- Synchronized data.

This commit is contained in:
CVE Team 2017-12-22 09:04:51 -05:00
parent e6587ea88b
commit e646f34519
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
8 changed files with 432 additions and 425 deletions

View File

@ -34,7 +34,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RSTP request, (2) a DESCRIBE RSTP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments."
"value" : "Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments."
}
]
},

View File

@ -1,62 +1,63 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-10868",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Kazuho Oku",
"product": {
"product_data": [
{
"product_name": "H2O",
"version": {
"version_data": [
{
"version_value": "version 2.2.2 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Denial-of-service (DoS)"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://github.com/h2o/h2o/issues/1459"
},
{
"url":"https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header."
}
]
}
}
"CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10868",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "H2O",
"version" : {
"version_data" : [
{
"version_value" : "version 2.2.2 and earlier"
}
]
}
}
]
},
"vendor_name" : "Kazuho Oku"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial-of-service (DoS)"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://github.com/h2o/h2o/issues/1459"
},
{
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
}
}

View File

@ -1,62 +1,63 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-10869",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Kazuho Oku",
"product": {
"product_data": [
{
"product_name": "H2O",
"version": {
"version_data": [
{
"version_value": "version 2.2.2 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Buffer Overflow"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://github.com/h2o/h2o/issues/1460"
},
{
"url":"https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Buffer overflow in H2O version 2.2.2 and earlier allows remote attackers to cause a denial-of-service in the server via unspecified vectors."
}
]
}
}
"CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10869",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "H2O",
"version" : {
"version_data" : [
{
"version_value" : "version 2.2.2 and earlier"
}
]
}
}
]
},
"vendor_name" : "Kazuho Oku"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Buffer overflow in H2O version 2.2.2 and earlier allows remote attackers to cause a denial-of-service in the server via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Buffer Overflow"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://github.com/h2o/h2o/issues/1460"
},
{
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
}
}

View File

@ -1,62 +1,63 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-10872",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Kazuho Oku",
"product": {
"product_data": [
{
"product_name": "H2O",
"version": {
"version_data": [
{
"version_value": "version 2.2.3 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Denial-of-service (DoS)"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://github.com/h2o/h2o/issues/1543"
},
{
"url":"https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via unspecified vectors."
}
]
}
}
"CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10872",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "H2O",
"version" : {
"version_data" : [
{
"version_value" : "version 2.2.3 and earlier"
}
]
}
}
]
},
"vendor_name" : "Kazuho Oku"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial-of-service (DoS)"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://github.com/h2o/h2o/issues/1543"
},
{
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
}
}

View File

@ -1,65 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-10907",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SpiQe Software",
"product": {
"product_data": [
{
"product_name": "OneThird CMS",
"version": {
"version_data": [
{
"version_value": "Show Off v1.85 and earlier"
},
{
"version_value": "Show Off v1.85 en and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Directory traversal"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://onethird.net/en/p1307.html"
},
{
"url":"https://jvn.jp/en/jp/JVN93333702/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors."
}
]
}
}
"CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10907",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "OneThird CMS",
"version" : {
"version_data" : [
{
"version_value" : "Show Off v1.85 and earlier"
},
{
"version_value" : "Show Off v1.85 en and earlier"
}
]
}
}
]
},
"vendor_name" : "SpiQe Software"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Directory traversal"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://onethird.net/en/p1307.html"
},
{
"url" : "https://jvn.jp/en/jp/JVN93333702/index.html"
}
]
}
}

View File

@ -1,62 +1,63 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-10908",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Kazuho Oku",
"product": {
"product_data": [
{
"product_name": "H2O",
"version": {
"version_data": [
{
"version_value": "version 2.2.3 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Denial-of-service (DoS)"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://github.com/h2o/h2o/issues/1544"
},
{
"url":"https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header."
}
]
}
}
"CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10908",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "H2O",
"version" : {
"version_data" : [
{
"version_value" : "version 2.2.3 and earlier"
}
]
}
}
]
},
"vendor_name" : "Kazuho Oku"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial-of-service (DoS)"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://github.com/h2o/h2o/issues/1544"
},
{
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
}
]
}
}

View File

@ -1,59 +1,60 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-10909",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Sony Video & Sound Products Inc.",
"product": {
"product_data": [
{
"product_name": "Music Center for PC",
"version": {
"version_data": [
{
"version_value": "version 1.0.01 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Untrusted search path vulnerability"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://jvn.jp/en/jp/JVN60695371/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
}
}
"CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10909",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Music Center for PC",
"version" : {
"version_data" : [
{
"version_value" : "version 1.0.01 and earlier"
}
]
}
}
]
},
"vendor_name" : "Sony Video & Sound Products Inc."
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Untrusted search path vulnerability"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://jvn.jp/en/jp/JVN60695371/index.html"
}
]
}
}

View File

@ -1,59 +1,60 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-17010",
"ASSIGNER": "vultures@jpcert.or.jp"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Sony Interactive Entertainment Inc.",
"product": {
"product_data": [
{
"product_name": "Content Manager Assistant for PlayStation",
"version": {
"version_data": [
{
"version_value": "version 3.55.7671.0901 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Untrusted search path vulnerability"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://jvn.jp/en/jp/JVN95423049/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
}
}
"CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-17010",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Content Manager Assistant for PlayStation",
"version" : {
"version_data" : [
{
"version_value" : "version 3.55.7671.0901 and earlier"
}
]
}
}
]
},
"vendor_name" : "Sony Interactive Entertainment Inc."
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Untrusted search path vulnerability"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://jvn.jp/en/jp/JVN95423049/index.html"
}
]
}
}