12779",
"refsource" : "BUGTRAQ", "refsource": "BID",
"url" : "http://marc.info/?l=bugtraq&m=111065868402859&w=2" "url": "http://www.securityfocus.com/bid/12779"
}, },
{ {
"name" : "12779", "name": "20050311 PhotoPost PHP 5.0 RC3, and later, multiple vulnerabilities",
"refsource" : "BID", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/bid/12779" "url": "http://marc.info/?l=bugtraq&m=111065868402859&w=2"
}, },
{ {
"name" : "14576", "name": "photopost-image-modification(19677)",
"refsource" : "SECUNIA", "refsource": "XF",
"url" : "http://secunia.com/advisories/14576" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19677"
}, },
{ {
"name" : "photopost-image-modification(19677)", "name": "14576",
"refsource" : "XF", "refsource": "SECUNIA",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/19677" "url": "http://secunia.com/advisories/14576"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-0851", "ID": "CVE-2005-0851",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "FileZilla FTP server before 0.9.6, when using MODE Z (zlib compression), allows remote attackers to cause a denial of service (infinite loop) via certain file uploads or directory listings." "value": "FileZilla FTP server before 0.9.6, when using MODE Z (zlib compression), allows remote attackers to cause a denial of service (infinite loop) via certain file uploads or directory listings."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://sourceforge.net/project/shownotes.php?group_id=21558&release_id=314473", "name": "http://sourceforge.net/project/shownotes.php?group_id=21558&release_id=314473",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://sourceforge.net/project/shownotes.php?group_id=21558&release_id=314473" "url": "http://sourceforge.net/project/shownotes.php?group_id=21558&release_id=314473"
}, },
{ {
"name" : "12865", "name": "12865",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/12865" "url": "http://www.securityfocus.com/bid/12865"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-1066", "ID": "CVE-2005-1066",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Race condition in rpdump in Pine 4.62 and earlier allows local users to overwrite arbitrary files via a symlink attack." "value": "Race condition in rpdump in Pine 4.62 and earlier allows local users to overwrite arbitrary files via a symlink attack."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20050411 rpdump TOCTOU file-permissions vulnerability", "name": "20050411 rpdump TOCTOU file-permissions vulnerability",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://msgs.securepoint.com/cgi-bin/get/bugtraq0504/126.html" "url": "http://msgs.securepoint.com/cgi-bin/get/bugtraq0504/126.html"
}, },
{ {
"name" : "15456", "name": "14899",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://www.osvdb.org/15456" "url": "http://secunia.com/advisories/14899"
}, },
{ {
"name" : "14899", "name": "15456",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/14899" "url": "http://www.osvdb.org/15456"
} }
] ]
} }

View File

@ -1,151 +1,151 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2005-1987", "ID": "CVE-2005-1987",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the \"Content-Type\" string." "value": "Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the \"Content-Type\" string."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051012 [SEC-1 Advisory] Collaboration Data Objects Buffer Overflow Vulnerability", "name": "19905",
"refsource" : "BUGTRAQ", "refsource": "OSVDB",
"url" : "http://marc.info/?l=bugtraq&m=112915118302012&w=2" "url": "http://www.osvdb.org/19905"
}, },
{ {
"name" : "20051012 [SEC-1 Advisory] Collaboration Data Objects Buffer Overflow Vulnerability", "name": "Q907245",
"refsource" : "FULLDISC", "refsource": "MSKB",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html" "url": "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q907245"
}, },
{ {
"name" : "MS05-048", "name": "oval:org.mitre.oval:def:581",
"refsource" : "MS", "refsource": "OVAL",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A581"
}, },
{ {
"name" : "Q907245", "name": "oval:org.mitre.oval:def:1406",
"refsource" : "MSKB", "refsource": "OVAL",
"url" : "http://support.microsoft.com/default.aspx?scid=kb;[LN];Q907245" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1406"
}, },
{ {
"name" : "TA05-284A", "name": "VU#883460",
"refsource" : "CERT", "refsource": "CERT-VN",
"url" : "http://www.us-cert.gov/cas/techalerts/TA05-284A.html" "url": "http://www.kb.cert.org/vuls/id/883460"
}, },
{ {
"name" : "VU#883460", "name": "oval:org.mitre.oval:def:848",
"refsource" : "CERT-VN", "refsource": "OVAL",
"url" : "http://www.kb.cert.org/vuls/id/883460" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A848"
}, },
{ {
"name" : "15067", "name": "oval:org.mitre.oval:def:1515",
"refsource" : "BID", "refsource": "OVAL",
"url" : "http://www.securityfocus.com/bid/15067" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1515"
}, },
{ {
"name" : "19905", "name": "win-cdo-bo(22495)",
"refsource" : "OSVDB", "refsource": "XF",
"url" : "http://www.osvdb.org/19905" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22495"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1130", "name": "17167",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1130" "url": "http://secunia.com/advisories/17167"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1201", "name": "15067",
"refsource" : "OVAL", "refsource": "BID",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1201" "url": "http://www.securityfocus.com/bid/15067"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1406", "name": "oval:org.mitre.oval:def:1420",
"refsource" : "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1406" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1420"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1420", "name": "MS05-048",
"refsource" : "OVAL", "refsource": "MS",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1420" "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-048"
}, },
{ {
"name" : "oval:org.mitre.oval:def:1515", "name": "oval:org.mitre.oval:def:1201",
"refsource" : "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1515" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1201"
}, },
{ {
"name" : "oval:org.mitre.oval:def:581", "name": "oval:org.mitre.oval:def:1130",
"refsource" : "OVAL", "refsource": "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A581" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1130"
}, },
{ {
"name" : "oval:org.mitre.oval:def:848", "name": "TA05-284A",
"refsource" : "OVAL", "refsource": "CERT",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A848" "url": "http://www.us-cert.gov/cas/techalerts/TA05-284A.html"
}, },
{ {
"name" : "1015038", "name": "1015038",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://securitytracker.com/id?1015038" "url": "http://securitytracker.com/id?1015038"
}, },
{ {
"name" : "1015039", "name": "20051012 [SEC-1 Advisory] Collaboration Data Objects Buffer Overflow Vulnerability",
"refsource" : "SECTRACK", "refsource": "FULLDISC",
"url" : "http://securitytracker.com/id?1015039" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html"
}, },
{ {
"name" : "17167", "name": "20051012 [SEC-1 Advisory] Collaboration Data Objects Buffer Overflow Vulnerability",
"refsource" : "SECUNIA", "refsource": "BUGTRAQ",
"url" : "http://secunia.com/advisories/17167" "url": "http://marc.info/?l=bugtraq&m=112915118302012&w=2"
}, },
{ {
"name" : "win-cdo-bo(22495)", "name": "1015039",
"refsource" : "XF", "refsource": "SECTRACK",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/22495" "url": "http://securitytracker.com/id?1015039"
} }
] ]
} }

