"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-18 16:00:44 +00:00
parent 92ab1da817
commit 081778beec
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 78 additions and 1 deletions

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-10746",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f",
"refsource": "MISC",
"name": "https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f"
},
{
"url": "https://github.com/libvirt/libvirt/compare/11288f5...8fd6867",
"refsource": "MISC",
"name": "https://github.com/libvirt/libvirt/compare/11288f5...8fd6867"
}
]
}
}

View File

@ -61,6 +61,11 @@
"name": "https://fakhrizulkifli.github.io/CVE-2018-16517.html",
"refsource": "MISC",
"url": "https://fakhrizulkifli.github.io/CVE-2018-16517.html"
},
{
"refsource": "EXPLOIT-DB",
"name": "46726",
"url": "https://www.exploit-db.com/exploits/46726/"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html"
},
{
"refsource": "EXPLOIT-DB",
"name": "46727",
"url": "https://www.exploit-db.com/exploits/46727/"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "In ncurses 6.1, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack."
"value": "** DISPUTED ** In ncurses, possibly a 6.x version, there is a NULL pointer dereference at the function _nc_name_match that will lead to a denial of service attack. NOTE: the original report stated version 6.1, but the issue did not reproduce for that version according to the maintainer or a reliable third-party."
}
]
},