2018-11-19 03:09:48 -05:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2018-19360" ,
2019-01-02 13:04:24 -05:00
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
2018-11-19 03:09:48 -05:00
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2019-01-02 13:04:24 -05:00
"value" : "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
2019-03-05 06:06:03 -05:00
{
"name" : "[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update" ,
"refsource" : "MLIST" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html"
} ,
2019-01-02 13:04:24 -05:00
{
"name" : "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b"
} ,
{
"name" : "https://github.com/FasterXML/jackson-databind/issues/2186" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/FasterXML/jackson-databind/issues/2186"
} ,
{
"name" : "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8"
} ,
{
"name" : "https://issues.apache.org/jira/browse/TINKERPOP-2121" ,
"refsource" : "CONFIRM" ,
"url" : "https://issues.apache.org/jira/browse/TINKERPOP-2121"
2018-11-19 03:09:48 -05:00
}
]
}
}