- Synchronized data.

This commit is contained in:
CVE Team 2018-09-21 14:04:41 -04:00
parent 16e51a3947
commit 06c3fbed06
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 209 additions and 98 deletions

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "securityalerts@avaya.com", "ASSIGNER" : "securityalerts@avaya.com",
"ID": "CVE-2018-15612", "ID" : "CVE-2018-15612",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Orchestration Designer Runtime Config CSRF" "TITLE" : "Orchestration Designer Runtime Config CSRF"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Orchestration Designer", "product_name" : "Orchestration Designer",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"version_value": "All versions up to 7.2.1" "version_value" : "All versions up to 7.2.1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Avaya" "vendor_name" : "Avaya"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "A CSRF vulnerability in the Runtime Config component of Avaya Aura® Orchestration Designer could allow an attacker to add, change, or remove administrative settings. Affected versions of Avaya Aura® Orchestration Designer include all versions up to 7.2.1." "value" : "A CSRF vulnerability in the Runtime Config component of Avaya Aura Orchestration Designer could allow an attacker to add, change, or remove administrative settings. Affected versions of Avaya Aura Orchestration Designer include all versions up to 7.2.1."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "HIGH", "attackComplexity" : "HIGH",
"attackVector": "NETWORK", "attackVector" : "NETWORK",
"availabilityImpact": "HIGH", "availabilityImpact" : "HIGH",
"baseScore": 8.3, "baseScore" : 8.3,
"baseSeverity": "HIGH", "baseSeverity" : "HIGH",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "HIGH", "integrityImpact" : "HIGH",
"privilegesRequired": "NONE", "privilegesRequired" : "NONE",
"scope": "CHANGED", "scope" : "CHANGED",
"userInteraction": "REQUIRED", "userInteraction" : "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "CWE-352: Cross-Site Request Forgery (CSRF)" "value" : "CWE-352: Cross-Site Request Forgery (CSRF)"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"name": "https://downloads.avaya.com/css/P8/documents/101052293", "name" : "https://downloads.avaya.com/css/P8/documents/101052293",
"refsource": "CONFIRM", "refsource" : "CONFIRM",
"url": "https://downloads.avaya.com/css/P8/documents/101052293" "url" : "https://downloads.avaya.com/css/P8/documents/101052293"
} }
] ]
}, },
"source": { "source" : {
"advisory": "ASA-2018-278" "advisory" : "ASA-2018-278"
} }
} }

View File

@ -1,82 +1,82 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "securityalerts@avaya.com", "ASSIGNER" : "securityalerts@avaya.com",
"ID": "CVE-2018-15613", "ID" : "CVE-2018-15613",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Orchestration Designer Runtime Config XSS" "TITLE" : "Orchestration Designer Runtime Config XSS"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Orchestration Designer", "product_name" : "Orchestration Designer",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"version_value": "All versions up to 7.2.1" "version_value" : "All versions up to 7.2.1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Avaya" "vendor_name" : "Avaya"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "A cross-site scripting (XSS) vulnerability in the Runtime Config component of Avaya Aura® Orchestration Designer could result in malicious content being returned to the user. Affected versions of Avaya Aura® Orchestration Designer include all versions up to 7.2.1." "value" : "A cross-site scripting (XSS) vulnerability in the Runtime Config component of Avaya Aura Orchestration Designer could result in malicious content being returned to the user. Affected versions of Avaya Aura Orchestration Designer include all versions up to 7.2.1."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "HIGH", "attackComplexity" : "HIGH",
"attackVector": "NETWORK", "attackVector" : "NETWORK",
"availabilityImpact": "HIGH", "availabilityImpact" : "HIGH",
"baseScore": 8.3, "baseScore" : 8.3,
"baseSeverity": "HIGH", "baseSeverity" : "HIGH",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "HIGH", "integrityImpact" : "HIGH",
"privilegesRequired": "NONE", "privilegesRequired" : "NONE",
"scope": "CHANGED", "scope" : "CHANGED",
"userInteraction": "REQUIRED", "userInteraction" : "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)" "value" : "CWE-79: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"name": "https://downloads.avaya.com/css/P8/documents/101052293", "name" : "https://downloads.avaya.com/css/P8/documents/101052293",
"refsource": "CONFIRM", "refsource" : "CONFIRM",
"url": "https://downloads.avaya.com/css/P8/documents/101052293" "url" : "https://downloads.avaya.com/css/P8/documents/101052293"
} }
] ]
}, },
"source": { "source" : {
"advisory": "ASA-2018-278" "advisory" : "ASA-2018-278"
} }
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-17317", "ID" : "CVE-2018-17317",
"STATE" : "RESERVED" "STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -11,7 +34,33 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value" : "FruityWifi (aka PatatasFritas/PatataWifi) 2.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the io_mode, ap_mode, io_action, io_in_iface, io_in_set, io_in_ip, io_in_mask, io_in_gw, io_out_iface, io_out_set, io_out_mask, io_out_gw, iface, or domain parameter to /www/script/config_iface.php, or the newSSID, hostapd_secure, hostapd_wpa_passphrase, or supplicant_ssid parameter to /www/page_config.php."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "http://blog.51cto.com/010bjsoft/2175710",
"refsource" : "MISC",
"url" : "http://blog.51cto.com/010bjsoft/2175710"
},
{
"name" : "https://github.com/PatatasFritas/PatataWifi/issues/1",
"refsource" : "MISC",
"url" : "https://github.com/PatatasFritas/PatataWifi/issues/1"
} }
] ]
} }

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-17320",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An issue was discovered in UCMS 1.4.6. aaddpost.php has stored XSS via the sadmin/aindex.php minfo parameter in a sadmin_aaddpost action."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/ucms/ucms/issues/1",
"refsource" : "MISC",
"url" : "https://github.com/ucms/ucms/issues/1"
}
]
}
}