- Synchronized data.

This commit is contained in:
CVE Team 2017-12-22 09:04:51 -05:00
parent e6587ea88b
commit e646f34519
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
8 changed files with 432 additions and 425 deletions

View File

@ -34,7 +34,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RSTP request, (2) a DESCRIBE RSTP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments." "value" : "Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments."
} }
] ]
}, },

View File

@ -1,16 +1,13 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10868", "ID" : "CVE-2017-10868",
"ASSIGNER": "vultures@jpcert.or.jp" "STATE" : "PUBLIC"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Kazuho Oku",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -24,11 +21,23 @@
} }
} }
] ]
} },
"vendor_name" : "Kazuho Oku"
} }
] ]
} }
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header."
}
]
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -50,13 +59,5 @@
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html" "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
} }
] ]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header."
}
]
} }
} }

View File

@ -1,16 +1,13 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10869", "ID" : "CVE-2017-10869",
"ASSIGNER": "vultures@jpcert.or.jp" "STATE" : "PUBLIC"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Kazuho Oku",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -24,11 +21,23 @@
} }
} }
] ]
} },
"vendor_name" : "Kazuho Oku"
} }
] ]
} }
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Buffer overflow in H2O version 2.2.2 and earlier allows remote attackers to cause a denial-of-service in the server via unspecified vectors."
}
]
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -50,13 +59,5 @@
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html" "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
} }
] ]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Buffer overflow in H2O version 2.2.2 and earlier allows remote attackers to cause a denial-of-service in the server via unspecified vectors."
}
]
} }
} }

View File

@ -1,16 +1,13 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10872", "ID" : "CVE-2017-10872",
"ASSIGNER": "vultures@jpcert.or.jp" "STATE" : "PUBLIC"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Kazuho Oku",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -24,11 +21,23 @@
} }
} }
] ]
} },
"vendor_name" : "Kazuho Oku"
} }
] ]
} }
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via unspecified vectors."
}
]
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -50,13 +59,5 @@
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html" "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
} }
] ]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via unspecified vectors."
}
]
} }
} }

View File

@ -1,16 +1,13 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10907", "ID" : "CVE-2017-10907",
"ASSIGNER": "vultures@jpcert.or.jp" "STATE" : "PUBLIC"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "SpiQe Software",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -27,11 +24,23 @@
} }
} }
] ]
} },
"vendor_name" : "SpiQe Software"
} }
] ]
} }
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors."
}
]
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -53,13 +62,5 @@
"url" : "https://jvn.jp/en/jp/JVN93333702/index.html" "url" : "https://jvn.jp/en/jp/JVN93333702/index.html"
} }
] ]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors."
}
]
} }
} }

View File

@ -1,16 +1,13 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10908", "ID" : "CVE-2017-10908",
"ASSIGNER": "vultures@jpcert.or.jp" "STATE" : "PUBLIC"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Kazuho Oku",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -24,11 +21,23 @@
} }
} }
] ]
} },
"vendor_name" : "Kazuho Oku"
} }
] ]
} }
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header."
}
]
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -50,13 +59,5 @@
"url" : "https://jvn.jp/en/jp/JVN84182676/index.html" "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
} }
] ]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header."
}
]
} }
} }

View File

@ -1,16 +1,13 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-10909", "ID" : "CVE-2017-10909",
"ASSIGNER": "vultures@jpcert.or.jp" "STATE" : "PUBLIC"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Sony Video & Sound Products Inc.",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -24,11 +21,23 @@
} }
} }
] ]
} },
"vendor_name" : "Sony Video & Sound Products Inc."
} }
] ]
} }
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -47,13 +56,5 @@
"url" : "https://jvn.jp/en/jp/JVN60695371/index.html" "url" : "https://jvn.jp/en/jp/JVN60695371/index.html"
} }
] ]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
} }
} }

View File

@ -1,16 +1,13 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "vultures@jpcert.or.jp",
"ID" : "CVE-2017-17010", "ID" : "CVE-2017-17010",
"ASSIGNER": "vultures@jpcert.or.jp" "STATE" : "PUBLIC"
}, },
"affects" : { "affects" : {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
{ {
"vendor_name": "Sony Interactive Entertainment Inc.",
"product" : { "product" : {
"product_data" : [ "product_data" : [
{ {
@ -24,11 +21,23 @@
} }
} }
] ]
} },
"vendor_name" : "Sony Interactive Entertainment Inc."
} }
] ]
} }
}, },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
},
"problemtype" : { "problemtype" : {
"problemtype_data" : [ "problemtype_data" : [
{ {
@ -47,13 +56,5 @@
"url" : "https://jvn.jp/en/jp/JVN95423049/index.html" "url" : "https://jvn.jp/en/jp/JVN95423049/index.html"
} }
] ]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
}
]
} }
} }