"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-11-04 19:01:18 +00:00
parent 554402ba4c
commit 2cf42530d1
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 169 additions and 8 deletions

View File

@ -1,8 +1,41 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-4890",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "shadow",
"version": {
"version_data": [
{
"version_value": "4.x before 4.1.5"
}
]
}
},
{
"product_name": "sudo",
"version": {
"version_data": [
{
"version_value": "1.x before 1.7.4"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +44,78 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via \"su - user -c program\". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "tty hijacking possible in \"su\" via TIOCSTI ioctl"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2014/12/15/5",
"url": "http://www.openwall.com/lists/oss-security/2014/12/15/5"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2005-4890",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2005-4890"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890"
},
{
"url": "https://access.redhat.com/security/cve/cve-2005-4890",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2005-4890"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/11/06/8",
"url": "http://www.openwall.com/lists/oss-security/2012/11/06/8"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/05/20/3",
"url": "http://www.openwall.com/lists/oss-security/2013/05/20/3"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/11/28/10",
"url": "http://www.openwall.com/lists/oss-security/2013/11/28/10"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/11/29/5",
"url": "http://www.openwall.com/lists/oss-security/2013/11/29/5"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2014/10/20/9",
"url": "http://www.openwall.com/lists/oss-security/2014/10/20/9"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2014/10/21/1",
"url": "http://www.openwall.com/lists/oss-security/2014/10/21/1"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2016/02/25/6",
"url": "http://www.openwall.com/lists/oss-security/2016/02/25/6"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4280",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "RedHat",
"product": {
"product_data": [
{
"product_name": "vdsm",
"version": {
"version_data": [
{
"version_value": "through 2013-07-24"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Insecure temporary file vulnerability in RedHat vsdm 4.9.6."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "/tmp file vulnerability issues"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4280",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2013-4280"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4280",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4280"
},
{
"url": "https://access.redhat.com/security/cve/cve-2013-4280",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2013-4280"
}
]
}

View File

@ -19,7 +19,10 @@
"version": {
"version_data": [
{
"version_value": "FortiExtender 4.1.1 and below"
"version_value": "4.1.0 to 4.1.1"
},
{
"version_value": "4.0.0 and below"
}
]
}
@ -55,7 +58,7 @@
"description_data": [
{
"lang": "eng",
"value": "An OS command injection vulnerability in FortiExtender 4.1.1 and below under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted \"execute date\" commands."
"value": "An OS command injection vulnerability in FortiExtender 4.1.0 to 4.1.1, 4.0.0 and below under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted \"execute date\" commands."
}
]
}