View File

@ -1,106 +1,106 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-3420", "ID": "CVE-2005-3420",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "usercp_register.php in phpBB 2.0.17 allows remote attackers to modify regular expressions and execute PHP code via the signature_bbcode_uid parameter, as demonstrated by injecting an \"e\" modifier into a preg_replace statement." "value": "usercp_register.php in phpBB 2.0.17 allows remote attackers to modify regular expressions and execute PHP code via the signature_bbcode_uid parameter, as demonstrated by injecting an \"e\" modifier into a preg_replace statement."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051031 Advisory 17/2005: phpBB Multiple Vulnerabilities", "name": "ADV-2005-2250",
"refsource" : "BUGTRAQ", "refsource": "VUPEN",
"url" : "http://marc.info/?l=bugtraq&m=113081113317600&w=2" "url": "http://www.vupen.com/english/advisories/2005/2250"
}, },
{ {
"name" : "http://www.hardened-php.net/advisory_172005.75.html", "name": "20051031 Advisory 17/2005: phpBB Multiple Vulnerabilities",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://www.hardened-php.net/advisory_172005.75.html" "url": "http://marc.info/?l=bugtraq&m=113081113317600&w=2"
}, },
{ {
"name" : "DSA-925", "name": "DSA-925",
"refsource" : "DEBIAN", "refsource": "DEBIAN",
"url" : "http://www.debian.org/security/2005/dsa-925" "url": "http://www.debian.org/security/2005/dsa-925"
}, },
{ {
"name" : "15243", "name": "17366",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/15243" "url": "http://secunia.com/advisories/17366"
}, },
{ {
"name" : "ADV-2005-2250", "name": "130",
"refsource" : "VUPEN", "refsource": "SREASON",
"url" : "http://www.vupen.com/english/advisories/2005/2250" "url": "http://securityreason.com/securityalert/130"
}, },
{ {
"name" : "20391", "name": "18098",
"refsource" : "OSVDB", "refsource": "SECUNIA",
"url" : "http://www.osvdb.org/20391" "url": "http://secunia.com/advisories/18098"
}, },
{ {
"name" : "1015121", "name": "http://www.hardened-php.net/advisory_172005.75.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://securitytracker.com/id?1015121" "url": "http://www.hardened-php.net/advisory_172005.75.html"
}, },
{ {
"name" : "17366", "name": "20391",
"refsource" : "SECUNIA", "refsource": "OSVDB",
"url" : "http://secunia.com/advisories/17366" "url": "http://www.osvdb.org/20391"
}, },
{ {
"name" : "18098", "name": "1015121",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/18098" "url": "http://securitytracker.com/id?1015121"
}, },
{ {
"name" : "130", "name": "15243",
"refsource" : "SREASON", "refsource": "BID",
"url" : "http://securityreason.com/securityalert/130" "url": "http://www.securityfocus.com/bid/15243"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2005-4097", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2005-4097",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2005. Notes: none." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2005. Notes: none."
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-4194", "ID": "CVE-2005-4194",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Buffer overflow in MediaServerList.exe in Sights 'n Sounds Streaming Media Server 2.0.3.a allows remote attackers to cause a denial of service (application crash) via a long query string." "value": "Buffer overflow in MediaServerList.exe in Sights 'n Sounds Streaming Media Server 2.0.3.a allows remote attackers to cause a denial of service (application crash) via a long query string."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.ipomonis.com/advisories/sws.txt", "name": "ADV-2005-2841",
"refsource" : "MISC", "refsource": "VUPEN",
"url" : "http://www.ipomonis.com/advisories/sws.txt" "url": "http://www.vupen.com/english/advisories/2005/2841"
}, },
{ {
"name" : "15809", "name": "http://www.ipomonis.com/advisories/sws.txt",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/15809" "url": "http://www.ipomonis.com/advisories/sws.txt"
}, },
{ {
"name" : "ADV-2005-2841", "name": "15809",
"refsource" : "VUPEN", "refsource": "BID",
"url" : "http://www.vupen.com/english/advisories/2005/2841" "url": "http://www.securityfocus.com/bid/15809"
}, },
{ {
"name" : "17998", "name": "17998",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/17998" "url": "http://secunia.com/advisories/17998"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-4368", "ID": "CVE-2005-4368",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "roundcube webmail Alpha, with a default high verbose level ($rcmail_config['debug_level'] = 1), allows remote attackers to obtain the full path of the application via an invalid_task parameter, which leaks the path in an error message." "value": "roundcube webmail Alpha, with a default high verbose level ($rcmail_config['debug_level'] = 1), allows remote attackers to obtain the full path of the application via an invalid_task parameter, which leaks the path in an error message."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051217 Fullpath disclosure in roundcube webmail", "name": "20060117 Re: Fullpath disclosure in roundcube webmail",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/418851/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/422168/100/0/threaded"
}, },
{ {
"name" : "20051217 Re: Fullpath disclosure in roundcube webmail", "name": "20051217 Re: Fullpath disclosure in roundcube webmail",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/419710/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/419710/100/0/threaded"
}, },
{ {
"name" : "20060117 Re: Fullpath disclosure in roundcube webmail", "name": "20051217 Fullpath disclosure in roundcube webmail",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/422168/100/0/threaded" "url": "http://www.securityfocus.com/archive/1/418851/100/0/threaded"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-4457", "ID": "CVE-2005-4457",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command." "value": "MailEnable Enterprise 1.1 before patch ME-10009 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via several \"...\" (triple dot) sequences in a UID FETCH command."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7", "name": "18134",
"refsource" : "FULLDISC", "refsource": "SECUNIA",
"url" : "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html" "url": "http://secunia.com/advisories/18134"
}, },
{ {
"name" : "18134", "name": "20051220 [ACSSEC-2005-11-27-0x2] Remote Overflows in Mailenable Enterprise 1.1 / Professional 1.7",
"refsource" : "SECUNIA", "refsource": "FULLDISC",
"url" : "http://secunia.com/advisories/18134" "url": "http://seclists.org/lists/fulldisclosure/2005/Dec/1036.html"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2005-4685", "ID": "CVE-2005-4685",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Firefox and Mozilla can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site." "value": "Firefox and Mozilla can associate a cookie with multiple domains when the DNS resolver has a non-root domain in its search list, which allows remote attackers to trick a user into accepting a cookie for a hostname formed via search-list expansion of the hostname entered by the user, or steal a cookie for an expanded hostname, as demonstrated by an attacker who operates an ap1.com Internet web site to steal cookies associated with an ap1.com.example.com intranet web site."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20051104 Browser cookie handling: possible cross-domain cookie sharing", "name": "15331",
"refsource" : "FULLDISC", "refsource": "BID",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0123.html" "url": "http://www.securityfocus.com/bid/15331"
}, },
{ {
"name" : "15331", "name": "20051104 Browser cookie handling: possible cross-domain cookie sharing",
"refsource" : "BID", "refsource": "FULLDISC",
"url" : "http://www.securityfocus.com/bid/15331" "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0123.html"
}, },
{ {
"name" : "konqueror-cookie-information-disclosure(25291)", "name": "konqueror-cookie-information-disclosure(25291)",
"refsource" : "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25291" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25291"
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-0170", "ID": "CVE-2009-0170",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Sun Java System Access Manager 6.3 2005Q1, 7 2005Q4, and 7.1 allows remote authenticated users with console privileges to discover passwords, and obtain unspecified other \"access to resources,\" by visiting the Configuration Items component in the console." "value": "Sun Java System Access Manager 6.3 2005Q1, 7 2005Q4, and 7.1 allows remote authenticated users with console privileges to discover passwords, and obtain unspecified other \"access to resources,\" by visiting the Configuration Items component in the console."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1", "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1"
}, },
{ {
"name" : "242166", "name": "33265",
"refsource" : "SUNALERT", "refsource": "BID",
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242166-1" "url": "http://www.securityfocus.com/bid/33265"
}, },
{ {
"name" : "33265", "name": "1021605",
"refsource" : "BID", "refsource": "SECTRACK",
"url" : "http://www.securityfocus.com/bid/33265" "url": "http://www.securitytracker.com/id?1021605"
}, },
{ {
"name" : "ADV-2009-0156", "name": "242166",
"refsource" : "VUPEN", "refsource": "SUNALERT",
"url" : "http://www.vupen.com/english/advisories/2009/0156" "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-242166-1"
}, },
{ {
"name" : "1021605", "name": "sun-jsam-password-info-disclosure(47942)",
"refsource" : "SECTRACK", "refsource": "XF",
"url" : "http://www.securitytracker.com/id?1021605" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47942"
}, },
{ {
"name" : "sun-jsam-password-info-disclosure(47942)", "name": "ADV-2009-0156",
"refsource" : "XF", "refsource": "VUPEN",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/47942" "url": "http://www.vupen.com/english/advisories/2009/0156"
} }
] ]
} }

