- Synchronized data.

This commit is contained in:
CVE Team 2017-12-22 09:04:51 -05:00
parent e6587ea88b
commit e646f34519
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
8 changed files with 432 additions and 425 deletions

View File

@ -34,7 +34,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RSTP request, (2) a DESCRIBE RSTP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments." "value" : "Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments."
} }
] ]
}, },

View File

@ -1,62 +1,63 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "vultures@jpcert.or.jp",
"data_version": "4.0", "ID" : "CVE-2017-10868",
"CVE_data_meta": { "STATE" : "PUBLIC"
"ID": "CVE-2017-10868", },
"ASSIGNER": "vultures@jpcert.or.jp" "affects" : {
}, "vendor" : {
"affects": { "vendor_data" : [
"vendor": { {
"vendor_data": [ "product" : {
{ "product_data" : [
"vendor_name": "Kazuho Oku", {
"product": { "product_name" : "H2O",
"product_data": [ "version" : {
{ "version_data" : [
"product_name": "H2O", {
"version": { "version_value" : "version 2.2.2 and earlier"
"version_data": [ }
{ ]
"version_value": "version 2.2.2 and earlier" }
} }
] ]
} },
} "vendor_name" : "Kazuho Oku"
] }
} ]
} }
] },
} "data_format" : "MITRE",
}, "data_type" : "CVE",
"problemtype":{ "data_version" : "4.0",
"problemtype_data":[ "description" : {
{ "description_data" : [
"description":[ {
{ "lang" : "eng",
"lang": "eng", "value" : "H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header."
"value":"Denial-of-service (DoS)" }
} ]
] },
} "problemtype" : {
] "problemtype_data" : [
}, {
"references":{ "description" : [
"reference_data":[ {
{ "lang" : "eng",
"url":"https://github.com/h2o/h2o/issues/1459" "value" : "Denial-of-service (DoS)"
}, }
{ ]
"url":"https://jvn.jp/en/jp/JVN84182676/index.html" }
} ]
] },
}, "references" : {
"description":{ "reference_data" : [
"description_data":[ {
{ "url" : "https://github.com/h2o/h2o/issues/1459"
"lang": "eng", },
"value":"H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header." {
} "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
] }
} ]
} }
}

View File

@ -1,62 +1,63 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "vultures@jpcert.or.jp",
"data_version": "4.0", "ID" : "CVE-2017-10869",
"CVE_data_meta": { "STATE" : "PUBLIC"
"ID": "CVE-2017-10869", },
"ASSIGNER": "vultures@jpcert.or.jp" "affects" : {
}, "vendor" : {
"affects": { "vendor_data" : [
"vendor": { {
"vendor_data": [ "product" : {
{ "product_data" : [
"vendor_name": "Kazuho Oku", {
"product": { "product_name" : "H2O",
"product_data": [ "version" : {
{ "version_data" : [
"product_name": "H2O", {
"version": { "version_value" : "version 2.2.2 and earlier"
"version_data": [ }
{ ]
"version_value": "version 2.2.2 and earlier" }
} }
] ]
} },
} "vendor_name" : "Kazuho Oku"
] }
} ]
} }
] },
} "data_format" : "MITRE",
}, "data_type" : "CVE",
"problemtype":{ "data_version" : "4.0",
"problemtype_data":[ "description" : {
{ "description_data" : [
"description":[ {
{ "lang" : "eng",
"lang": "eng", "value" : "Buffer overflow in H2O version 2.2.2 and earlier allows remote attackers to cause a denial-of-service in the server via unspecified vectors."
"value":"Buffer Overflow" }
} ]
] },
} "problemtype" : {
] "problemtype_data" : [
}, {
"references":{ "description" : [
"reference_data":[ {
{ "lang" : "eng",
"url":"https://github.com/h2o/h2o/issues/1460" "value" : "Buffer Overflow"
}, }
{ ]
"url":"https://jvn.jp/en/jp/JVN84182676/index.html" }
} ]
] },
}, "references" : {
"description":{ "reference_data" : [
"description_data":[ {
{ "url" : "https://github.com/h2o/h2o/issues/1460"
"lang": "eng", },
"value":"Buffer overflow in H2O version 2.2.2 and earlier allows remote attackers to cause a denial-of-service in the server via unspecified vectors." {
} "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
] }
} ]
} }
}

