"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-03 17:01:05 +00:00
parent d7d9ef8294
commit 100e5fa891
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 14 additions and 7 deletions

View File

@ -66,6 +66,11 @@
"refsource": "MLIST",
"name": "[oss-security] 20190829 Re: Irssi 1.2.2:CVE-2019-15717",
"url": "http://www.openwall.com/lists/oss-security/2019/08/29/5"
},
{
"refsource": "UBUNTU",
"name": "USN-4119-1",
"url": "https://usn.ubuntu.com/4119-1/"
}
]
}

View File

@ -1,7 +1,7 @@
{
"CVE_data_meta": {
"ASSIGNER": "Secure@Dell.com",
"DATE_PUBLIC": "2019-08-28T16:00:00.000Z",
"ASSIGNER": "secure@dell.com",
"DATE_PUBLIC": "2019-08-28T16:00:00.000Z",
"ID": "CVE-2019-3751",
"STATE": "PUBLIC"
},
@ -32,7 +32,7 @@
"credit": [
{
"lang": "eng",
"value": "Dell EMC would like to thank Thorsten Tüllmann from Karlsruhe Institute of Technology (KIT) for reporting this vulnerability."
"value": "Dell EMC would like to thank Thorsten T\u00fcllmann from Karlsruhe Institute of Technology (KIT) for reporting this vulnerability."
}
],
"data_format": "MITRE",
@ -42,7 +42,7 @@
"description_data": [
{
"lang": "eng",
"value": "Dell EMC Enterprise Copy Data Management (eCDM) versions 1.0, 1.1, 2.0, 2.1, and 3.0 contain a certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victims data in transit."
"value": "Dell EMC Enterprise Copy Data Management (eCDM) versions 1.0, 1.1, 2.0, 2.1, and 3.0 contain a certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim's traffic to view or modify a victim\u2019s data in transit."
}
]
},
@ -80,8 +80,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://www.dell.com/support/security/en-us/details/536848/DSA-2019-118-Dell-EMC-Enterprise-Copy-Data-Management-eCDM-Improper-Certificate-Validation-Vuln"
"refsource": "MISC",
"url": "https://www.dell.com/support/security/en-us/details/536848/DSA-2019-118-Dell-EMC-Enterprise-Copy-Data-Management-eCDM-Improper-Certificate-Validation-Vuln",
"name": "https://www.dell.com/support/security/en-us/details/536848/DSA-2019-118-Dell-EMC-Enterprise-Copy-Data-Management-eCDM-Improper-Certificate-Validation-Vuln"
}
]
},

View File

@ -97,7 +97,8 @@
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://productsecurity-ux.ausmp1z1.pcf.dell.com/support/security/us/en/04/details/536796/DSA-2019-125-Dell-EMC-Unity-and-VNXe3200-Family-Reflected-Cross-Site-Scripting-Vulnerability"
"name": "https://www.dell.com/support/security/en-us/details/536796/DSA-2019-125-Dell-EMC-Unity-and-VNXe3200-Family-Reflected-Cross-Site-Scripting-Vulnerability",
"url": "https://www.dell.com/support/security/en-us/details/536796/DSA-2019-125-Dell-EMC-Unity-and-VNXe3200-Family-Reflected-Cross-Site-Scripting-Vulnerability"
}
]
},