View File

@ -1,296 +1,296 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2009-0352", "ID": "CVE-2009-0352",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function." "value": "Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2009/mfsa2009-01.html", "name": "SUSE-SA:2009:023",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://www.mozilla.org/security/announce/2009/mfsa2009-01.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=331088", "name": "33808",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=331088" "url": "http://secunia.com/advisories/33808"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=401042", "name": "ADV-2009-0313",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=401042" "url": "http://www.vupen.com/english/advisories/2009/0313"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=416461", "name": "DSA-1830",
"refsource" : "CONFIRM", "refsource": "DEBIAN",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=416461" "url": "http://www.debian.org/security/2009/dsa-1830"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=420697", "name": "SUSE-SA:2009:009",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=420697" "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=421839", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=431705",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=421839" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=431705"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=422283", "name": "FEDORA-2009-3101",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=422283" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=422301", "name": "33809",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=422301" "url": "http://secunia.com/advisories/33809"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=431705", "name": "MDVSA-2009:044",
"refsource" : "CONFIRM", "refsource": "MANDRIVA",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=431705" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:044"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=437142", "name": "RHSA-2009:0256",
"refsource" : "CONFIRM", "refsource": "REDHAT",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=437142" "url": "http://rhn.redhat.com/errata/RHSA-2009-0256.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=449006", "name": "http://www.mozilla.org/security/announce/2009/mfsa2009-01.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=449006" "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-01.html"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=461027", "name": "SSA:2009-083-02",
"refsource" : "CONFIRM", "refsource": "SLACKWARE",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=461027" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=437142",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=437142"
}, },
{ {
"name" : "DSA-1830", "name": "oval:org.mitre.oval:def:10699",
"refsource" : "DEBIAN", "refsource": "OVAL",
"url" : "http://www.debian.org/security/2009/dsa-1830" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10699"
}, },
{ {
"name" : "FEDORA-2009-1399", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=416461",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=416461"
}, },
{ {
"name" : "FEDORA-2009-2882", "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm"
}, },
{ {
"name" : "FEDORA-2009-2884", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=422283",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=422283"
}, },
{ {
"name" : "FEDORA-2009-3101", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=421839",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=421839"
}, },
{ {
"name" : "MDVSA-2009:044", "name": "33831",
"refsource" : "MANDRIVA", "refsource": "SECUNIA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" "url": "http://secunia.com/advisories/33831"
}, },
{ {
"name" : "MDVSA-2009:083", "name": "RHSA-2009:0258",
"refsource" : "MANDRIVA", "refsource": "REDHAT",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" "url": "http://www.redhat.com/support/errata/RHSA-2009-0258.html"
}, },
{ {
"name" : "RHSA-2009:0256", "name": "MDVSA-2009:083",
"refsource" : "REDHAT", "refsource": "MANDRIVA",
"url" : "http://rhn.redhat.com/errata/RHSA-2009-0256.html" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083"
}, },
{ {
"name" : "RHSA-2009:0257", "name": "1021663",
"refsource" : "REDHAT", "refsource": "SECTRACK",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0257.html" "url": "http://www.securitytracker.com/id?1021663"
}, },
{ {
"name" : "RHSA-2009:0258", "name": "34464",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0258.html" "url": "http://secunia.com/advisories/34464"
}, },
{ {
"name" : "SSA:2009-083-02", "name": "34417",
"refsource" : "SLACKWARE", "refsource": "SECUNIA",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420" "url": "http://secunia.com/advisories/34417"
}, },
{ {
"name" : "SSA:2009-083-03", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=331088",
"refsource" : "SLACKWARE", "refsource": "CONFIRM",
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=331088"
}, },
{ {
"name" : "SUSE-SA:2009:023", "name": "33841",
"refsource" : "SUSE", "refsource": "SECUNIA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" "url": "http://secunia.com/advisories/33841"
}, },
{ {
"name" : "SUSE-SA:2009:009", "name": "34527",
"refsource" : "SUSE", "refsource": "SECUNIA",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" "url": "http://secunia.com/advisories/34527"
}, },
{ {
"name" : "USN-717-1", "name": "33816",
"refsource" : "UBUNTU", "refsource": "SECUNIA",
"url" : "http://www.ubuntu.com/usn/usn-717-1" "url": "http://secunia.com/advisories/33816"
}, },
{ {
"name" : "USN-741-1", "name": "33846",
"refsource" : "UBUNTU", "refsource": "SECUNIA",
"url" : "https://usn.ubuntu.com/741-1/" "url": "http://secunia.com/advisories/33846"
}, },
{ {
"name" : "33598", "name": "33799",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/33598" "url": "http://secunia.com/advisories/33799"
}, },
{ {
"name" : "oval:org.mitre.oval:def:10699", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=401042",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10699" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=401042"
}, },
{ {
"name" : "33802", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=422301",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/33802" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=422301"
}, },
{ {
"name" : "33831", "name": "FEDORA-2009-2882",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/33831" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html"
}, },
{ {
"name" : "33841", "name": "RHSA-2009:0257",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/33841" "url": "http://www.redhat.com/support/errata/RHSA-2009-0257.html"
}, },
{ {
"name" : "33846", "name": "FEDORA-2009-2884",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/33846" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html"
}, },
{ {
"name" : "34387", "name": "SSA:2009-083-03",
"refsource" : "SECUNIA", "refsource": "SLACKWARE",
"url" : "http://secunia.com/advisories/34387" "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952"
}, },
{ {
"name" : "34324", "name": "34462",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/34324" "url": "http://secunia.com/advisories/34462"
}, },
{ {
"name" : "34417", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=420697",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/34417" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=420697"
}, },
{ {
"name" : "34462", "name": "33598",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/34462" "url": "http://www.securityfocus.com/bid/33598"
}, },
{ {
"name" : "34464", "name": "USN-741-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/34464" "url": "https://usn.ubuntu.com/741-1/"
}, },
{ {
"name" : "34527", "name": "FEDORA-2009-1399",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/34527" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html"
}, },
{ {
"name" : "ADV-2009-0313", "name": "33802",
"refsource" : "VUPEN", "refsource": "SECUNIA",
"url" : "http://www.vupen.com/english/advisories/2009/0313" "url": "http://secunia.com/advisories/33802"
}, },
{ {
"name" : "1021663", "name": "34324",
"refsource" : "SECTRACK", "refsource": "SECUNIA",
"url" : "http://www.securitytracker.com/id?1021663" "url": "http://secunia.com/advisories/34324"
}, },
{ {
"name" : "33799", "name": "33869",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33799" "url": "http://secunia.com/advisories/33869"
}, },
{ {
"name" : "33808", "name": "USN-717-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/33808" "url": "http://www.ubuntu.com/usn/usn-717-1"
}, },
{ {
"name" : "33809", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=449006",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/33809" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=449006"
}, },
{ {
"name" : "33816", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=461027",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/33816" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=461027"
}, },
{ {
"name" : "33869", "name": "34387",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33869" "url": "http://secunia.com/advisories/34387"
} }
] ]
} }

