"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-05-07 20:00:46 +00:00
parent 06427f379a
commit 124e4b713d
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
10 changed files with 203 additions and 10 deletions

View File

@ -59,7 +59,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Appoprt before 2.19.2 function _python_module_path." "value": "Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path."
} }
] ]
}, },

View File

@ -44,6 +44,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html",
"url": "http://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html"
},
{
"refsource": "MISC",
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03"
},
{
"refsource": "BID",
"name": "108147",
"url": "http://www.securityfocus.com/bid/108147"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0746", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0746",

View File

@ -44,6 +44,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152647/Sierra-Wireless-AirLink-ES450-SNMPD-Hard-Coded-Credentials.html",
"url": "http://packetstormsecurity.com/files/152647/Sierra-Wireless-AirLink-ES450-SNMPD-Hard-Coded-Credentials.html"
},
{
"refsource": "MISC",
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03"
},
{
"refsource": "BID",
"name": "108147",
"url": "http://www.securityfocus.com/bid/108147"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0747", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0747",

View File

@ -44,6 +44,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03"
},
{
"refsource": "BID",
"name": "108147",
"url": "http://www.securityfocus.com/bid/108147"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748",

View File

@ -44,6 +44,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152650/Sierra-Wireless-AirLink-ES450-ACEManager-ping_result.cgi-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/152650/Sierra-Wireless-AirLink-ES450-ACEManager-ping_result.cgi-Cross-Site-Scripting.html"
},
{
"refsource": "MISC",
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03"
},
{
"refsource": "BID",
"name": "108147",
"url": "http://www.securityfocus.com/bid/108147"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750",

View File

@ -44,6 +44,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152651/Sierra-Wireless-AirLink-ES450-ACEManager-Cross-Site-Request-Forgery.html",
"url": "http://packetstormsecurity.com/files/152651/Sierra-Wireless-AirLink-ES450-ACEManager-Cross-Site-Request-Forgery.html"
},
{
"refsource": "MISC",
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03"
},
{
"refsource": "BID",
"name": "108147",
"url": "http://www.securityfocus.com/bid/108147"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0751", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0751",

View File

@ -44,6 +44,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152652/Sierra-Wireless-AirLink-ES450-ACEManager-template_load.cgi-Information-Disclosure.html",
"url": "http://packetstormsecurity.com/files/152652/Sierra-Wireless-AirLink-ES450-ACEManager-template_load.cgi-Information-Disclosure.html"
},
{
"refsource": "MISC",
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03"
},
{
"refsource": "BID",
"name": "108147",
"url": "http://www.securityfocus.com/bid/108147"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0752", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0752",

View File

@ -44,6 +44,21 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152654/Sierra-Wireless-AirLink-ES450-ACEManager-Information-Exposure.html",
"url": "http://packetstormsecurity.com/files/152654/Sierra-Wireless-AirLink-ES450-ACEManager-Information-Exposure.html"
},
{
"refsource": "MISC",
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03"
},
{
"refsource": "BID",
"name": "108147",
"url": "http://www.securityfocus.com/bid/108147"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0754", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0754",

View File

@ -1,17 +1,61 @@
{ {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6243",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-6243",
"ASSIGNER": "psirt@nvidia.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "NVIDIA",
"product": {
"product_data": [
{
"product_name": "Tegra TLK Widevine Trust Application",
"version": {
"version_data": [
{
"version_value": "N/A"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of privileges, Code Execution, Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://source.android.com/security/bulletin/2019-05-01",
"url": "https://source.android.com/security/bulletin/2019-05-01"
}
]
},
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "NVIDIA Tegra TLK Widevine Trust Application contains a vulnerability in which missing the input parameter checking of video metadata count may lead to Arbitrary Code Execution, Denial of Service or Escalation of Privileges. Android ID: A-72315075. Severity Rating: High. Version: N/A."
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6634", "ID": "CVE-2018-6634",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability in Parsec Windows 142-0 and Parsec 'Linux Ubuntu 16.04 LTS Desktop' Build 142-1 allows unauthorized users to maintain access to an account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://twitter.com/VixusFoxy/status/1125697484498583553",
"url": "https://twitter.com/VixusFoxy/status/1125697484498583553"
} }
] ]
} }