View File

@ -1,62 +1,63 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "vultures@jpcert.or.jp",
"data_version": "4.0", "ID" : "CVE-2017-10872",
"CVE_data_meta": { "STATE" : "PUBLIC"
"ID": "CVE-2017-10872", },
"ASSIGNER": "vultures@jpcert.or.jp" "affects" : {
}, "vendor" : {
"affects": { "vendor_data" : [
"vendor": { {
"vendor_data": [ "product" : {
{ "product_data" : [
"vendor_name": "Kazuho Oku", {
"product": { "product_name" : "H2O",
"product_data": [ "version" : {
{ "version_data" : [
"product_name": "H2O", {
"version": { "version_value" : "version 2.2.3 and earlier"
"version_data": [ }
{ ]
"version_value": "version 2.2.3 and earlier" }
} }
] ]
} },
} "vendor_name" : "Kazuho Oku"
] }
} ]
} }
] },
} "data_format" : "MITRE",
}, "data_type" : "CVE",
"problemtype":{ "data_version" : "4.0",
"problemtype_data":[ "description" : {
{ "description_data" : [
"description":[ {
{ "lang" : "eng",
"lang": "eng", "value" : "H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via unspecified vectors."
"value":"Denial-of-service (DoS)" }
} ]
] },
} "problemtype" : {
] "problemtype_data" : [
}, {
"references":{ "description" : [
"reference_data":[ {
{ "lang" : "eng",
"url":"https://github.com/h2o/h2o/issues/1543" "value" : "Denial-of-service (DoS)"
}, }
{ ]
"url":"https://jvn.jp/en/jp/JVN84182676/index.html" }
} ]
] },
}, "references" : {
"description":{ "reference_data" : [
"description_data":[ {
{ "url" : "https://github.com/h2o/h2o/issues/1543"
"lang": "eng", },
"value":"H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via unspecified vectors." {
} "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
] }
} ]
} }
}

View File

@ -1,65 +1,66 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "vultures@jpcert.or.jp",
"data_version": "4.0", "ID" : "CVE-2017-10907",
"CVE_data_meta": { "STATE" : "PUBLIC"
"ID": "CVE-2017-10907", },
"ASSIGNER": "vultures@jpcert.or.jp" "affects" : {
}, "vendor" : {
"affects": { "vendor_data" : [
"vendor": { {
"vendor_data": [ "product" : {
{ "product_data" : [
"vendor_name": "SpiQe Software", {
"product": { "product_name" : "OneThird CMS",
"product_data": [ "version" : {
{ "version_data" : [
"product_name": "OneThird CMS", {
"version": { "version_value" : "Show Off v1.85 and earlier"
"version_data": [ },
{ {
"version_value": "Show Off v1.85 and earlier" "version_value" : "Show Off v1.85 en and earlier"
}, }
{ ]
"version_value": "Show Off v1.85 en and earlier" }
} }
] ]
} },
} "vendor_name" : "SpiQe Software"
] }
} ]
} }
] },
} "data_format" : "MITRE",
}, "data_type" : "CVE",
"problemtype":{ "data_version" : "4.0",
"problemtype_data":[ "description" : {
{ "description_data" : [
"description":[ {
{ "lang" : "eng",
"lang": "eng", "value" : "Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors."
"value":"Directory traversal" }
} ]
] },
} "problemtype" : {
] "problemtype_data" : [
}, {
"references":{ "description" : [
"reference_data":[ {
{ "lang" : "eng",
"url":"https://onethird.net/en/p1307.html" "value" : "Directory traversal"
}, }
{ ]
"url":"https://jvn.jp/en/jp/JVN93333702/index.html" }
} ]
] },
}, "references" : {
"description":{ "reference_data" : [
"description_data":[ {
{ "url" : "https://onethird.net/en/p1307.html"
"lang": "eng", },
"value":"Directory traversal vulnerability in OneThird CMS Show Off v1.85 and earlier. Show Off v1.85 en and earlier allows an attacker to read arbitrary files via unspecified vectors." {
} "url" : "https://jvn.jp/en/jp/JVN93333702/index.html"
] }
} ]
} }
}

View File

@ -1,62 +1,63 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "vultures@jpcert.or.jp",
"data_version": "4.0", "ID" : "CVE-2017-10908",
"CVE_data_meta": { "STATE" : "PUBLIC"
"ID": "CVE-2017-10908", },
"ASSIGNER": "vultures@jpcert.or.jp" "affects" : {
}, "vendor" : {
"affects": { "vendor_data" : [
"vendor": { {
"vendor_data": [ "product" : {
{ "product_data" : [
"vendor_name": "Kazuho Oku", {
"product": { "product_name" : "H2O",
"product_data": [ "version" : {
{ "version_data" : [
"product_name": "H2O", {
"version": { "version_value" : "version 2.2.3 and earlier"
"version_data": [ }
{ ]
"version_value": "version 2.2.3 and earlier" }
} }
] ]
} },
} "vendor_name" : "Kazuho Oku"
] }
} ]
} }
] },
} "data_format" : "MITRE",
}, "data_type" : "CVE",
"problemtype":{ "data_version" : "4.0",
"problemtype_data":[ "description" : {
{ "description_data" : [
"description":[ {
{ "lang" : "eng",
"lang": "eng", "value" : "H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header."
"value":"Denial-of-service (DoS)" }
} ]
] },
} "problemtype" : {
] "problemtype_data" : [
}, {
"references":{ "description" : [
"reference_data":[ {
{ "lang" : "eng",
"url":"https://github.com/h2o/h2o/issues/1544" "value" : "Denial-of-service (DoS)"
}, }
{ ]
"url":"https://jvn.jp/en/jp/JVN84182676/index.html" }
} ]
] },
}, "references" : {
"description":{ "reference_data" : [
"description_data":[ {
{ "url" : "https://github.com/h2o/h2o/issues/1544"
"lang": "eng", },
"value":"H2O version 2.2.3 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/2 header." {
} "url" : "https://jvn.jp/en/jp/JVN84182676/index.html"
] }
} ]
} }
}

View File

@ -1,59 +1,60 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "vultures@jpcert.or.jp",
"data_version": "4.0", "ID" : "CVE-2017-10909",
"CVE_data_meta": { "STATE" : "PUBLIC"
"ID": "CVE-2017-10909", },
"ASSIGNER": "vultures@jpcert.or.jp" "affects" : {
}, "vendor" : {
"affects": { "vendor_data" : [
"vendor": { {
"vendor_data": [ "product" : {
{ "product_data" : [
"vendor_name": "Sony Video & Sound Products Inc.", {
"product": { "product_name" : "Music Center for PC",
"product_data": [ "version" : {
{ "version_data" : [
"product_name": "Music Center for PC", {
"version": { "version_value" : "version 1.0.01 and earlier"
"version_data": [ }
{ ]
"version_value": "version 1.0.01 and earlier" }
} }
] ]
} },
} "vendor_name" : "Sony Video & Sound Products Inc."
] }
} ]
} }
] },
} "data_format" : "MITRE",
}, "data_type" : "CVE",
"problemtype":{ "data_version" : "4.0",
"problemtype_data":[ "description" : {
{ "description_data" : [
"description":[ {
{ "lang" : "eng",
"lang": "eng", "value" : "Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
"value":"Untrusted search path vulnerability" }
} ]
] },
} "problemtype" : {
] "problemtype_data" : [
}, {
"references":{ "description" : [
"reference_data":[ {
{ "lang" : "eng",
"url":"https://jvn.jp/en/jp/JVN60695371/index.html" "value" : "Untrusted search path vulnerability"
} }
] ]
}, }
"description":{ ]
"description_data":[ },
{ "references" : {
"lang": "eng", "reference_data" : [
"value":"Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." {
} "url" : "https://jvn.jp/en/jp/JVN60695371/index.html"
] }
} ]
} }
}

View File

@ -1,59 +1,60 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "vultures@jpcert.or.jp",
"data_version": "4.0", "ID" : "CVE-2017-17010",
"CVE_data_meta": { "STATE" : "PUBLIC"
"ID": "CVE-2017-17010", },
"ASSIGNER": "vultures@jpcert.or.jp" "affects" : {
}, "vendor" : {
"affects": { "vendor_data" : [
"vendor": { {
"vendor_data": [ "product" : {
{ "product_data" : [
"vendor_name": "Sony Interactive Entertainment Inc.", {
"product": { "product_name" : "Content Manager Assistant for PlayStation",
"product_data": [ "version" : {
{ "version_data" : [
"product_name": "Content Manager Assistant for PlayStation", {
"version": { "version_value" : "version 3.55.7671.0901 and earlier"
"version_data": [ }
{ ]
"version_value": "version 3.55.7671.0901 and earlier" }
} }
] ]
} },
} "vendor_name" : "Sony Interactive Entertainment Inc."
] }
} ]
} }
] },
} "data_format" : "MITRE",
}, "data_type" : "CVE",
"problemtype":{ "data_version" : "4.0",
"problemtype_data":[ "description" : {
{ "description_data" : [
"description":[ {
{ "lang" : "eng",
"lang": "eng", "value" : "Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory."
"value":"Untrusted search path vulnerability" }
} ]
] },
} "problemtype" : {
] "problemtype_data" : [
}, {
"references":{ "description" : [
"reference_data":[ {
{ "lang" : "eng",
"url":"https://jvn.jp/en/jp/JVN95423049/index.html" "value" : "Untrusted search path vulnerability"
} }
] ]
}, }
"description":{ ]
"description_data":[ },
{ "references" : {
"lang": "eng", "reference_data" : [
"value":"Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." {
} "url" : "https://jvn.jp/en/jp/JVN95423049/index.html"
] }
} ]
} }
}