View File

@ -1,191 +1,191 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2009-0355", "ID": "CVE-2009-0355",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type=\"file\" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element." "value": "components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type=\"file\" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2009/mfsa2009-03.html", "name": "33808",
"refsource" : "CONFIRM", "refsource": "SECUNIA",
"url" : "http://www.mozilla.org/security/announce/2009/mfsa2009-03.html" "url": "http://secunia.com/advisories/33808"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466937", "name": "ADV-2009-0313",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=466937" "url": "http://www.vupen.com/english/advisories/2009/0313"
}, },
{ {
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm", "name": "SUSE-SA:2009:009",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html"
}, },
{ {
"name" : "FEDORA-2009-1399", "name": "33809",
"refsource" : "FEDORA", "refsource": "SECUNIA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" "url": "http://secunia.com/advisories/33809"
}, },
{ {
"name" : "FEDORA-2009-2882", "name": "MDVSA-2009:044",
"refsource" : "FEDORA", "refsource": "MANDRIVA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:044"
}, },
{ {
"name" : "FEDORA-2009-2884", "name": "RHSA-2009:0256",
"refsource" : "FEDORA", "refsource": "REDHAT",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" "url": "http://rhn.redhat.com/errata/RHSA-2009-0256.html"
}, },
{ {
"name" : "MDVSA-2009:044", "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm",
"refsource" : "MANDRIVA", "refsource": "CONFIRM",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm"
}, },
{ {
"name" : "RHSA-2009:0256", "name": "33831",
"refsource" : "REDHAT", "refsource": "SECUNIA",
"url" : "http://rhn.redhat.com/errata/RHSA-2009-0256.html" "url": "http://secunia.com/advisories/33831"
}, },
{ {
"name" : "RHSA-2009:0257", "name": "oval:org.mitre.oval:def:9161",
"refsource" : "REDHAT", "refsource": "OVAL",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0257.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9161"
}, },
{ {
"name" : "RHSA-2009:0258", "name": "USN-717-2",
"refsource" : "REDHAT", "refsource": "UBUNTU",
"url" : "http://www.redhat.com/support/errata/RHSA-2009-0258.html" "url": "http://www.ubuntu.com/usn/usn-717-2"
}, },
{ {
"name" : "SUSE-SA:2009:009", "name": "RHSA-2009:0258",
"refsource" : "SUSE", "refsource": "REDHAT",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" "url": "http://www.redhat.com/support/errata/RHSA-2009-0258.html"
}, },
{ {
"name" : "USN-717-1", "name": "http://www.mozilla.org/security/announce/2009/mfsa2009-03.html",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/usn-717-1" "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-03.html"
}, },
{ {
"name" : "USN-717-2", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=466937",
"refsource" : "UBUNTU", "refsource": "CONFIRM",
"url" : "http://www.ubuntu.com/usn/usn-717-2" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=466937"
}, },
{ {
"name" : "33598", "name": "34417",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/33598" "url": "http://secunia.com/advisories/34417"
}, },
{ {
"name" : "oval:org.mitre.oval:def:9161", "name": "33841",
"refsource" : "OVAL", "refsource": "SECUNIA",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9161" "url": "http://secunia.com/advisories/33841"
}, },
{ {
"name" : "33831", "name": "33816",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33831" "url": "http://secunia.com/advisories/33816"
}, },
{ {
"name" : "33841", "name": "33846",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33841" "url": "http://secunia.com/advisories/33846"
}, },
{ {
"name" : "33846", "name": "33799",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33846" "url": "http://secunia.com/advisories/33799"
}, },
{ {
"name" : "34324", "name": "FEDORA-2009-2882",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/34324" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html"
}, },
{ {
"name" : "34417", "name": "RHSA-2009:0257",
"refsource" : "SECUNIA", "refsource": "REDHAT",
"url" : "http://secunia.com/advisories/34417" "url": "http://www.redhat.com/support/errata/RHSA-2009-0257.html"
}, },
{ {
"name" : "ADV-2009-0313", "name": "FEDORA-2009-2884",
"refsource" : "VUPEN", "refsource": "FEDORA",
"url" : "http://www.vupen.com/english/advisories/2009/0313" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html"
}, },
{ {
"name" : "1021665", "name": "33598",
"refsource" : "SECTRACK", "refsource": "BID",
"url" : "http://www.securitytracker.com/id?1021665" "url": "http://www.securityfocus.com/bid/33598"
}, },
{ {
"name" : "33799", "name": "FEDORA-2009-1399",
"refsource" : "SECUNIA", "refsource": "FEDORA",
"url" : "http://secunia.com/advisories/33799" "url": "https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html"
}, },
{ {
"name" : "33808", "name": "34324",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33808" "url": "http://secunia.com/advisories/34324"
}, },
{ {
"name" : "33809", "name": "33869",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/33809" "url": "http://secunia.com/advisories/33869"
}, },
{ {
"name" : "33816", "name": "USN-717-1",
"refsource" : "SECUNIA", "refsource": "UBUNTU",
"url" : "http://secunia.com/advisories/33816" "url": "http://www.ubuntu.com/usn/usn-717-1"
}, },
{ {
"name" : "33869", "name": "1021665",
"refsource" : "SECUNIA", "refsource": "SECTRACK",
"url" : "http://secunia.com/advisories/33869" "url": "http://www.securitytracker.com/id?1021665"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-1178", "ID": "CVE-2009-1178",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in the server in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.2 and 6.x before 6.1 has unknown impact and attack vectors related to the \"admin command line.\"" "value": "Unspecified vulnerability in the server in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.2 and 6.x before 6.1 has unknown impact and attack vectors related to the \"admin command line.\""
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21246076", "name": "ADV-2009-0881",
"refsource" : "CONFIRM", "refsource": "VUPEN",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21246076" "url": "http://www.vupen.com/english/advisories/2009/0881"
}, },
{ {
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21375360", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21375360",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21375360" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21375360"
}, },
{ {
"name" : "IC46744", "name": "IC46744",
"refsource" : "AIXAPAR", "refsource": "AIXAPAR",
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg1IC46744" "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC46744"
}, },
{ {
"name" : "34285", "name": "34285",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/34285" "url": "http://www.securityfocus.com/bid/34285"
}, },
{ {
"name" : "1021945", "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21246076",
"refsource" : "SECTRACK", "refsource": "CONFIRM",
"url" : "http://securitytracker.com/id?1021945" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21246076"
}, },
{ {
"name" : "34498", "name": "34498",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/34498" "url": "http://secunia.com/advisories/34498"
}, },
{ {
"name" : "ADV-2009-0881", "name": "1021945",
"refsource" : "VUPEN", "refsource": "SECTRACK",
"url" : "http://www.vupen.com/english/advisories/2009/0881" "url": "http://securitytracker.com/id?1021945"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-1509", "ID": "CVE-2009-1509",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "SQL injection vulnerability in ajaxp_backend.php in MyioSoft AjaxPortal 3.0 allows remote attackers to execute arbitrary SQL commands via the page parameter." "value": "SQL injection vulnerability in ajaxp_backend.php in MyioSoft AjaxPortal 3.0 allows remote attackers to execute arbitrary SQL commands via the page parameter."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "8341", "name": "34529",
"refsource" : "EXPLOIT-DB", "refsource": "SECUNIA",
"url" : "https://www.exploit-db.com/exploits/8341" "url": "http://secunia.com/advisories/34529"
}, },
{ {
"name" : "34338", "name": "8341",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/34338" "url": "https://www.exploit-db.com/exploits/8341"
}, },
{ {
"name" : "34529", "name": "34338",
"refsource" : "SECUNIA", "refsource": "BID",
"url" : "http://secunia.com/advisories/34529" "url": "http://www.securityfocus.com/bid/34338"
} }
] ]
} }

View File

@ -1,91 +1,91 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2009-3073", "ID": "CVE-2009-3073",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors." "value": "Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html", "name": "36343",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html" "url": "http://www.securityfocus.com/bid/36343"
}, },
{ {
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=507292", "name": "SUSE-SA:2009:048",
"refsource" : "CONFIRM", "refsource": "SUSE",
"url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=507292" "url": "http://www.novell.com/linux/security/advisories/2009_48_firefox.html"
}, },
{ {
"name" : "SUSE-SA:2009:048", "name": "oval:org.mitre.oval:def:6398",
"refsource" : "SUSE", "refsource": "OVAL",
"url" : "http://www.novell.com/linux/security/advisories/2009_48_firefox.html" "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6398"
}, },
{ {
"name" : "36343", "name": "36671",
"refsource" : "BID", "refsource": "SECUNIA",
"url" : "http://www.securityfocus.com/bid/36343" "url": "http://secunia.com/advisories/36671"
}, },
{ {
"name" : "oval:org.mitre.oval:def:6398", "name": "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html",
"refsource" : "OVAL", "refsource": "CONFIRM",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6398" "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-47.html"
}, },
{ {
"name" : "36671", "name": "37098",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/36671" "url": "http://secunia.com/advisories/37098"
}, },
{ {
"name" : "37098", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=507292",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/37098" "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=507292"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2009-3870", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2009-3870",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3870. Reason: This candidate is a duplicate of CVE-2008-3870. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2008-3870 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3870. Reason: This candidate is a duplicate of CVE-2008-3870. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2008-3870 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
} }
] ]
} }

