forked from CVEProject/cvelist
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
14 changed files
with
395 additions
and
27 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,17 +1,66 @@ | ||
{ | ||
"data_type": "CVE", | ||
"data_format": "MITRE", | ||
"data_version": "4.0", | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2012-1102", | ||
"STATE": "RESERVED" | ||
"ASSIGNER": "[email protected]", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"vendor_name": "n/a", | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "perl-xml-atom", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "perl-xml-atom 0.39" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "CWE-611" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes", | ||
"url": "https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes" | ||
}, | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://seclists.org/oss-sec/2012/q1/549", | ||
"url": "https://seclists.org/oss-sec/2012/q1/549" | ||
} | ||
] | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
"value": "It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used." | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,17 +1,76 @@ | ||
{ | ||
"data_type": "CVE", | ||
"data_format": "MITRE", | ||
"data_version": "4.0", | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2012-2666", | ||
"STATE": "RESERVED" | ||
"ASSIGNER": "[email protected]", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"vendor_name": "n/a", | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "go/golang", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "go/golang 1.0.2" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "CWE-377" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666", | ||
"url": "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2012-2666" | ||
}, | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://bugzilla.suse.com/show_bug.cgi?id=765455", | ||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=765455" | ||
}, | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd", | ||
"url": "https://github.com/golang/go/commit/8ac275bb01588a8c0e6c0fe2de7fd11f08feccdd" | ||
}, | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://codereview.appspot.com/5992078", | ||
"url": "https://codereview.appspot.com/5992078" | ||
} | ||
] | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
"value": "golang/go in 1.0.2 fixes all.bash on shared machines. dotest() in src/pkg/debug/gosym/pclntab_test.go creates a temporary file with predicable name and executes it as shell script." | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -102,6 +102,11 @@ | |
"refsource": "FEDORA", | ||
"name": "FEDORA-2021-181f29c392", | ||
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/A73QJ4HPUMU26I6EULG6SCK67TUEXZYR/" | ||
}, | ||
{ | ||
"refsource": "MLIST", | ||
"name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update", | ||
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html" | ||
} | ||
] | ||
}, | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,14 +4,58 @@ | |
"data_version": "4.0", | ||
"CVE_data_meta": { | ||
"ID": "CVE-2021-32972", | ||
"ASSIGNER": "[email protected]", | ||
"STATE": "RESERVED" | ||
"ASSIGNER": "[email protected]", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"vendor_name": "n/a", | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "Panasonic FPWIN Pro", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "All Versions 7.5.1.1 and prior" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-03", | ||
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-180-03" | ||
} | ||
] | ||
}, | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
"value": "Panasonic FPWIN Pro, all Versions 7.5.1.1 and prior, allows an attacker to craft a project file specifying a URI that causes the XML parser to access the URI and embed the contents, which may allow the attacker to disclose information that is accessible in the context of the user executing software." | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,14 +4,58 @@ | |
"data_version": "4.0", | ||
"CVE_data_meta": { | ||
"ID": "CVE-2021-3570", | ||
"ASSIGNER": "[email protected]", | ||
"STATE": "RESERVED" | ||
"ASSIGNER": "[email protected]", | ||
"STATE": "PUBLIC" | ||
}, | ||
"affects": { | ||
"vendor": { | ||
"vendor_data": [ | ||
{ | ||
"vendor_name": "n/a", | ||
"product": { | ||
"product_data": [ | ||
{ | ||
"product_name": "linuxptp", | ||
"version": { | ||
"version_data": [ | ||
{ | ||
"version_value": "linuxptp 3.1.1, linuxptp 2.0.1, linuxptp 1.9.3, linuxptp 1.8.1, linuxptp 1.7.1, linuxptp 1.6.1, linuxptp 1.5.1" | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "eng", | ||
"value": "CWE-119" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"refsource": "MISC", | ||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1966240", | ||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966240" | ||
} | ||
] | ||
}, | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "eng", | ||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." | ||
"value": "A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1." | ||
} | ||
] | ||
} | ||
|
Oops, something went wrong.