mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5d86be4a02
commit
047446bf27
@ -1,8 +1,8 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2013-3935",
|
"ID": "CVE-2013-3935",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
@ -11,7 +11,66 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "Cross-site request forgery (CSRF) vulnerability in Opsview before 4.4.1 and Opsview Core before 20130522 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via unspecified vectors."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Cross-Site Request Forgery "
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Opsview",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Opsview",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "before 4.4.1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Opsview Core",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "before 20130522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes",
|
||||||
|
"url": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822",
|
||||||
|
"url": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
|
||||||
"ID": "CVE-2013-3936",
|
"ID": "CVE-2013-3936",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
@ -11,7 +11,66 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Opsview before 4.4.1 and Opsview Core before 20130522 allow remote attackers to inject arbitrary web script or HTML."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Cross-Site Scripting"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "Opsview",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Opsview",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "before 4.4.1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"product_name": "Opsview Core",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "before 20130522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes",
|
||||||
|
"url": "http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822",
|
||||||
|
"url": "http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -4,7 +4,8 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-10158",
|
"ID": "CVE-2019-10158",
|
||||||
"ASSIGNER": "msiddiqu@redhat.com"
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
@ -48,16 +49,16 @@
|
|||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158",
|
||||||
"refsource": "CONFIRM"
|
"refsource": "CONFIRM"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/infinispan/infinispan/pull/6960",
|
"url": "https://github.com/infinispan/infinispan/pull/6960",
|
||||||
"name": "https://github.com/infinispan/infinispan/pull/6960",
|
"name": "https://github.com/infinispan/infinispan/pull/6960",
|
||||||
"refsource": "CONFIRM"
|
"refsource": "CONFIRM"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/infinispan/infinispan/pull/7025",
|
"url": "https://github.com/infinispan/infinispan/pull/7025",
|
||||||
"name": "https://github.com/infinispan/infinispan/pull/7025",
|
"name": "https://github.com/infinispan/infinispan/pull/7025",
|
||||||
"refsource": "CONFIRM"
|
"refsource": "CONFIRM"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
@ -78,4 +79,4 @@
|
|||||||
]
|
]
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -4,14 +4,58 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-10775",
|
"ID": "CVE-2019-10775",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "report@snyk.io",
|
||||||
"STATE": "RESERVED"
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"vendor_name": "n/a",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "ecstatic",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "All versions"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Denial of Service"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354",
|
||||||
|
"url": "https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354"
|
||||||
|
}
|
||||||
|
]
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -4,7 +4,8 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-14859",
|
"ID": "CVE-2019-14859",
|
||||||
"ASSIGNER": "mrehak@redhat.com"
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
@ -44,7 +45,9 @@
|
|||||||
"references": {
|
"references": {
|
||||||
"reference_data": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3"
|
"url": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859",
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859",
|
||||||
@ -52,10 +55,14 @@
|
|||||||
"refsource": "CONFIRM"
|
"refsource": "CONFIRM"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://pypi.org/project/ecdsa/0.13.3/"
|
"url": "https://pypi.org/project/ecdsa/0.13.3/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://pypi.org/project/ecdsa/0.13.3/"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/warner/python-ecdsa/issues/114"
|
"url": "https://github.com/warner/python-ecdsa/issues/114",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/warner/python-ecdsa/issues/114"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -77,4 +84,4 @@
|
|||||||
]
|
]
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -4,7 +4,8 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-14862",
|
"ID": "CVE-2019-14862",
|
||||||
"ASSIGNER": "mrehak@redhat.com"
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
@ -49,7 +50,9 @@
|
|||||||
"refsource": "CONFIRM"
|
"refsource": "CONFIRM"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://snyk.io/vuln/npm:knockout:20180213"
|
"url": "https://snyk.io/vuln/npm:knockout:20180213",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://snyk.io/vuln/npm:knockout:20180213"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -71,4 +74,4 @@
|
|||||||
]
|
]
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -4,7 +4,8 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-14863",
|
"ID": "CVE-2019-14863",
|
||||||
"ASSIGNER": "mrehak@redhat.com"
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
@ -49,7 +50,9 @@
|
|||||||
"refsource": "CONFIRM"
|
"refsource": "CONFIRM"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://snyk.io/vuln/npm:angular:20150807"
|
"url": "https://snyk.io/vuln/npm:angular:20150807",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://snyk.io/vuln/npm:angular:20150807"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -71,4 +74,4 @@
|
|||||||
]
|
]
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -4,7 +4,8 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-14864",
|
"ID": "CVE-2019-14864",
|
||||||
"ASSIGNER": "mrehak@redhat.com"
|
"ASSIGNER": "secalert@redhat.com",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
@ -62,13 +63,15 @@
|
|||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864",
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864",
|
||||||
"refsource": "CONFIRM"
|
"refsource": "CONFIRM"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/ansible/ansible/issues/63522",
|
"url": "https://github.com/ansible/ansible/issues/63522",
|
||||||
"name": "https://github.com/ansible/ansible/issues/63522"
|
"name": "https://github.com/ansible/ansible/issues/63522",
|
||||||
|
"refsource": "MISC"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/ansible/ansible/pull/63527",
|
"url": "https://github.com/ansible/ansible/pull/63527",
|
||||||
"name": "https://github.com/ansible/ansible/pull/63527"
|
"name": "https://github.com/ansible/ansible/pull/63527",
|
||||||
|
"refsource": "MISC"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -90,4 +93,4 @@
|
|||||||
]
|
]
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -1,17 +1,61 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-20219",
|
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"ID": "CVE-2019-20219",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "ngiflib 0.4 has a heap-based buffer over-read in GifIndexToTrueColor in ngiflib.c."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/miniupnp/ngiflib/issues/15",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://github.com/miniupnp/ngiflib/issues/15"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
67
2019/20xxx/CVE-2019-20225.json
Normal file
67
2019/20xxx/CVE-2019-20225.json
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"ID": "CVE-2019-20225",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "MyBB before 1.8.22 allows an open redirect on login."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://blog.mybb.com/2019/12/30/mybb-1-8-22-released-security-maintenance-release/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://blog.mybb.com/2019/12/30/mybb-1-8-22-released-security-maintenance-release/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://mybb.com/versions/1.8.22/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://mybb.com/versions/1.8.22/"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user