View File

@ -1,101 +1,101 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2009-3891", "ID": "CVE-2009-3891",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in wp-admin/press-this.php in WordPress before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML via the s parameter (aka the selection variable)." "value": "Cross-site scripting (XSS) vulnerability in wp-admin/press-this.php in WordPress before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML via the s parameter (aka the selection variable)."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20091115 CVE request: Wordpress 2.8.6", "name": "37332",
"refsource" : "MLIST", "refsource": "SECUNIA",
"url" : "http://www.openwall.com/lists/oss-security/2009/11/15/2" "url": "http://secunia.com/advisories/37332"
}, },
{ {
"name" : "[oss-security] 20091115 Re: CVE request: Wordpress 2.8.6", "name": "[oss-security] 20091116 Re: CVE request: Wordpress 2.8.6",
"refsource" : "MLIST", "refsource": "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/11/15/3" "url": "http://www.openwall.com/lists/oss-security/2009/11/16/1"
}, },
{ {
"name" : "[oss-security] 20091116 Re: CVE request: Wordpress 2.8.6", "name": "http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/",
"refsource" : "MLIST", "refsource": "CONFIRM",
"url" : "http://www.openwall.com/lists/oss-security/2009/11/16/1" "url": "http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/"
}, },
{ {
"name" : "http://core.trac.wordpress.org/attachment/ticket/11119/press-this-xss-bug-11-10-2009.patch", "name": "59959",
"refsource" : "CONFIRM", "refsource": "OSVDB",
"url" : "http://core.trac.wordpress.org/attachment/ticket/11119/press-this-xss-bug-11-10-2009.patch" "url": "http://www.osvdb.org/59959"
}, },
{ {
"name" : "http://core.trac.wordpress.org/attachment/ticket/11119/press-this.002.diff", "name": "[oss-security] 20091115 Re: CVE request: Wordpress 2.8.6",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "http://core.trac.wordpress.org/attachment/ticket/11119/press-this.002.diff" "url": "http://www.openwall.com/lists/oss-security/2009/11/15/3"
}, },
{ {
"name" : "http://core.trac.wordpress.org/ticket/11119", "name": "http://core.trac.wordpress.org/ticket/11119",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://core.trac.wordpress.org/ticket/11119" "url": "http://core.trac.wordpress.org/ticket/11119"
}, },
{ {
"name" : "http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/", "name": "http://core.trac.wordpress.org/attachment/ticket/11119/press-this-xss-bug-11-10-2009.patch",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/" "url": "http://core.trac.wordpress.org/attachment/ticket/11119/press-this-xss-bug-11-10-2009.patch"
}, },
{ {
"name" : "59959", "name": "[oss-security] 20091115 CVE request: Wordpress 2.8.6",
"refsource" : "OSVDB", "refsource": "MLIST",
"url" : "http://www.osvdb.org/59959" "url": "http://www.openwall.com/lists/oss-security/2009/11/15/2"
}, },
{ {
"name" : "37332", "name": "http://core.trac.wordpress.org/attachment/ticket/11119/press-this.002.diff",
"refsource" : "SECUNIA", "refsource": "CONFIRM",
"url" : "http://secunia.com/advisories/37332" "url": "http://core.trac.wordpress.org/attachment/ticket/11119/press-this.002.diff"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4186", "ID": "CVE-2009-4186",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Stack consumption vulnerability in Apple Safari 4.0.3 on Windows allows remote attackers to cause a denial of service (application crash) via a long URI value (aka url) in the Cascading Style Sheets (CSS) background property." "value": "Stack consumption vulnerability in Apple Safari 4.0.3 on Windows allows remote attackers to cause a denial of service (application crash) via a long URI value (aka url) in the Cascading Style Sheets (CSS) background property."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "10102", "name": "safari-css-property-bo(54487)",
"refsource" : "EXPLOIT-DB", "refsource": "XF",
"url" : "http://www.exploit-db.com/exploits/10102" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54487"
}, },
{ {
"name" : "37039", "name": "10102",
"refsource" : "BID", "refsource": "EXPLOIT-DB",
"url" : "http://www.securityfocus.com/bid/37039" "url": "http://www.exploit-db.com/exploits/10102"
}, },
{ {
"name" : "safari-css-property-bo(54487)", "name": "37039",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/54487" "url": "http://www.securityfocus.com/bid/37039"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4252", "ID": "CVE-2009-4252",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in images.php in Image Hosting Script DPI 1.1 Final (1.1F) allows remote attackers to inject arbitrary web script or HTML via the date parameter. NOTE: some of these details are obtained from third party information." "value": "Cross-site scripting (XSS) vulnerability in images.php in Image Hosting Script DPI 1.1 Final (1.1F) allows remote attackers to inject arbitrary web script or HTML via the date parameter. NOTE: some of these details are obtained from third party information."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "10300", "name": "http://www.clixint.com/support/viewtopic.php?f=3&t=542",
"refsource" : "EXPLOIT-DB", "refsource": "CONFIRM",
"url" : "http://www.exploit-db.com/exploits/10300" "url": "http://www.clixint.com/support/viewtopic.php?f=3&t=542"
}, },
{ {
"name" : "http://www.clixint.com/support/viewtopic.php?f=3&t=542", "name": "10300",
"refsource" : "CONFIRM", "refsource": "EXPLOIT-DB",
"url" : "http://www.clixint.com/support/viewtopic.php?f=3&t=542" "url": "http://www.exploit-db.com/exploits/10300"
}, },
{ {
"name" : "37456", "name": "37456",
"refsource" : "SECUNIA", "refsource": "SECUNIA",
"url" : "http://secunia.com/advisories/37456" "url": "http://secunia.com/advisories/37456"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4611", "ID": "CVE-2009-4611",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Mort Bay Jetty 6.x and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application." "value": "Mort Bay Jetty 6.x and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection", "name": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/508830/100/0/threaded" "url": "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt"
}, },
{ {
"name" : "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt", "name": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.ush.it/team/ush/hack-jetty6x7x/jetty-adv.txt" "url": "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt"
}, },
{ {
"name" : "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt", "name": "20100110 Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa log escape sequence injection",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://www.ush.it/team/ush/hack_httpd_escape/adv.txt" "url": "http://www.securityfocus.com/archive/1/508830/100/0/threaded"
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4649", "ID": "CVE-2009-4649",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in geccBBlite 0.1 allow remote attackers to inject arbitrary web script or HTML via the postatoda parameter to (1) rispondi.php and (2) scrivi.php, which is not properly handled in forum.php." "value": "Multiple cross-site scripting (XSS) vulnerabilities in geccBBlite 0.1 allow remote attackers to inject arbitrary web script or HTML via the postatoda parameter to (1) rispondi.php and (2) scrivi.php, which is not properly handled in forum.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://groups.csail.mit.edu/pag/ardilla/", "name": "http://groups.csail.mit.edu/pag/ardilla/",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://groups.csail.mit.edu/pag/ardilla/" "url": "http://groups.csail.mit.edu/pag/ardilla/"
}, },
{ {
"name" : "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-lenient-T.txt", "name": "geccbblite-postatoda-xss(56278)",
"refsource" : "MISC", "refsource": "XF",
"url" : "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-lenient-T.txt" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56278"
}, },
{ {
"name" : "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-strict-T.txt", "name": "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-strict-T.txt",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-strict-T.txt" "url": "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-strict-T.txt"
}, },
{ {
"name" : "35449", "name": "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-lenient-T.txt",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/35449" "url": "http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-lenient-T.txt"
}, },
{ {
"name" : "geccbblite-postatoda-xss(56278)", "name": "35449",
"refsource" : "XF", "refsource": "BID",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/56278" "url": "http://www.securityfocus.com/bid/35449"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2009-4789", "ID": "CVE-2009-4789",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Multiple PHP remote file inclusion vulnerabilities in the MojoBlog component RC 0.15 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) wp-comments-post.php and (2) wp-trackback.php." "value": "Multiple PHP remote file inclusion vulnerabilities in the MojoBlog component RC 0.15 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) wp-comments-post.php and (2) wp-trackback.php."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://packetstormsecurity.org/0912-exploits/joomlamojoblog-rfi.txt", "name": "37179",
"refsource" : "MISC", "refsource": "BID",
"url" : "http://packetstormsecurity.org/0912-exploits/joomlamojoblog-rfi.txt" "url": "http://www.securityfocus.com/bid/37179"
}, },
{ {
"name" : "37179", "name": "http://packetstormsecurity.org/0912-exploits/joomlamojoblog-rfi.txt",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/37179" "url": "http://packetstormsecurity.org/0912-exploits/joomlamojoblog-rfi.txt"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@adobe.com",
"ID" : "CVE-2012-2042", "ID": "CVE-2012-2042",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026." "value": "Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2023, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.adobe.com/support/security/bulletins/apsb12-10.html", "name": "http://www.adobe.com/support/security/bulletins/apsb12-10.html",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "http://www.adobe.com/support/security/bulletins/apsb12-10.html" "url": "http://www.adobe.com/support/security/bulletins/apsb12-10.html"
}, },
{ {
"name" : "1027047", "name": "1027047",
"refsource" : "SECTRACK", "refsource": "SECTRACK",
"url" : "http://www.securitytracker.com/id?1027047" "url": "http://www.securitytracker.com/id?1027047"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "psirt@us.ibm.com",
"ID" : "CVE-2012-2169", "ID": "CVE-2012-2169",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability in the file-upload functionality in the Web client in IBM Rational ClearQuest 7.1.x before 7.1.2.7 allows remote authenticated users to inject arbitrary web script or HTML via the File Description field." "value": "Cross-site scripting (XSS) vulnerability in the file-upload functionality in the Web client in IBM Rational ClearQuest 7.1.x before 7.1.2.7 allows remote authenticated users to inject arbitrary web script or HTML via the File Description field."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://www.ibm.com/support/docview.wss?uid=swg21607783", "name": "PM62762",
"refsource" : "CONFIRM", "refsource": "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg21607783" "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM62762"
}, },
{ {
"name" : "PM62762", "name": "http://www.ibm.com/support/docview.wss?uid=swg21607783",
"refsource" : "AIXAPAR", "refsource": "CONFIRM",
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg1PM62762" "url": "http://www.ibm.com/support/docview.wss?uid=swg21607783"
}, },
{ {
"name" : "rcq-filedesc-xss(75049)", "name": "rcq-filedesc-xss(75049)",
"refsource" : "XF", "refsource": "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75049" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75049"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2012-2732", "data_version": "4.0",
"STATE" : "REJECT" "CVE_data_meta": {
"ID": "CVE-2012-2732",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
}, },
"data_format" : "MITRE", "description": {
"data_type" : "CVE", "description_data": [
"data_version" : "4.0",
"description" : {
"description_data" : [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-2021. Reason: This candidate is a duplicate of CVE-2010-2021. Notes: All CVE users should reference CVE-2010-2021 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-2021. Reason: This candidate is a duplicate of CVE-2010-2021. Notes: All CVE users should reference CVE-2010-2021 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2012-6498", "ID": "CVE-2012-6498",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Unrestricted file upload vulnerability in index.php in Atomymaxsite 2.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file, as exploited in the wild in October 2012." "value": "Unrestricted file upload vulnerability in index.php in Atomymaxsite 2.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file, as exploited in the wild in October 2012."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "http://thaicert.or.th/alerts/admin/2012/al2012ad025.html", "name": "http://www.youtube.com/watch?v=CfvTCSS3LGY",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://thaicert.or.th/alerts/admin/2012/al2012ad025.html" "url": "http://www.youtube.com/watch?v=CfvTCSS3LGY"
}, },
{ {
"name" : "http://www.youtube.com/watch?v=CfvTCSS3LGY", "name": "http://thaicert.or.th/alerts/admin/2012/al2012ad025.html",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.youtube.com/watch?v=CfvTCSS3LGY" "url": "http://thaicert.or.th/alerts/admin/2012/al2012ad025.html"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "security_alert@emc.com",
"ID" : "CVE-2015-0532", "ID": "CVE-2015-0532",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "EMC RSA Identity Management and Governance (IMG) 6.9 before P04 and 6.9.1 before P01 does not properly restrict password resets, which allows remote attackers to obtain access via crafted use of the reset process for an arbitrary valid account name, as demonstrated by a privileged account." "value": "EMC RSA Identity Management and Governance (IMG) 6.9 before P04 and 6.9.1 before P01 does not properly restrict password resets, which allows remote attackers to obtain access via crafted use of the reset process for an arbitrary valid account name, as demonstrated by a privileged account."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20150429 ESA-2015-078: RSA Identity Management and Governance (IMG) Insecure Password Reset Vulnerability", "name": "20150429 ESA-2015-078: RSA Identity Management and Governance (IMG) Insecure Password Reset Vulnerability",
"refsource" : "BUGTRAQ", "refsource": "BUGTRAQ",
"url" : "http://seclists.org/bugtraq/2015/Apr/204" "url": "http://seclists.org/bugtraq/2015/Apr/204"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html", "name": "1032218",
"refsource" : "MISC", "refsource": "SECTRACK",
"url" : "http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html" "url": "http://www.securitytracker.com/id/1032218"
}, },
{ {
"name" : "1032218", "name": "http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html",
"refsource" : "SECTRACK", "refsource": "MISC",
"url" : "http://www.securitytracker.com/id/1032218" "url": "http://packetstormsecurity.com/files/131710/RSA-IMG-6.9-6.9.1-Insecure-Password-Reset.html"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-1316", "ID": "CVE-2015-1316",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,81 +1,81 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2015-1783", "ID": "CVE-2015-1783",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The prefix variable in the get_or_define_ns function in Lasso before commit 6d854cef4211cdcdbc7446c978f23ab859847cdd allows remote attackers to cause a denial of service (uninitialized memory access and application crash) via unspecified vectors." "value": "The prefix variable in the get_or_define_ns function in Lasso before commit 6d854cef4211cdcdbc7446c978f23ab859847cdd allows remote attackers to cause a denial of service (uninitialized memory access and application crash) via unspecified vectors."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://repos.entrouvert.org/lasso.git/commit/lasso/xml?id=6d854cef4211cdcdbc7446c978f23ab859847cdd", "name": "https://repos.entrouvert.org/lasso.git/commit/lasso/xml?id=6d854cef4211cdcdbc7446c978f23ab859847cdd",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://repos.entrouvert.org/lasso.git/commit/lasso/xml?id=6d854cef4211cdcdbc7446c978f23ab859847cdd" "url": "https://repos.entrouvert.org/lasso.git/commit/lasso/xml?id=6d854cef4211cdcdbc7446c978f23ab859847cdd"
}, },
{ {
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1199925", "name": "FEDORA-2015-4807",
"refsource" : "CONFIRM", "refsource": "FEDORA",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1199925" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154355.html"
}, },
{ {
"name" : "FEDORA-2015-4807", "name": "FEDORA-2015-4821",
"refsource" : "FEDORA", "refsource": "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154355.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155382.html"
}, },
{ {
"name" : "FEDORA-2015-4821", "name": "FEDORA-2015-4848",
"refsource" : "FEDORA", "refsource": "FEDORA",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155382.html" "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154321.html"
}, },
{ {
"name" : "FEDORA-2015-4848", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1199925",
"refsource" : "FEDORA", "refsource": "CONFIRM",
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154321.html" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199925"
} }
] ]
} }

