From 2555f48282c52807dadc07ee2f7e4acd9ad0a73f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 5 Dec 2018 13:04:44 -0500 Subject: [PATCH] - Synchronized data. --- 2018/15xxx/CVE-2018-15773.json | 79 +++++++++++----------- 2018/15xxx/CVE-2018-15797.json | 115 +++++++++++++++++---------------- 2 files changed, 98 insertions(+), 96 deletions(-) diff --git a/2018/15xxx/CVE-2018-15773.json b/2018/15xxx/CVE-2018-15773.json index 3da9a8ece9d..401a25540f4 100644 --- a/2018/15xxx/CVE-2018-15773.json +++ b/2018/15xxx/CVE-2018-15773.json @@ -1,73 +1,74 @@ { - "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2018-12-03T18:00:00.000Z", - "ID": "CVE-2018-15773", - "STATE": "PUBLIC", - "TITLE": "Dell Encryption Enterprise \\ Dell Data Protection Encryption Information Disclosure Vulnerability" + "CVE_data_meta" : { + "ASSIGNER" : "secure@dell.com", + "DATE_PUBLIC" : "2018-12-03T18:00:00.000Z", + "ID" : "CVE-2018-15773", + "STATE" : "PUBLIC", + "TITLE" : "Dell Encryption Enterprise \\ Dell Data Protection Encryption Information Disclosure Vulnerability" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Dell Encryption (formerly Dell Data Protection | Encryption)", - "version": { - "version_data": [ + "product_name" : "Dell Encryption (formerly Dell Data Protection | Encryption)", + "version" : { + "version_data" : [ { - "affected": "<", - "version_value": "10.1.0" + "affected" : "<", + "version_value" : "10.1.0" } ] } } ] }, - "vendor_name": "Dell" + "vendor_name" : "Dell" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "Dell would like to thank Jan van der Put and Harm Blankers of REQON Security for reporting this vulnerability." + "lang" : "eng", + "value" : "Dell would like to thank Jan van der Put and Harm Blankers of REQON Security for reporting this vulnerability." } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Dell Encryption (formerly Dell Data Protection | Encryption) v10.1.0 and earlier contain an information disclosure vulnerability. A malicious user with physical access to the machine could potentially exploit this vulnerability to access the unencrypted RegBack folder that contains back-ups of sensitive system files.\n\n" + "lang" : "eng", + "value" : "Dell Encryption (formerly Dell Data Protection | Encryption) v10.1.0 and earlier contain an information disclosure vulnerability. A malicious user with physical access to the machine could potentially exploit this vulnerability to access the unencrypted RegBack folder that contains back-ups of sensitive system files." } ] }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "information disclosure vulnerability" + "lang" : "eng", + "value" : "information disclosure vulnerability" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "refsource": "CONFIRM", - "url": "https://www.dell.com/support/article/us/en/04/sln314963/dell-encryption-enterprise-dell-data-protection-encryption-information-disclosure-vulnerability?lang=en" + "name" : "https://www.dell.com/support/article/us/en/04/sln314963/dell-encryption-enterprise-dell-data-protection-encryption-information-disclosure-vulnerability?lang=en", + "refsource" : "MISC", + "url" : "https://www.dell.com/support/article/us/en/04/sln314963/dell-encryption-enterprise-dell-data-protection-encryption-information-disclosure-vulnerability?lang=en" } ] }, - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2018/15xxx/CVE-2018-15797.json b/2018/15xxx/CVE-2018-15797.json index 4f36cbaa9ae..72c692dbf6c 100644 --- a/2018/15xxx/CVE-2018-15797.json +++ b/2018/15xxx/CVE-2018-15797.json @@ -1,94 +1,95 @@ { - "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2018-12-03T00:00:00.000Z", - "ID": "CVE-2018-15797", - "STATE": "PUBLIC", - "TITLE": "NFS Volume release errand leaks cf admin credentials in logs" + "CVE_data_meta" : { + "ASSIGNER" : "secure@dell.com", + "DATE_PUBLIC" : "2018-12-03T00:00:00.000Z", + "ID" : "CVE-2018-15797", + "STATE" : "PUBLIC", + "TITLE" : "NFS Volume release errand leaks cf admin credentials in logs" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "NFS Volume Release", - "version": { - "version_data": [ + "product_name" : "NFS Volume Release", + "version" : { + "version_data" : [ { - "affected": "<", - "version_name": "1.2", - "version_value": "1.2.5" + "affected" : "<", + "version_name" : "1.2", + "version_value" : "1.2.5" }, { - "affected": "<", - "version_name": "1.5", - "version_value": "1.5.4" + "affected" : "<", + "version_name" : "1.5", + "version_value" : "1.5.4" }, { - "affected": "<", - "version_name": "1.7", - "version_value": "1.7.3" + "affected" : "<", + "version_name" : "1.7", + "version_value" : "1.7.3" } ] } } ] }, - "vendor_name": "Cloud Foundry" + "vendor_name" : "Cloud Foundry" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand." + "lang" : "eng", + "value" : "Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand." } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 8.4, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "HIGH", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "ADJACENT_NETWORK", + "availabilityImpact" : "HIGH", + "baseScore" : 8.4, + "baseSeverity" : "HIGH", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "privilegesRequired" : "HIGH", + "scope" : "CHANGED", + "userInteraction" : "NONE", + "vectorString" : "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Information Exposure Through Debug Information" + "lang" : "eng", + "value" : "Information Exposure Through Debug Information" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "refsource": "CONFIRM", - "url": "https://www.cloudfoundry.org/blog/cve-2018-15797" + "name" : "https://www.cloudfoundry.org/blog/cve-2018-15797", + "refsource" : "CONFIRM", + "url" : "https://www.cloudfoundry.org/blog/cve-2018-15797" } ] }, - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +}