"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-04-28 14:01:27 +00:00
parent fbd3e51994
commit 0cd0e444c8
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
7 changed files with 326 additions and 140 deletions

View File

@ -66,6 +66,11 @@
"name": "https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29", "name": "https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29",
"refsource": "MISC", "refsource": "MISC",
"url": "https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29" "url": "https://gist.github.com/404notf0und/ab59234d71fbf35b4926ffd646324f29"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/exponentcms/exponent-cms/commit/67a9c2f0229de120431f3eecb0f5017075517105",
"url": "https://github.com/exponentcms/exponent-cms/commit/67a9c2f0229de120431f3eecb0f5017075517105"
} }
] ]
} }

View File

@ -1,17 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-10093",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2020-10093",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A cross-site scripting (XSS) vulnerability in Lexmark Pro910 series inkjet and other discontinued products."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://support.lexmark.com/index?page=content&id=TE936",
"url": "http://support.lexmark.com/index?page=content&id=TE936"
} }
] ]
} }

View File

@ -5,13 +5,57 @@
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-10094", "ID": "CVE-2020-10094",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://support.lexmark.com/index?page=content&id=TE936",
"url": "http://support.lexmark.com/index?page=content&id=TE936"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A cross-site scripting (XSS) vulnerability in Lexmark CS31x before LW74.VYL.P273; CS41x before LW74.VY2.P273; CS51x before LW74.VY4.P273; CX310 before LW74.GM2.P273; CX410 & XC2130 before LW74.GM4.P273; CX510 & XC2132 before LW74.GM7.P273; MS310, MS312, MS317 before LW74.PRL.P273; MS410, M1140 before LW74.PRL.P273; MS315, MS415, MS417 before LW74.TL2.P273; MS51x, MS610dn, MS617 before LW74.PR2.P273; M1145, M3150dn before LW74.PR2.P273; MS610de, M3150 before LW74.PR4.P273; MS71x,M5163dn before LW74.DN2.P273; MS810, MS811, MS812, MS817, MS818 before LW74.DN2.P273; MS810de, M5155, M5163 before LW74.DN4.P273; MS812de, M5170 before LW74.DN7.P273; MS91x before LW74.SA.P273; MX31x, XM1135 before LW74.SB2.P273; MX410, MX510 & MX511 before LW74.SB4.P273; XM1140, XM1145 before LW74.SB4.P273; MX610 & MX611 before LW74.SB7.P273; XM3150 before LW74.SB7.P273; MX71x, MX81x before LW74.TU.P273; XM51xx & XM71xx before LW74.TU.P273; MX91x & XM91x before LW74.MG.P273; MX6500e before LW74.JD.P273; C746 before LHS60.CM2.P738; C748, CS748 before LHS60.CM4.P738; C792, CS796 before LHS60.HC.P738; C925 before LHS60.HV.P738; C950 before LHS60.TP.P738; X548 & XS548 before LHS60.VK.P738; X74x & XS748 before LHS60.NY.P738; X792 & XS79x before LHS60.MR.P738; X925 & XS925 before LHS60.HK.P738; X95x & XS95x before LHS60.TQ.P738; 6500e before LHS60.JR.P738;C734 LR.SK.P824 and earlier; C736 LR.SKE.P824 and earlier; E46x LR.LBH.P824 and earlier; T65x LR.JP.P824 and earlier; X46x LR.BS.P824 and earlier; X65x LR.MN.P824 and earlier; X73x LR.FL.P824 and earlier; W850 LP.JB.P823 and earlier; and X86x LP.SP.P823 and earlier."
} }
] ]
} }

View File

@ -1,17 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-10944",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2020-10944",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "HashiCorp Nomad and Nomad Enterprise up to 0.10.4 contained a cross-site scripting vulnerability such that files from a malicious workload could cause arbitrary JavaScript to execute in the web UI. Fixed in 0.10.5."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://github.com/hashicorp/nomad/issues/7468",
"url": "https://github.com/hashicorp/nomad/issues/7468"
} }
] ]
} }

View File

@ -1,17 +1,71 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-12078",
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED" "ID": "CVE-2020-12078",
"STATE": "PUBLIC"
}, },
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gist.github.com/mhaskar/dca62d0f0facc13f6364b8ed88d5a7fd",
"refsource": "MISC",
"name": "https://gist.github.com/mhaskar/dca62d0f0facc13f6364b8ed88d5a7fd"
},
{
"refsource": "MISC",
"name": "https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/",
"url": "https://shells.systems/open-audit-v3-3-1-remote-command-execution-cve-2020-12078/"
},
{
"refsource": "MISC",
"name": "https://github.com/Opmantek/open-audit/commit/6ffc7f9032c55eaa1c37cf5e070809b7211c7e9a",
"url": "https://github.com/Opmantek/open-audit/commit/6ffc7f9032c55eaa1c37cf5e070809b7211c7e9a"
} }
] ]
} }

View File

@ -10,6 +10,7 @@
"vendor": { "vendor": {
"vendor_data": [ "vendor_data": [
{ {
"vendor_name": "OTRS AG",
"product": { "product": {
"product_data": [ "product_data": [
{ {
@ -17,14 +18,10 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<=", "version_value": "6.0.x <= 6.0.27"
"version_name": "6.0.x",
"version_value": "6.0.27"
}, },
{ {
"version_affected": "<=", "version_value": "5.0.x <= 5.0.42"
"version_name": "5.0.x",
"version_value": "5.0.42"
} }
] ]
} }
@ -34,16 +31,13 @@
"version": { "version": {
"version_data": [ "version_data": [
{ {
"version_affected": "<=", "version_value": "7.0.x <= 7.0.16"
"version_name": "7.0.x",
"version_value": "7.0.16"
} }
] ]
} }
} }
] ]
}, }
"vendor_name": "OTRS AG"
} }
] ]
} }
@ -61,7 +55,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it's possible to mix them and to send private key to the third-party instead of public key.\n\nThis issue affects\n((OTRS)) Community Edition: \n5.0.42 and prior versions, \n6.0.27 and prior versions.\n\nOTRS:\n7.0.16 and prior versions. " "value": "When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it's possible to mix them and to send private key to the third-party instead of public key. This issue affects ((OTRS)) Community Edition: 5.0.42 and prior versions, 6.0.27 and prior versions. OTRS: 7.0.16 and prior versions."
} }
] ]
}, },
@ -100,6 +94,7 @@
"reference_data": [ "reference_data": [
{ {
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://otrs.com/release-notes/otrs-security-advisory-2020-11/",
"url": "https://otrs.com/release-notes/otrs-security-advisory-2020-11/" "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-11/"
} }
] ]

View File

@ -1,112 +1,112 @@
{ {
"references" : { "references": {
"reference_data" : [ "reference_data": [
{
"name" : "https://www.ibm.com/support/pages/node/6201862",
"url" : "https://www.ibm.com/support/pages/node/6201862",
"title" : "IBM Security Bulletin 6201862 (WebSphere Application Server)",
"refsource" : "CONFIRM"
},
{
"name" : "ibm-websphere-cve20204329-info-disc (177841)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/177841",
"title" : "X-Force Vulnerability Report",
"refsource" : "XF"
}
]
},
"impact" : {
"cvssv3" : {
"TM" : {
"RL" : "O",
"RC" : "C",
"E" : "U"
},
"BM" : {
"PR" : "L",
"AV" : "N",
"C" : "L",
"A" : "N",
"AC" : "L",
"SCORE" : "4.300",
"S" : "U",
"I" : "N",
"UI" : "N"
}
}
},
"description" : {
"description_data" : [
{
"value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0 and Liberty 17.0.0.3 through 20.0.0.4 could allow a remote, authenticated attacker to obtain sensitive information, caused by improper parameter checking. This could be exploited to conduct spoofing attacks. IBM X-Force ID: 177841.",
"lang" : "eng"
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{ {
"vendor_name" : "IBM", "name": "https://www.ibm.com/support/pages/node/6201862",
"product" : { "url": "https://www.ibm.com/support/pages/node/6201862",
"product_data" : [ "title": "IBM Security Bulletin 6201862 (WebSphere Application Server)",
{ "refsource": "CONFIRM"
"version" : { },
"version_data" : [ {
{ "name": "ibm-websphere-cve20204329-info-disc (177841)",
"version_value" : "17.0.0.3" "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/177841",
}, "title": "X-Force Vulnerability Report",
{ "refsource": "XF"
"version_value" : "20.0.0.4"
}
]
},
"product_name" : "WebSphere Application Server Liberty"
},
{
"version" : {
"version_data" : [
{
"version_value" : "7.0"
},
{
"version_value" : "8.0"
},
{
"version_value" : "8.5"
},
{
"version_value" : "9.0"
}
]
},
"product_name" : "WebSphere Application Server"
}
]
}
} }
] ]
} },
}, "impact": {
"data_version" : "4.0", "cvssv3": {
"problemtype" : { "TM": {
"problemtype_data" : [ "RL": "O",
{ "RC": "C",
"description" : [ "E": "U"
{ },
"lang" : "eng", "BM": {
"value" : "Obtain Information" "PR": "L",
} "AV": "N",
"C": "L",
"A": "N",
"AC": "L",
"SCORE": "4.300",
"S": "U",
"I": "N",
"UI": "N"
}
}
},
"description": {
"description_data": [
{
"value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0 and Liberty 17.0.0.3 through 20.0.0.4 could allow a remote, authenticated attacker to obtain sensitive information, caused by improper parameter checking. This could be exploited to conduct spoofing attacks. IBM X-Force ID: 177841.",
"lang": "eng"
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "17.0.0.3"
},
{
"version_value": "20.0.0.4"
}
]
},
"product_name": "WebSphere Application Server Liberty"
},
{
"version": {
"version_data": [
{
"version_value": "7.0"
},
{
"version_value": "8.0"
},
{
"version_value": "8.5"
},
{
"version_value": "9.0"
}
]
},
"product_name": "WebSphere Application Server"
}
]
}
}
] ]
} }
] },
}, "data_version": "4.0",
"data_format" : "MITRE", "problemtype": {
"CVE_data_meta" : { "problemtype_data": [
"ASSIGNER" : "psirt@us.ibm.com", {
"ID" : "CVE-2020-4329", "description": [
"STATE" : "PUBLIC", {
"DATE_PUBLIC" : "2020-04-27T00:00:00" "lang": "eng",
}, "value": "Obtain Information"
"data_type" : "CVE" }
} ]
}
]
},
"data_format": "MITRE",
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2020-4329",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2020-04-27T00:00:00"
},
"data_type": "CVE"
}