"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-12 18:00:42 +00:00
parent 0762a878c4
commit 05275e52bf
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
21 changed files with 684 additions and 22 deletions

View File

@ -61,6 +61,11 @@
"name": "hancom-hml-bo(89871)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89871"
},
{
"refsource": "BID",
"name": "88211",
"url": "http://www.securityfocus.com/bid/88211"
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-7772",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-7772",
"ASSIGNER": "security@mozilla.org",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Mozilla",
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_value": "All versions prior to Firefox 54"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Heap-based Buffer Overflow in Graphite2 library in Firefox before 54 in lz4::decompress function."
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-13137",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Events Manager plugin 5.9.4 for WordPress has XSS via the dbem_event_reapproved_email_body parameter to the wp-admin/edit.php?post_type=event&page=events-manager-options URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://wordpress.org/plugins/events-manager/#developers",
"url": "https://wordpress.org/plugins/events-manager/#developers"
},
{
"url": "https://gist.github.com/ansarisec/12737c207c0851d52865ed60c08891b7",
"refsource": "MISC",
"name": "https://gist.github.com/ansarisec/12737c207c0851d52865ed60c08891b7"
},
{
"refsource": "MISC",
"name": "https://ansawaf.blogspot.com/2019/04/cve-2018-13137-xss-in-events-manager.html",
"url": "https://ansawaf.blogspot.com/2019/04/cve-2018-13137-xss-in-events-manager.html"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16254",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "There is an XSS vulnerability in WP All Import plugin 3.4.9 for WordPress via action=options."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing"
},
{
"refsource": "MISC",
"name": "https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html",
"url": "https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16255",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "There is an XSS vulnerability in WP All Import plugin 3.4.9 for WordPress via action=evaluate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing"
},
{
"refsource": "MISC",
"name": "https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html",
"url": "https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-16256",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "There is an XSS vulnerability in WP All Import plugin 3.4.9 for WordPress via Add Filtering Options(Add Rule)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing",
"refsource": "MISC",
"name": "https://docs.google.com/document/d/1Lfk0YQMIhlMCOOvVRX8HkU6C50s9QSW7C-9gnNmzsHY/edit?usp=sharing"
},
{
"refsource": "MISC",
"name": "https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html",
"url": "https://ansawaf.blogspot.com/2019/04/xss-in-import-any-xml-or-csv-file-for.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "106182",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106182"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1199",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00057.html"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://github.com/xiaoqx/pocs/blob/master/netpbm",
"refsource": "MISC",
"url": "https://github.com/xiaoqx/pocs/blob/master/netpbm"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1200",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00056.html"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1",
"refsource": "MISC",
"name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1"
},
{
"refsource": "MISC",
"name": "https://github.com/scarvell/grandstream_exploits",
"url": "https://github.com/scarvell/grandstream_exploits"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1",
"refsource": "MISC",
"name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1"
},
{
"refsource": "MISC",
"name": "https://github.com/scarvell/grandstream_exploits",
"url": "https://github.com/scarvell/grandstream_exploits"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1",
"refsource": "MISC",
"name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1"
},
{
"refsource": "MISC",
"name": "https://github.com/scarvell/grandstream_exploits",
"url": "https://github.com/scarvell/grandstream_exploits"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1",
"refsource": "MISC",
"name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1"
},
{
"refsource": "MISC",
"name": "https://github.com/scarvell/grandstream_exploits",
"url": "https://github.com/scarvell/grandstream_exploits"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1",
"refsource": "MISC",
"name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1"
},
{
"refsource": "MISC",
"name": "https://github.com/scarvell/grandstream_exploits",
"url": "https://github.com/scarvell/grandstream_exploits"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1",
"refsource": "MISC",
"name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1"
},
{
"refsource": "MISC",
"name": "https://github.com/scarvell/grandstream_exploits",
"url": "https://github.com/scarvell/grandstream_exploits"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1",
"refsource": "MISC",
"name": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1"
},
{
"refsource": "MISC",
"name": "https://github.com/scarvell/grandstream_exploits",
"url": "https://github.com/scarvell/grandstream_exploits"
}
]
}

View File

@ -1,18 +1,295 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cert@airbus.com",
"ID": "CVE-2019-10880",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "AltaLink B8045/B8055/B8065/B8075/B8090",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "101.008.008.27400"
}
]
}
},
{
"product_name": "AltaLink C8030/C8035/C8045/C8055/C8070",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "101.001.008.27400"
}
]
}
},
{
"product_name": "WorkCentre 3655",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.060.075.34540"
}
]
}
},
{
"product_name": "WorkCentre 5845/5855/5865/5875/5890",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.190.075.34540"
}
]
}
},
{
"product_name": "WorkCentre 5945/5955",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.091.075.34540"
}
]
}
},
{
"product_name": "WorkCentre 6655",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.110.075.34540"
}
]
}
},
{
"product_name": "WorkCentre 7220/7225",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.030.075.34540"
}
]
}
},
{
"product_name": "WorkCentre 7830/7835/7845/7855",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.010.075.34540"
}
]
}
},
{
"product_name": "WorkCentre 7970",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.200.075.34540"
}
]
}
},
{
"product_name": "WorkCentre EC7836/EC7856",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "073.020.167.17200"
}
]
}
},
{
"product_name": "ColorQube 9301/9302/9303",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "072.xxx.009.07200"
}
]
}
},
{
"product_name": "ColorQube 8700/8900",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "072.xxx.009.07200"
}
]
}
},
{
"product_name": "WorkCentre 6400",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "061.070.100.24201"
}
]
}
},
{
"product_name": "Phaser 6700",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "081.140.103.22600"
}
]
}
},
{
"product_name": "Phaser 7800",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "081.150.103.05600"
}
]
}
},
{
"product_name": "WorkCentre 5735/5740/5745/5755/5765/5775/5790",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "061.132.221.21403"
}
]
}
},
{
"product_name": "WorkCentre 7525/7530/7535/7545/7556",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "061.121.224.18803"
}
]
}
},
{
"product_name": "WorkCentre 7755/7765/7775",
"version": {
"version_data": [
{
"version_affected": "?<=",
"version_value": "061.090.220.19700"
}
]
}
}
]
},
"vendor_name": "XEROX"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Rapha\u00c3\u00abl Rigo from the Airbus Security Lab"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Within multiple XEROX products a vulnerability allows remote command execution on the Linux system, as the \"nobody\" user through a crafted \"HTTP\" request (OS Command Injection vulnerability in the HTTP interface). Depending upon configuration authentication may not be necessary."
}
]
}
},
"generator": {
"engine": "Vulnogram 0.0.6"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://airbus-seclab.github.io/",
"name": "https://airbus-seclab.github.io/"
},
{
"refsource": "CONFIRM",
"name": "https://securitydocs.business.xerox.com/wp-content/uploads/2019/04/cert_Security_Mini_Bulletin_XRX19C_for_CQ8700_CQ8900_CQ93xx.pdf",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2019/04/cert_Security_Mini_Bulletin_XRX19C_for_CQ8700_CQ8900_CQ93xx.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "A fix for some models is available."
}
],
"source": {
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "eng",
"value": "There are no known workarounds for now available."
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11216",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11217",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11218",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11219",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11220",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}