View File

@ -1,71 +1,71 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-5057", "ID": "CVE-2015-5057",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Cross-site scripting (XSS) vulnerability exists in the Wordpress admin panel when the Broken Link Checker plugin before 1.10.9 is installed." "value": "Cross-site scripting (XSS) vulnerability exists in the Wordpress admin panel when the Broken Link Checker plugin before 1.10.9 is installed."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[oss-security] 20150624 Re: CVE Request for Wordpress-Plugin Broken Link Checker v1.10.8: Persistent XSS in admin panel enabled by modified headers", "name": "https://wordpress.org/plugins/broken-link-checker/#developers",
"refsource" : "MLIST", "refsource": "MISC",
"url" : "http://www.openwall.com/lists/oss-security/2015/06/25/1" "url": "https://wordpress.org/plugins/broken-link-checker/#developers"
}, },
{ {
"name" : "https://wordpress.org/plugins/broken-link-checker/#developers", "name": "[oss-security] 20150624 Re: CVE Request for Wordpress-Plugin Broken Link Checker v1.10.8: Persistent XSS in admin panel enabled by modified headers",
"refsource" : "MISC", "refsource": "MLIST",
"url" : "https://wordpress.org/plugins/broken-link-checker/#developers" "url": "http://www.openwall.com/lists/oss-security/2015/06/25/1"
}, },
{ {
"name" : "75421", "name": "75421",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/75421" "url": "http://www.securityfocus.com/bid/75421"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "secalert@redhat.com",
"ID" : "CVE-2015-5163", "ID": "CVE-2015-5163",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo), when using the V2 API, allows remote authenticated users to read arbitrary files via a crafted backing file for a qcow2 image." "value": "The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo), when using the V2 API, allows remote authenticated users to read arbitrary files via a crafted backing file for a qcow2 image."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "[openstack-announce] 20150813 [OSSA 2015-014] Glance v2 API host file disclosure through qcow2 backing file (CVE-2015-5163)", "name": "RHSA-2015:1639",
"refsource" : "MLIST", "refsource": "REDHAT",
"url" : "http://lists.openstack.org/pipermail/openstack-announce/2015-August/000527.html" "url": "http://rhn.redhat.com/errata/RHSA-2015-1639.html"
}, },
{ {
"name" : "https://bugs.launchpad.net/glance/+bug/1471912", "name": "[openstack-announce] 20150813 [OSSA 2015-014] Glance v2 API host file disclosure through qcow2 backing file (CVE-2015-5163)",
"refsource" : "CONFIRM", "refsource": "MLIST",
"url" : "https://bugs.launchpad.net/glance/+bug/1471912" "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-August/000527.html"
}, },
{ {
"name" : "RHSA-2015:1639", "name": "76346",
"refsource" : "REDHAT", "refsource": "BID",
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1639.html" "url": "http://www.securityfocus.com/bid/76346"
}, },
{ {
"name" : "76346", "name": "https://bugs.launchpad.net/glance/+bug/1471912",
"refsource" : "BID", "refsource": "CONFIRM",
"url" : "http://www.securityfocus.com/bid/76346" "url": "https://bugs.launchpad.net/glance/+bug/1471912"
} }
] ]
} }

View File

@ -1,76 +1,76 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2015-5696", "ID": "CVE-2015-5696",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Dell Netvault Backup before 10.0.5 allows remote attackers to cause a denial of service (crash) via a crafted request." "value": "Dell Netvault Backup before 10.0.5 allows remote attackers to cause a denial of service (crash) via a crafted request."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "20150730 Dell Netvault Backup Remote Denial of Service", "name": "http://packetstormsecurity.com/files/132928/Dell-Netvault-Backup-10.0.1.24-Denial-Of-Service.html",
"refsource" : "BUGTRAQ", "refsource": "MISC",
"url" : "http://www.securityfocus.com/archive/1/536111/100/0/threaded" "url": "http://packetstormsecurity.com/files/132928/Dell-Netvault-Backup-10.0.1.24-Denial-Of-Service.html"
}, },
{ {
"name" : "37739", "name": "1033145",
"refsource" : "EXPLOIT-DB", "refsource": "SECTRACK",
"url" : "https://www.exploit-db.com/exploits/37739/" "url": "http://www.securitytracker.com/id/1033145"
}, },
{ {
"name" : "http://packetstormsecurity.com/files/132928/Dell-Netvault-Backup-10.0.1.24-Denial-Of-Service.html", "name": "20150730 Dell Netvault Backup Remote Denial of Service",
"refsource" : "MISC", "refsource": "BUGTRAQ",
"url" : "http://packetstormsecurity.com/files/132928/Dell-Netvault-Backup-10.0.1.24-Denial-Of-Service.html" "url": "http://www.securityfocus.com/archive/1/536111/100/0/threaded"
}, },
{ {
"name" : "1033145", "name": "37739",
"refsource" : "SECTRACK", "refsource": "EXPLOIT-DB",
"url" : "http://www.securitytracker.com/id/1033145" "url": "https://www.exploit-db.com/exploits/37739/"
} }
] ]
} }

