mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
fd7bdb3ebe
commit
16613dd311
@ -63,6 +63,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4389-1",
|
||||
"url": "https://usn.ubuntu.com/4389-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4387-1",
|
||||
"url": "https://usn.ubuntu.com/4387-1/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4389-1",
|
||||
"url": "https://usn.ubuntu.com/4389-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4387-1",
|
||||
"url": "https://usn.ubuntu.com/4387-1/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -106,6 +106,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4389-1",
|
||||
"url": "https://usn.ubuntu.com/4389-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4387-1",
|
||||
"url": "https://usn.ubuntu.com/4387-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -121,6 +121,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4389-1",
|
||||
"url": "https://usn.ubuntu.com/4389-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4387-1",
|
||||
"url": "https://usn.ubuntu.com/4387-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4389-1",
|
||||
"url": "https://usn.ubuntu.com/4389-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4387-1",
|
||||
"url": "https://usn.ubuntu.com/4387-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,24 +63,9 @@
|
||||
"name": "https://twitter.com/sepcali/status/1262551597990711296"
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/sepcali/status/1262551336152948738",
|
||||
"refsource": "MISC",
|
||||
"name": "https://twitter.com/sepcali/status/1262551336152948738"
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/sepcali/status/1262551277940211712",
|
||||
"refsource": "MISC",
|
||||
"name": "https://twitter.com/sepcali/status/1262551277940211712"
|
||||
},
|
||||
{
|
||||
"url": "https://twitter.com/sepcali",
|
||||
"refsource": "MISC",
|
||||
"name": "https://twitter.com/sepcali"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sepcali",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/sepcali"
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20200616 Pulse Secure Client < 9.1R6 TOCTOU Privilege Escalation (CVE-2020-13162)",
|
||||
"url": "http://seclists.org/fulldisclosure/2020/Jun/25"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
@ -96,6 +81,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44503",
|
||||
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44503"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://twitter.com/gsepcali/status/1262551597990711296",
|
||||
"url": "https://twitter.com/gsepcali/status/1262551597990711296"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://twitter.com/gsepcali/status/1272927080909623297",
|
||||
"url": "https://twitter.com/gsepcali/status/1272927080909623297"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,118 +1,118 @@
|
||||
{
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description" : [
|
||||
"description": [
|
||||
{
|
||||
"value" : "Obtain Information",
|
||||
"lang" : "eng"
|
||||
"value": "Obtain Information",
|
||||
"lang": "eng"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "IBM Business Automation Workflow and IBM Business Process Manager (IBM Business Process Manager Express 8.5.5, 8.5.6, 8.5.7, and 8.6) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 182716."
|
||||
"lang": "eng",
|
||||
"value": "IBM Business Automation Workflow and IBM Business Process Manager (IBM Business Process Manager Express 8.5.5, 8.5.6, 8.5.7, and 8.6) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 182716."
|
||||
}
|
||||
]
|
||||
},
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"impact" : {
|
||||
"cvssv3" : {
|
||||
"BM" : {
|
||||
"I" : "N",
|
||||
"SCORE" : "5.300",
|
||||
"UI" : "N",
|
||||
"PR" : "N",
|
||||
"AC" : "L",
|
||||
"C" : "L",
|
||||
"A" : "N",
|
||||
"S" : "U",
|
||||
"AV" : "N"
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"impact": {
|
||||
"cvssv3": {
|
||||
"BM": {
|
||||
"I": "N",
|
||||
"SCORE": "5.300",
|
||||
"UI": "N",
|
||||
"PR": "N",
|
||||
"AC": "L",
|
||||
"C": "L",
|
||||
"A": "N",
|
||||
"S": "U",
|
||||
"AV": "N"
|
||||
},
|
||||
"TM" : {
|
||||
"E" : "U",
|
||||
"RL" : "O",
|
||||
"RC" : "C"
|
||||
"TM": {
|
||||
"E": "U",
|
||||
"RL": "O",
|
||||
"RC": "C"
|
||||
}
|
||||
}
|
||||
},
|
||||
"CVE_data_meta" : {
|
||||
"DATE_PUBLIC" : "2020-06-16T00:00:00",
|
||||
"STATE" : "PUBLIC",
|
||||
"ID" : "CVE-2020-4532",
|
||||
"ASSIGNER" : "psirt@us.ibm.com"
|
||||
"CVE_data_meta": {
|
||||
"DATE_PUBLIC": "2020-06-16T00:00:00",
|
||||
"STATE": "PUBLIC",
|
||||
"ID": "CVE-2020-4532",
|
||||
"ASSIGNER": "psirt@us.ibm.com"
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource" : "CONFIRM",
|
||||
"title" : "IBM Security Bulletin 6233276 (Business Process Manager Express)",
|
||||
"name" : "https://www.ibm.com/support/pages/node/6233276",
|
||||
"url" : "https://www.ibm.com/support/pages/node/6233276"
|
||||
"refsource": "CONFIRM",
|
||||
"title": "IBM Security Bulletin 6233276 (Business Process Manager Express)",
|
||||
"name": "https://www.ibm.com/support/pages/node/6233276",
|
||||
"url": "https://www.ibm.com/support/pages/node/6233276"
|
||||
},
|
||||
{
|
||||
"title" : "X-Force Vulnerability Report",
|
||||
"name" : "ibm-baw-cve20204532-info-disc (182716)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/182716"
|
||||
"title": "X-Force Vulnerability Report",
|
||||
"name": "ibm-baw-cve20204532-info-disc (182716)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182716"
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value" : "8.6"
|
||||
"version_value": "8.6"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.7.CF201706"
|
||||
"version_value": "8.5.7.CF201706"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.7.CF201703"
|
||||
"version_value": "8.5.7.CF201703"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.7.CF201612"
|
||||
"version_value": "8.5.7.CF201612"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.7.CF201609"
|
||||
"version_value": "8.5.7.CF201609"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.7.CF201606"
|
||||
"version_value": "8.5.7.CF201606"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.7"
|
||||
"version_value": "8.5.7"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.6.2"
|
||||
"version_value": "8.5.6.2"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.6.1"
|
||||
"version_value": "8.5.6.1"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.6"
|
||||
"version_value": "8.5.6"
|
||||
},
|
||||
{
|
||||
"version_value" : "8.5.5"
|
||||
"version_value": "8.5.5"
|
||||
}
|
||||
]
|
||||
},
|
||||
"product_name" : "Business Process Manager Express"
|
||||
"product_name": "Business Process Manager Express"
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "IBM"
|
||||
"vendor_name": "IBM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,14 +4,58 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-6869",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "psirt@zte.com.cn",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "<ZTEMarket APK>",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "<All versions up to 10.06>"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "information leak"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1013022",
|
||||
"url": "http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1013022"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "All versions up to 10.06 of ZTEMarket APK are impacted by an information leak vulnerability. Due to Activity Component exposure users can exploit this vulnerability to get the private cookie and execute silent installation."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user