mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
88c8d5a69f
commit
2ceb4a6697
@ -1,177 +1,177 @@
|
||||
{
|
||||
"impact" : {
|
||||
"cvssv3" : {
|
||||
"TM" : {
|
||||
"RC" : "C",
|
||||
"E" : "U",
|
||||
"RL" : "O"
|
||||
},
|
||||
"BM" : {
|
||||
"AC" : "L",
|
||||
"AV" : "N",
|
||||
"SCORE" : "5.000",
|
||||
"I" : "N",
|
||||
"PR" : "L",
|
||||
"S" : "C",
|
||||
"UI" : "N",
|
||||
"A" : "N",
|
||||
"C" : "L"
|
||||
}
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"value" : "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946.",
|
||||
"lang" : "eng"
|
||||
}
|
||||
]
|
||||
},
|
||||
"data_type" : "CVE",
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
|
||||
"url" : "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
|
||||
"title" : "IBM Security Bulletin 958753 (Financial Transaction Manager)",
|
||||
"refsource" : "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource" : "XF",
|
||||
"title" : "X-Force Vulnerability Report",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946",
|
||||
"name" : "ibm-ftm-cve20181847-info-disc (150946)"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Obtain Information"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"CVE_data_meta" : {
|
||||
"ID" : "CVE-2018-1847",
|
||||
"ASSIGNER" : "psirt@us.ibm.com",
|
||||
"STATE" : "PUBLIC",
|
||||
"DATE_PUBLIC" : "2019-07-11T00:00:00"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Financial Transaction Manager",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "2.1"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.0"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.1.2"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.0"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.1"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.2"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.1.0"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.3"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.4"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.5"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.6"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.7"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0"
|
||||
},
|
||||
{
|
||||
"version_value" : "3.0.0.8"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.1.1"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.1.3"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.1.4"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.1"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.0.0.0"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.0.0.1"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.0.0.2"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.0.0.3"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.0.0.4"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.0.0.5"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.0"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.0.0"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.0.1"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.0.2"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.0.3"
|
||||
},
|
||||
{
|
||||
"version_value" : "2.1.0.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "IBM"
|
||||
"impact": {
|
||||
"cvssv3": {
|
||||
"TM": {
|
||||
"RC": "C",
|
||||
"E": "U",
|
||||
"RL": "O"
|
||||
},
|
||||
"BM": {
|
||||
"AC": "L",
|
||||
"AV": "N",
|
||||
"SCORE": "5.000",
|
||||
"I": "N",
|
||||
"PR": "L",
|
||||
"S": "C",
|
||||
"UI": "N",
|
||||
"A": "N",
|
||||
"C": "L"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0"
|
||||
}
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"value": "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946.",
|
||||
"lang": "eng"
|
||||
}
|
||||
]
|
||||
},
|
||||
"data_type": "CVE",
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
|
||||
"url": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
|
||||
"title": "IBM Security Bulletin 958753 (Financial Transaction Manager)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "XF",
|
||||
"title": "X-Force Vulnerability Report",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946",
|
||||
"name": "ibm-ftm-cve20181847-info-disc (150946)"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Obtain Information"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-1847",
|
||||
"ASSIGNER": "psirt@us.ibm.com",
|
||||
"STATE": "PUBLIC",
|
||||
"DATE_PUBLIC": "2019-07-11T00:00:00"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Financial Transaction Manager",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.1"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.1.2"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.0"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.1"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.2"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.1.0"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.3"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.4"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.5"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.6"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.7"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0"
|
||||
},
|
||||
{
|
||||
"version_value": "3.0.0.8"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.1.1"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.1.3"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.1.4"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.1"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.0.0"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.0.1"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.0.2"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.0.3"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.0.4"
|
||||
},
|
||||
{
|
||||
"version_value": "2.0.0.5"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.0"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.0.0"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.0.1"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.0.2"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.0.3"
|
||||
},
|
||||
{
|
||||
"version_value": "2.1.0.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "IBM"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0"
|
||||
}
|
@ -59,8 +59,8 @@
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Untrusted_data_is_executed_as_System_via_a_PAC_file_read_by_CrashPlanService.exe",
|
||||
"url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Untrusted_data_is_executed_as_System_via_a_PAC_file_read_by_CrashPlanService.exe"
|
||||
"name": "https://code42.com/r/support/CVE-2019-11552",
|
||||
"url": "https://code42.com/r/support/CVE-2019-11552"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -54,8 +54,8 @@
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Privilege_Escalation_in_LoginToken_API",
|
||||
"url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Privilege_Escalation_in_LoginToken_API"
|
||||
"name": "https://code42.com/r/support/CVE-2019-11553",
|
||||
"url": "https://code42.com/r/support/CVE-2019-11553"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
62
2019/14xxx/CVE-2019-14252.json
Normal file
62
2019/14xxx/CVE-2019-14252.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-14252",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in the secure portal in Publisure 2.1.2. Once successfully authenticated as an administrator, one is able to inject arbitrary PHP code by using the adminCons.php form. The code is then stored in the E:\\PUBLISURE\\webservice\\webpages\\AdminDir\\Templates\\ folder even if removed from the adminCons.php view (i.e., the rogue PHP file can be hidden)."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt",
|
||||
"url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/14xxx/CVE-2019-14253.json
Normal file
62
2019/14xxx/CVE-2019-14253.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-14253",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in servletcontroller in the secure portal in Publisure 2.1.2. One can bypass authentication and perform a query on PHP forms within the /AdminDir folder that should be restricted."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt",
|
||||
"url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/14xxx/CVE-2019-14254.json
Normal file
62
2019/14xxx/CVE-2019-14254.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-14254",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in the secure portal in Publisure 2.1.2. Because SQL queries are not well sanitized, there are multiple SQL injections in userAccFunctions.php functions. Using this, an attacker can access passwords and/or grant access to the user account \"user\" in order to become \"Administrator\" (for example)."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt",
|
||||
"url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4136-1",
|
||||
"url": "https://usn.ubuntu.com/4136-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user