cvelist/2018/1xxx/CVE-2018-1320.json

182 lines
9.9 KiB
JSON
Raw Normal View History

2017-12-07 15:03:50 -05:00
{
2020-04-16 19:02:24 +00:00
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2018-1320",
"STATE": "PUBLIC"
2019-03-18 00:36:45 +00:00
},
2020-04-16 19:02:24 +00:00
"affects": {
"vendor": {
"vendor_data": [
2019-03-18 00:36:45 +00:00
{
2020-04-16 19:02:24 +00:00
"product": {
"product_data": [
2019-03-18 00:36:45 +00:00
{
2020-04-16 19:02:24 +00:00
"product_name": "Apache Thrift",
"version": {
"version_data": [
2019-03-18 00:36:45 +00:00
{
2020-04-16 19:02:24 +00:00
"version_value": "Apache Thrift 0.5.0 to 0.11.0"
2019-03-18 00:36:45 +00:00
}
]
}
}
]
},
2020-04-16 19:02:24 +00:00
"vendor_name": "Apache Software Foundation"
2019-03-18 00:36:45 +00:00
}
]
}
},
2020-04-16 19:02:24 +00:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete."
}
2019-03-18 00:36:45 +00:00
]
},
2020-04-16 19:02:24 +00:00
"problemtype": {
"problemtype_data": [
2019-03-18 00:36:45 +00:00
{
2020-04-16 19:02:24 +00:00
"description": [
2019-03-18 00:36:45 +00:00
{
2020-04-16 19:02:24 +00:00
"lang": "eng",
"value": "Improper Authentication"
2019-03-18 00:36:45 +00:00
}
]
}
]
},
2020-04-16 19:02:24 +00:00
"references": {
"reference_data": [
2019-03-18 00:36:45 +00:00
{
2020-04-16 19:02:24 +00:00
"name": "https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E"
2019-03-18 00:36:45 +00:00
},
{
2020-04-16 19:02:24 +00:00
"name": "106551",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106551"
2019-03-18 00:36:45 +00:00
},
{
2020-04-16 19:02:24 +00:00
"name": "[debian-lts-announce] 20190206 [SECURITY] [DLA 1662-1] libthrift-java security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html"
2019-03-25 00:00:43 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[infra-devnull] 20190324 [GitHub] [thrift] luciferous opened pull request #1771: THRIFT-4506: fix use of assert for correctness in Java SASL negotiation",
"url": "https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E"
2019-04-11 20:00:41 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K36361684",
"url": "https://support.f5.com/csp/article/K36361684"
2019-07-24 09:00:49 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[storm-dev] 20190724 [CVE-2018-1320] Apache Storm vulnerable Thrift version",
"url": "https://lists.apache.org/thread.html/dbe3a39b48900318ad44494e8721f786901ba4520cd412c7698f534f@%3Cdev.storm.apache.org%3E"
2019-07-24 09:00:49 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[storm-user] 20190724 [CVE-2018-1320] Apache Storm vulnerable Thrift version",
"url": "https://lists.apache.org/thread.html/dfee89880c84874058c6a584d8128468f8d3c2ac25068ded91073adc@%3Cuser.storm.apache.org%3E"
2019-07-24 11:00:48 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[announce] 20190724 [CVE-2018-1320] Apache Storm vulnerable Thrift version",
"url": "https://lists.apache.org/thread.html/e825ff2f4e129c0ecdb6a19030b53c1ccdf810a8980667628d0c6a80@%3Cannounce.apache.org%3E"
2019-07-24 12:00:57 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[oss-security] 20190724 [CVE-2018-1320] Apache Storm vulnerable Thrift version",
"url": "http://www.openwall.com/lists/oss-security/2019/07/24/3"
2019-08-08 13:00:49 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "REDHAT",
"name": "RHSA-2019:2413",
"url": "https://access.redhat.com/errata/RHSA-2019:2413"
Bill Situ <Bill.Situ@Oracle.com> Update 3rd party CVEs for 2019 Oracl CPU October On branch cna/Oracle/CPU2019Oct Changes to be committed: modified: 2015/5xxx/CVE-2015-5180.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0729.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/5xxx/CVE-2016-5425.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/16xxx/CVE-2017-16531.json modified: 2017/17xxx/CVE-2017-17558.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/6xxx/CVE-2017-6056.json modified: 2017/7xxx/CVE-2017-7656.json modified: 2017/7xxx/CVE-2017-7657.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9735.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/1000xxx/CVE-2018-1000007.json modified: 2018/1000xxx/CVE-2018-1000120.json modified: 2018/1000xxx/CVE-2018-1000873.