mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5d86be4a02
commit
047446bf27
@ -1,8 +1,8 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2013-3935",
|
||||
"STATE": "RESERVED"
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
@ -11,7 +11,66 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Cross-site request forgery (CSRF) vulnerability in Opsview before 4.4.1 and Opsview Core before 20130522 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross-Site Request Forgery "
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Opsview",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Opsview",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before 4.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Opsview Core",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before 20130522"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes",
|
||||
"url": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822",
|
||||
"url": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,8 +1,8 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||
"ID": "CVE-2013-3936",
|
||||
"STATE": "RESERVED"
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
@ -11,7 +11,66 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Opsview before 4.4.1 and Opsview Core before 20130522 allow remote attackers to inject arbitrary web script or HTML."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross-Site Scripting"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Opsview",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Opsview",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before 4.4.1"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name": "Opsview Core",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "before 20130522"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes",
|
||||
"url": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822",
|
||||
"url": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-10158",
|
||||
"ASSIGNER": "msiddiqu@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -48,16 +49,16 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
{
|
||||
"url": "https://github.com/infinispan/infinispan/pull/6960",
|
||||
"name": "https://github.com/infinispan/infinispan/pull/6960",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/infinispan/infinispan/pull/7025",
|
||||
"name": "https://github.com/infinispan/infinispan/pull/7025",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
@ -78,4 +79,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-10775",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "report@snyk.io",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "ecstatic",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "All versions"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Denial of Service"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354",
|
||||
"url": "https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14859",
|
||||
"ASSIGNER": "mrehak@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,7 +45,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3"
|
||||
"url": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859",
|
||||
@ -52,10 +55,14 @@
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://pypi.org/project/ecdsa/0.13.3/"
|
||||
"url": "https://pypi.org/project/ecdsa/0.13.3/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://pypi.org/project/ecdsa/0.13.3/"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/warner/python-ecdsa/issues/114"
|
||||
{
|
||||
"url": "https://github.com/warner/python-ecdsa/issues/114",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/warner/python-ecdsa/issues/114"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -77,4 +84,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14862",
|
||||
"ASSIGNER": "mrehak@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -49,7 +50,9 @@
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://snyk.io/vuln/npm:knockout:20180213"
|
||||
"url": "https://snyk.io/vuln/npm:knockout:20180213",
|
||||
"refsource": "MISC",
|
||||
"name": "https://snyk.io/vuln/npm:knockout:20180213"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -71,4 +74,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14863",
|
||||
"ASSIGNER": "mrehak@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -49,7 +50,9 @@
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://snyk.io/vuln/npm:angular:20150807"
|
||||
"url": "https://snyk.io/vuln/npm:angular:20150807",
|
||||
"refsource": "MISC",
|
||||
"name": "https://snyk.io/vuln/npm:angular:20150807"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -71,4 +74,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14864",
|
||||
"ASSIGNER": "mrehak@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -62,13 +63,15 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
{
|
||||
"url": "https://github.com/ansible/ansible/issues/63522",
|
||||
"name": "https://github.com/ansible/ansible/issues/63522"
|
||||
"name": "https://github.com/ansible/ansible/issues/63522",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
{
|
||||
"url": "https://github.com/ansible/ansible/pull/63527",
|
||||
"name": "https://github.com/ansible/ansible/pull/63527"
|
||||
"name": "https://github.com/ansible/ansible/pull/63527",
|
||||
"refsource": "MISC"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -90,4 +93,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-20219",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2019-20219",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "ngiflib 0.4 has a heap-based buffer over-read in GifIndexToTrueColor in ngiflib.c."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/miniupnp/ngiflib/issues/15",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/miniupnp/ngiflib/issues/15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
67
2019/20xxx/CVE-2019-20225.json
Normal file
67
2019/20xxx/CVE-2019-20225.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-20225",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "MyBB before 1.8.22 allows an open redirect on login."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://blog.mybb.com/2019/12/30/mybb-1-8-22-released-security-maintenance-release/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://blog.mybb.com/2019/12/30/mybb-1-8-22-released-security-maintenance-release/"
|
||||
},
|
||||
{
|
||||
"url": "https://mybb.com/versions/1.8.22/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://mybb.com/versions/1.8.22/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user