"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-07-31 15:00:59 +00:00
parent 3f1f6582a1
commit 089e808623
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
22 changed files with 183 additions and 8 deletions

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-16860",
"ASSIGNER": "mrehak@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -55,7 +56,9 @@
"refsource": "CONFIRM"
},
{
"url": "https://www.samba.org/samba/security/CVE-2018-16860.html"
"url": "https://www.samba.org/samba/security/CVE-2018-16860.html",
"refsource": "MISC",
"name": "https://www.samba.org/samba/security/CVE-2018-16860.html"
}
]
},
@ -77,4 +80,4 @@
]
]
}
}
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429",
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/07/31/1"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13568",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://cimg.eu/",
"refsource": "MISC",
"name": "http://cimg.eu/"
},
{
"url": "https://github.com/dtschump/CImg",
"refsource": "MISC",
"name": "https://github.com/dtschump/CImg"
},
{
"refsource": "MISC",
"name": "https://github.com/dtschump/CImg/commit/ac8003393569aba51048c9d67e1491559877b1d1",
"url": "https://github.com/dtschump/CImg/commit/ac8003393569aba51048c9d67e1491559877b1d1"
}
]
}
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Prima Systems FlexAir devices allow Cross-Site Request Forgery (CSRF)."
"value": "Prima Systems FlexAir, Versions 2.3.38 and prior. An unauthenticated user can send unverified HTTP requests, which may allow the attacker to perform certain actions with administrative privileges if a logged-in user visits a malicious website."
}
]
},
@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.applied-risk.com/resources/ar-2019-007",
"url": "https://www.applied-risk.com/resources/ar-2019-007"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Prima Systems FlexAir devices allow unauthenticated download of the database configuration backup due to a predictable name, resulting in authentication bypass (a login authenticated with the MD5 hash of any user found in the database)."
"value": "Prima Systems FlexAir, Versions 2.3.38 and prior. The application generates database backup files with a predictable name, and an attacker can use brute force to identify the database backup file name. A malicious actor can exploit this issue to download the database file and disclose login information, which can allow the attacker to bypass authentication and have full access to the system."
}
]
},
@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.applied-risk.com/resources/ar-2019-007",
"url": "https://www.applied-risk.com/resources/ar-2019-007"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Prima Systems FlexAir devices allow Unauthenticated Command Injection resulting in Root Remote Code Execution."
"value": "Prima Systems FlexAir, Versions 2.3.38 and prior. Improper validation of file extensions when uploading files could allow a remote authenticated attacker to upload and execute malicious applications within the application\u2019s web root with root privileges."
}
]
},
@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.applied-risk.com/resources/ar-2019-007",
"url": "https://www.applied-risk.com/resources/ar-2019-007"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Prima Systems FlexAir devices allow Authenticated Command Injection resulting in Root Remote Code Execution."
"value": "Prima Systems FlexAir, Versions 2.3.38 and prior. The application incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component, which could allow attackers to execute commands directly on the operating system."
}
]
},
@ -56,6 +56,11 @@
"url": "https://applied-risk.com/labs/advisories",
"refsource": "MISC",
"name": "https://applied-risk.com/labs/advisories"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Prima Systems FlexAir devices allow Authenticated Stored XSS."
"value": "Prima Systems FlexAir, Versions 2.3.38 and prior. Parameters sent to scripts are not properly sanitized before being returned to the user, which may allow an attacker to execute arbitrary code in a user\u2019s browser session in context of an affected site."
}
]
},
@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://applied-risk.com/resources/ar-2019-007",
"url": "https://applied-risk.com/resources/ar-2019-007"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-211-02"
}
]
}