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/11xxx/CVE-2018-11798.json modified: 2018/12xxx/CVE-2018-12384.json modified: 2018/12xxx/CVE-2018-12404.json modified: 2018/12xxx/CVE-2018-12536.json modified: 2018/12xxx/CVE-2018-12538.json modified: 2018/12xxx/CVE-2018-12545.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/16xxx/CVE-2018-16842.json modified: 2018/18xxx/CVE-2018-18065.json modified: 2018/18xxx/CVE-2018-18066.json modified: 2018/19xxx/CVE-2018-19360.json modified: 2018/19xxx/CVE-2018-19361.json modified: 2018/19xxx/CVE-2018-19362.json modified: 2018/1xxx/CVE-2018-1320.json modified: 2018/20xxx/CVE-2018-20685.json modified: 2018/7xxx/CVE-2018-7185.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/8xxx/CVE-2018-8034.json modified: 2018/8xxx/CVE-2018-8037.json modified: 2019/0xxx/CVE-2019-0188.json modified: 2019/0xxx/CVE-2019-0196.json modified: 2019/0xxx/CVE-2019-0197.json modified: 2019/0xxx/CVE-2019-0211.json modified: 2019/0xxx/CVE-2019-0215.json modified: 2019/0xxx/CVE-2019-0217.json modified: 2019/0xxx/CVE-2019-0220.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/0xxx/CVE-2019-0232.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10081.json modified: 2019/10xxx/CVE-2019-10082.json modified: 2019/10xxx/CVE-2019-10092.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10098.json modified: 2019/10xxx/CVE-2019-10241.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/11xxx/CVE-2019-11068.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12814.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14439.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/1xxx/CVE-2019-1543.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1559.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/3xxx/CVE-2019-3855.json modified: 2019/3xxx/CVE-2019-3856.json modified: 2019/3xxx/CVE-2019-3857.json modified: 2019/3xxx/CVE-2019-3858.json modified: 2019/3xxx/CVE-2019-3859.json modified: 2019/3xxx/CVE-2019-3860.json modified: 2019/3xxx/CVE-2019-3861.json modified: 2019/3xxx/CVE-2019-3862.json modified: 2019/3xxx/CVE-2019-3863.json modified: 2019/5xxx/CVE-2019-5435.json modified: 2019/5xxx/CVE-2019-5436.json modified: 2019/5xxx/CVE-2019-5443.json modified: 2019/6xxx/CVE-2019-6109.json modified: 2019/6xxx/CVE-2019-6111.json modified: 2019/8xxx/CVE-2019-8457.json modified: 2019/9xxx/CVE-2019-9511.json modified: 2019/9xxx/CVE-2019-9517.json modified: 2019/9xxx/CVE-2019-9936.json modified: 2019/9xxx/CVE-2019-9937.json
2019-10-15 13:33:48 -07:00
},
{
2020-04-16 19:02:24 +00:00
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
2019-10-17 22:01:04 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities",
"url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E"
2019-10-21 15:59:19 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
"url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"
2019-11-13 11:01:45 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"
2019-11-13 11:01:45 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[cassandra-commits] 20191113 [jira] [Created] (CASSANDRA-15422) CVE-2018-1320(The libthrift component is vulnerable to Improper Access Control) on Cassendra 3.11.4",
"url": "https://lists.apache.org/thread.html/3d3b6849fcf4cd1e87703b3dde0d57aabeb9ba0193dc0cf3c97f545d@%3Ccommits.cassandra.apache.org%3E"
2019-11-13 11:01:45 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[cassandra-commits] 20191113 [jira] [Created] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/6b07f6f618155c777191b4fad8ade0f0cf4ed4c12a1a746ce903d816@%3Ccommits.cassandra.apache.org%3E"
2019-11-19 10:01:46 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[cassandra-commits] 20191119 [jira] [Updated] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/07c3cd5a2953a4b253eee4437b1397b1603d0f886437e19b657d2c54@%3Ccommits.cassandra.apache.org%3E"
2019-11-19 10:01:46 +00:00
},
{
2020-04-16 19:02:24 +00:00
"refsource": "MLIST",
"name": "[cassandra-commits] 20191119 [jira] [Assigned] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/8be5b16c02567fff61b1284e5df433a4e38617bc7de4804402bf62be@%3Ccommits.cassandra.apache.org%3E"
