"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-18 16:01:05 +00:00
parent 88c8d5a69f
commit 2ceb4a6697
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
7 changed files with 370 additions and 179 deletions

View File

@ -1,177 +1,177 @@
{
"impact" : {
"cvssv3" : {
"TM" : {
"RC" : "C",
"E" : "U",
"RL" : "O"
"impact": {
"cvssv3": {
"TM": {
"RC": "C",
"E": "U",
"RL": "O"
},
"BM" : {
"AC" : "L",
"AV" : "N",
"SCORE" : "5.000",
"I" : "N",
"PR" : "L",
"S" : "C",
"UI" : "N",
"A" : "N",
"C" : "L"
"BM": {
"AC": "L",
"AV": "N",
"SCORE": "5.000",
"I": "N",
"PR": "L",
"S": "C",
"UI": "N",
"A": "N",
"C": "L"
}
}
},
"description" : {
"description_data" : [
"description": {
"description_data": [
{
"value" : "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946.",
"lang" : "eng"
"value": "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946.",
"lang": "eng"
}
]
},
"data_type" : "CVE",
"references" : {
"reference_data" : [
"data_type": "CVE",
"references": {
"reference_data": [
{
"name" : "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
"url" : "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
"title" : "IBM Security Bulletin 958753 (Financial Transaction Manager)",
"refsource" : "CONFIRM"
"name": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
"url": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac",
"title": "IBM Security Bulletin 958753 (Financial Transaction Manager)",
"refsource": "CONFIRM"
},
{
"refsource" : "XF",
"title" : "X-Force Vulnerability Report",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946",
"name" : "ibm-ftm-cve20181847-info-disc (150946)"
"refsource": "XF",
"title": "X-Force Vulnerability Report",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946",
"name": "ibm-ftm-cve20181847-info-disc (150946)"
}
]
},
"problemtype" : {
"problemtype_data" : [
"problemtype": {
"problemtype_data": [
{
"description" : [
"description": [
{
"lang" : "eng",
"value" : "Obtain Information"
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
},
"CVE_data_meta" : {
"ID" : "CVE-2018-1847",
"ASSIGNER" : "psirt@us.ibm.com",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2019-07-11T00:00:00"
"CVE_data_meta": {
"ID": "CVE-2018-1847",
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2019-07-11T00:00:00"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"affects": {
"vendor": {
"vendor_data": [
{
"product" : {
"product_data" : [
"product": {
"product_data": [
{
"product_name" : "Financial Transaction Manager",
"version" : {
"version_data" : [
"product_name": "Financial Transaction Manager",
"version": {
"version_data": [
{
"version_value" : "2.1"
"version_value": "2.1"
},
{
"version_value" : "2.0"
"version_value": "2.0"
},
{
"version_value" : "2.1.1.2"
"version_value": "2.1.1.2"
},
{
"version_value" : "3.0.0.0"
"version_value": "3.0.0.0"
},
{
"version_value" : "3.0.0.1"
"version_value": "3.0.0.1"
},
{
"version_value" : "3.0.0.2"
"version_value": "3.0.0.2"
},
{
"version_value" : "2.1.1.0"
"version_value": "2.1.1.0"
},
{
"version_value" : "3.0.0.3"
"version_value": "3.0.0.3"
},
{
"version_value" : "3.0.0.4"
"version_value": "3.0.0.4"
},
{
"version_value" : "3.0.0.5"
"version_value": "3.0.0.5"
},
{
"version_value" : "3.0.0.6"
"version_value": "3.0.0.6"
},
{
"version_value" : "3.0.0.7"
"version_value": "3.0.0.7"
},
{
"version_value" : "3.0"
"version_value": "3.0"
},
{
"version_value" : "3.0.0.8"
"version_value": "3.0.0.8"
},
{
"version_value" : "2.1.1.1"
"version_value": "2.1.1.1"
},
{
"version_value" : "2.1.1.3"
"version_value": "2.1.1.3"
},
{
"version_value" : "2.1.1.4"
"version_value": "2.1.1.4"
},
{
"version_value" : "2.1.1"
"version_value": "2.1.1"
},
{
"version_value" : "2.0.0.0"
"version_value": "2.0.0.0"
},
{
"version_value" : "2.0.0.1"
"version_value": "2.0.0.1"
},
{
"version_value" : "2.0.0.2"
"version_value": "2.0.0.2"
},
{
"version_value" : "2.0.0.3"
"version_value": "2.0.0.3"
},
{
"version_value" : "2.0.0.4"
"version_value": "2.0.0.4"
},
{
"version_value" : "2.0.0.5"
"version_value": "2.0.0.5"
},
{
"version_value" : "2.1.0"
"version_value": "2.1.0"
},
{
"version_value" : "2.1.0.0"
"version_value": "2.1.0.0"
},
{
"version_value" : "2.1.0.1"
"version_value": "2.1.0.1"
},
{
"version_value" : "2.1.0.2"
"version_value": "2.1.0.2"
},
{
"version_value" : "2.1.0.3"
"version_value": "2.1.0.3"
},
{
"version_value" : "2.1.0.4"
"version_value": "2.1.0.4"
}
]
}
}
]
},
"vendor_name" : "IBM"
"vendor_name": "IBM"
}
]
}
},
"data_format" : "MITRE",
"data_version" : "4.0"
"data_format": "MITRE",
"data_version": "4.0"
}

View File

@ -59,8 +59,8 @@
},
{
"refsource": "CONFIRM",
"name": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Untrusted_data_is_executed_as_System_via_a_PAC_file_read_by_CrashPlanService.exe",
"url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Untrusted_data_is_executed_as_System_via_a_PAC_file_read_by_CrashPlanService.exe"
"name": "https://code42.com/r/support/CVE-2019-11552",
"url": "https://code42.com/r/support/CVE-2019-11552"
}
]
}

View File

@ -54,8 +54,8 @@
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Privilege_Escalation_in_LoginToken_API",
"url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Privilege_Escalation_in_LoginToken_API"
"name": "https://code42.com/r/support/CVE-2019-11553",
"url": "https://code42.com/r/support/CVE-2019-11553"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14252",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the secure portal in Publisure 2.1.2. Once successfully authenticated as an administrator, one is able to inject arbitrary PHP code by using the adminCons.php form. The code is then stored in the E:\\PUBLISURE\\webservice\\webpages\\AdminDir\\Templates\\ folder even if removed from the adminCons.php view (i.e., the rogue PHP file can be hidden)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt",
"url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14253",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in servletcontroller in the secure portal in Publisure 2.1.2. One can bypass authentication and perform a query on PHP forms within the /AdminDir folder that should be restricted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt",
"url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14254",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the secure portal in Publisure 2.1.2. Because SQL queries are not well sanitized, there are multiple SQL injections in userAccFunctions.php functions. Using this, an attacker can access passwords and/or grant access to the user account \"user\" in order to become \"Administrator\" (for example)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt",
"url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt"
}
]
}
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4136-1",
"url": "https://usn.ubuntu.com/4136-1/"
}
]
}