View File

@ -1,75 +1,75 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "larry0@me.com", "ASSIGNER": "larry0@me.com",
"DATE_ASSIGNED" : "2018-08-22", "DATE_ASSIGNED": "2018-08-22",
"ID" : "CVE-2018-1002006", "ID": "CVE-2018-1002006",
"REQUESTER" : "kurt@seifried.org", "REQUESTER": "kurt@seifried.org",
"STATE" : "PUBLIC", "STATE": "PUBLIC",
"UPDATED" : "2017-08-10T14:41Z" "UPDATED": "2017-08-10T14:41Z"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Arigato Autoresponder and Newsletter", "product_name": "Arigato Autoresponder and Newsletter",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_affected" : "<=", "version_affected": "<=",
"version_value" : "2.5.1.8" "version_value": "2.5.1.8"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Kiboko Labs https://calendarscripts.info/" "vendor_name": "Kiboko Labs https://calendarscripts.info/"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "These vulnerabilities require administrative privileges to exploit. There is an XSS vulnerability in integration-contact-form.html.php:14: via POST request variable classes" "value": "These vulnerabilities require administrative privileges to exploit. There is an XSS vulnerability in integration-contact-form.html.php:14: via POST request variable classes"
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Blind SQL injection and multiple reflected XSS vulnerabilities in Wordpress Plugin Arigato Autoresponder and Newsletter v2.5.1.8" "value": "Blind SQL injection and multiple reflected XSS vulnerabilities in Wordpress Plugin Arigato Autoresponder and Newsletter v2.5.1.8"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "45434", "name": "45434",
"refsource" : "EXPLOIT-DB", "refsource": "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/45434/" "url": "https://www.exploit-db.com/exploits/45434/"
}, },
{ {
"name" : "http://www.vapidlabs.com/advisory.php?v=203", "name": "https://wordpress.org/plugins/bft-autoresponder/",
"refsource" : "MISC", "refsource": "MISC",
"url" : "http://www.vapidlabs.com/advisory.php?v=203" "url": "https://wordpress.org/plugins/bft-autoresponder/"
}, },
{ {
"name" : "https://wordpress.org/plugins/bft-autoresponder/", "name": "http://www.vapidlabs.com/advisory.php?v=203",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://wordpress.org/plugins/bft-autoresponder/" "url": "http://www.vapidlabs.com/advisory.php?v=203"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-3486", "ID": "CVE-2018-3486",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-3793", "ID": "CVE-2018-3793",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-3796", "ID": "CVE-2018-3796",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-7169", "ID": "CVE-2018-7169",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation." "value": "An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used \"group blacklisting\" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357", "name": "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357" "url": "https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357"
}, },
{ {
"name" : "GLSA-201805-09", "name": "GLSA-201805-09",
"refsource" : "GENTOO", "refsource": "GENTOO",
"url" : "https://security.gentoo.org/glsa/201805-09" "url": "https://security.gentoo.org/glsa/201805-09"
} }
] ]
} }

View File

@ -1,66 +1,66 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-7263", "ID": "CVE-2018-7263",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "The mad_decoder_run() function in decoder.c in Underbit libmad through 0.15.1b allows remote attackers to cause a denial of service (SIGABRT because of double free or corruption) or possibly have unspecified other impact via a crafted file. NOTE: this may overlap CVE-2017-11552." "value": "The mad_decoder_run() function in decoder.c in Underbit libmad through 0.15.1b allows remote attackers to cause a denial of service (SIGABRT because of double free or corruption) or possibly have unspecified other impact via a crafted file. NOTE: this may overlap CVE-2017-11552."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870608", "name": "https://bugzilla.suse.com/show_bug.cgi?id=1081784",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870608" "url": "https://bugzilla.suse.com/show_bug.cgi?id=1081784"
}, },
{ {
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1081784", "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870608",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1081784" "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870608"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-7622", "ID": "CVE-2018-7622",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-7840", "ID": "CVE-2018-7840",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "Secure@Microsoft.com", "ASSIGNER": "secure@microsoft.com",
"ID" : "CVE-2018-8119", "ID": "CVE-2018-8119",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "C# SDK", "product_name": "C# SDK",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Azure IoT" "version_value": "Azure IoT"
} }
] ]
} }
}, },
{ {
"product_name" : "C SDK", "product_name": "C SDK",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Azure IoT" "version_value": "Azure IoT"
} }
] ]
} }
}, },
{ {
"product_name" : "Java SDK", "product_name": "Java SDK",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "Azure IoT" "version_value": "Azure IoT"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Microsoft" "vendor_name": "Microsoft"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK." "value": "A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka \"Azure IoT SDK Spoofing Vulnerability.\" This affects C# SDK, C SDK, Java SDK."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Information Disclosure" "value": "Information Disclosure"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119",
"refsource" : "CONFIRM", "refsource": "CONFIRM",
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8119"
}, },
{ {
"name" : "104070", "name": "104070",
"refsource" : "BID", "refsource": "BID",
"url" : "http://www.securityfocus.com/bid/104070" "url": "http://www.securityfocus.com/bid/104070"
} }
] ]
} }

View File

@ -1,72 +1,72 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "ics-cert@hq.dhs.gov", "ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC" : "2018-08-31T00:00:00", "DATE_PUBLIC": "2018-08-31T00:00:00",
"ID" : "CVE-2018-8854", "ID": "CVE-2018-8854",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "e-Alert Unit (non-medical device)", "product_name": "e-Alert Unit (non-medical device)",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "R2.1 and prior" "version_value": "R2.1 and prior"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "Philips" "vendor_name": "Philips"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software does not properly restrict the size or amount of resources requested or influenced by an actor, which can be used to consume more resources than intended." "value": "Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software does not properly restrict the size or amount of resources requested or influenced by an actor, which can be used to consume more resources than intended."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION') CWE-400" "value": "UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION') CWE-400"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01", "name": "https://www.usa.philips.com/healthcare/about/customer-support/product-security",
"refsource" : "MISC", "refsource": "CONFIRM",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01" "url": "https://www.usa.philips.com/healthcare/about/customer-support/product-security"
}, },
{ {
"name" : "https://www.usa.philips.com/healthcare/about/customer-support/product-security", "name": "105194",
"refsource" : "CONFIRM", "refsource": "BID",
"url" : "https://www.usa.philips.com/healthcare/about/customer-support/product-security" "url": "http://www.securityfocus.com/bid/105194"
}, },
{ {
"name" : "105194", "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01",
"refsource" : "BID", "refsource": "MISC",
"url" : "http://www.securityfocus.com/bid/105194" "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-242-01"
} }
] ]
} }

View File

@ -1,17 +1,17 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-8983", "ID": "CVE-2018-8983",
"STATE" : "RESERVED" "STATE": "RESERVED"
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
} }
] ]
} }

View File

@ -1,61 +1,61 @@
{ {
"CVE_data_meta" : { "CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID" : "CVE-2018-8997", "ID": "CVE-2018-8997",
"STATE" : "PUBLIC" "STATE": "PUBLIC"
}, },
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "n/a", "product_name": "n/a",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "n/a" "version_value": "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name" : "n/a" "vendor_name": "n/a"
} }
] ]
} }
}, },
"data_format" : "MITRE", "data_format": "MITRE",
"data_type" : "CVE", "data_type": "CVE",
"data_version" : "4.0", "data_version": "4.0",
"description" : { "description": {
"description_data" : [ "description_data": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002004." "value": "In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002004."
} }
] ]
}, },
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{ {
"description" : [ "description": [
{ {
"lang" : "eng", "lang": "eng",
"value" : "n/a" "value": "n/a"
} }
] ]
} }
] ]
}, },
"references" : { "references": {
"reference_data" : [ "reference_data": [
{ {
"name" : "https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002004", "name": "https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002004",
"refsource" : "MISC", "refsource": "MISC",
"url" : "https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002004" "url": "https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002004"
} }
] ]
} }