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2020Apr3rdparty Changes to be committed: modified: 2015/0xxx/CVE-2015-0254.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/3xxx/CVE-2015-3253.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0701.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/10xxx/CVE-2016-10244.json modified: 2016/10xxx/CVE-2016-10251.json modified: 2016/10xxx/CVE-2016-10328.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2381.json modified: 2016/3xxx/CVE-2016-3092.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/4xxx/CVE-2016-4463.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6489.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/13xxx/CVE-2017-13745.json modified: 2017/14xxx/CVE-2017-14232.json modified: 2017/14xxx/CVE-2017-14735.json modified: 2017/15xxx/CVE-2017-15706.json modified: 2017/3xxx/CVE-2017-3160.json modified: 2017/5xxx/CVE-2017-5130.json modified: 2017/5xxx/CVE-2017-5529.json modified: 2017/5xxx/CVE-2017-5533.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5754.json modified: 2017/7xxx/CVE-2017-7857.json modified: 2017/7xxx/CVE-2017-7858.json modified: 2017/7xxx/CVE-2017-7864.json modified: 2017/8xxx/CVE-2017-8105.json modified: 2017/8xxx/CVE-2017-8287.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/0xxx/CVE-2018-0734.json modified: 2018/0xxx/CVE-2018-0737.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/1000xxx/CVE-2018-1000873.json modified: 2018/10xxx/CVE-2018-10237.json modified: 2018/11xxx/CVE-2018-11054.json modified: 2018/11xxx/CVE-2018-11055.json modified: 2018/11xxx/CVE-2018-11056.json modified: 2018/11xxx/CVE-2018-11057.json modified: 2018/11xxx/CVE-2018-11058.json modified: 2018/11xxx/CVE-2018-11307.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/11xxx/CVE-2018-11797.json modified: 2018/12xxx/CVE-2018-12022.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/15xxx/CVE-2018-15769.json modified: 2018/17xxx/CVE-2018-17197.json modified: 2018/18xxx/CVE-2018-18227.json modified: 2018/18xxx/CVE-2018-18311.json modified: 2018/18xxx/CVE-2018-18873.json modified: 2018/19xxx/CVE-2018-19139.json modified: 2018/19xxx/CVE-2018-19360.json modified: 2018/19xxx/CVE-2018-19361.json modified: 2018/19xxx/CVE-2018-19362.json modified: 2018/19xxx/CVE-2018-19539.json modified: 2018/19xxx/CVE-2018-19540.json modified: 2018/19xxx/CVE-2018-19541.json modified: 2018/19xxx/CVE-2018-19542.json modified: 2018/19xxx/CVE-2018-19543.json modified: 2018/19xxx/CVE-2018-19622.json modified: 2018/19xxx/CVE-2018-19623.json modified: 2018/19xxx/CVE-2018-19624.json modified: 2018/19xxx/CVE-2018-19625.json modified: 2018/19xxx/CVE-2018-19626.json modified: 2018/19xxx/CVE-2018-19627.json modified: 2018/19xxx/CVE-2018-19628.json modified: 2018/1xxx/CVE-2018-1165.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1304.json modified: 2018/1xxx/CVE-2018-1305.json modified: 2018/1xxx/CVE-2018-1320.json modified: 2018/1xxx/CVE-2018-1336.json modified: 2018/20xxx/CVE-2018-20346.json modified: 2018/20xxx/CVE-2018-20506.json modified: 2018/20xxx/CVE-2018-20570.json modified: 2018/20xxx/CVE-2018-20584.json modified: 2018/20xxx/CVE-2018-20622.json modified: 2018/20xxx/CVE-2018-20843.json modified: 2018/20xxx/CVE-2018-20852.json modified: 2018/5xxx/CVE-2018-5407.json modified: 2018/5xxx/CVE-2018-5711.json modified: 2018/5xxx/CVE-2018-5712.json modified: 2018/6xxx/CVE-2018-6942.json modified: 2018/8xxx/CVE-2018-8014.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/8xxx/CVE-2018-8034.json modified: 2018/8xxx/CVE-2018-8036.json modified: 2018/8xxx/CVE-2018-8037.json modified: 2018/8xxx/CVE-2018-8039.json modified: 2018/9xxx/CVE-2018-9055.json modified: 2018/9xxx/CVE-2018-9154.json modified: 2018/9xxx/CVE-2018-9252.json modified: 2019/0xxx/CVE-2019-0196.json modified: 2019/0xxx/CVE-2019-0197.json modified: 2019/0xxx/CVE-2019-0199.json modified: 2019/0xxx/CVE-2019-0211.json modified: 2019/0xxx/CVE-2019-0215.json modified: 2019/0xxx/CVE-2019-0217.json modified: 2019/0xxx/CVE-2019-0220.json modified: 2019/0xxx/CVE-2019-0221.json modified: 2019/0xxx/CVE-2019-0222.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/0xxx/CVE-2019-0228.json modified: 2019/0xxx/CVE-2019-0232.json modified: 2019/1010xxx/CVE-2019-1010238.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10081.json modified: 2019/10xxx/CVE-2019-10082.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10088.json modified: 2019/10xxx/CVE-2019-10092.json modified: 2019/10xxx/CVE-2019-10093.json modified: 2019/10xxx/CVE-2019-10094.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10098.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12387.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12406.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12418.json modified: 2019/12xxx/CVE-2019-12419.json modified: 2019/12xxx/CVE-2019-12855.json modified: 2019/13xxx/CVE-2019-13057.json modified: 2019/13xxx/CVE-2019-13565.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14439.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/14xxx/CVE-2019-14821.json modified: 2019/14xxx/CVE-2019-14889.json modified: 2019/15xxx/CVE-2019-15161.json modified: 2019/15xxx/CVE-2019-15162.json modified: 2019/15xxx/CVE-2019-15163.json modified: 2019/15xxx/CVE-2019-15164.json modified: 2019/15xxx/CVE-2019-15165.json modified: 2019/15xxx/CVE-2019-15601.json modified: 2019/15xxx/CVE-2019-15604.json modified: 2019/15xxx/CVE-2019-15605.json modified: 2019/15xxx/CVE-2019-15606.json modified: 2019/15xxx/CVE-2019-15903.json modified: 2019/16xxx/CVE-2019-16056.json modified: 2019/16xxx/CVE-2019-16168.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17563.json modified: 2019/17xxx/CVE-2019-17571.json modified: 2019/18xxx/CVE-2019-18197.json modified: 2019/19xxx/CVE-2019-19242.json modified: 2019/19xxx/CVE-2019-19244.json modified: 2019/19xxx/CVE-2019-19269.json modified: 2019/19xxx/CVE-2019-19317.json modified: 2019/19xxx/CVE-2019-19553.json modified: 2019/19xxx/CVE-2019-19603.json modified: 2019/19xxx/CVE-2019-19645.json modified: 2019/19xxx/CVE-2019-19646.json modified: 2019/19xxx/CVE-2019-19880.json modified: 2019/19xxx/CVE-2019-19923.json modified: 2019/19xxx/CVE-2019-19924.json modified: 2019/19xxx/CVE-2019-19925.json modified: 2019/19xxx/CVE-2019-19926.json modified: 2019/19xxx/CVE-2019-19959.json modified: 2019/1xxx/CVE-2019-1543.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/20xxx/CVE-2019-20218.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/5xxx/CVE-2019-5435.json modified: 2019/5xxx/CVE-2019-5436.json modified: 2019/5xxx/CVE-2019-5443.json modified: 2019/5xxx/CVE-2019-5481.json modified: 2019/5xxx/CVE-2019-5482.json modified: 2019/8xxx/CVE-2019-8457.json modified: 2019/9xxx/CVE-2019-9517.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/7xxx/CVE-2020-7044.json modified: 2020/8xxx/CVE-2020-8840.json
2020-04-14 14:04:09 -07:00
},
{
2020-04-16 19:02:24 +00:00
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
2020-06-04 17:01:20 +00:00
},
{
"refsource": "MLIST",
"name": "[cassandra-commits] 20200604 [jira] [Created] (CASSANDRA-15856) Security vulnerabilities with dependency jars of Cassandra 3.11.6",
"url": "https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E"
2021-03-23 14:00:39 +00:00
},
{
"refsource": "MLIST",
"name": "[cassandra-commits] 20210323 [jira] [Updated] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E"
2021-04-15 16:00:45 +00:00
},
{
"refsource": "MLIST",
"name": "[cassandra-commits] 20210415 [jira] [Updated] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/r261972a3b14cf6f1dcd94b1b265e9ef644a38ccdf0d0238fa0c4d459@%3Ccommits.cassandra.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cassandra-commits] 20210415 [jira] [Comment Edited] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/r09c3dcdccf4b74ad13bda79b354e6b793255ccfe245cca1b8cee23f5@%3Ccommits.cassandra.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[cassandra-commits] 20210415 [jira] [Commented] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/r3d71a6dbb063aa61ba81278fe622b20bfe7501bb3821c27695641ac3@%3Ccommits.cassandra.apache.org%3E"
2021-09-24 17:00:51 +00:00
},
{
"refsource": "MLIST",
"name": "[cassandra-commits] 20210924 [jira] [Updated] (CASSANDRA-15424) CVE-2018-1320 (The libthrift component is vulnerable to Improper Access Control)",
"url": "https://lists.apache.org/thread.html/r1015eaadef8314daa9348aa423086a732cfeb998ceb5d42605c9b0b5@%3Ccommits.cassandra.apache.org%3E"
2019-03-18 00:36:45 +00:00
}
]
}
}