"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-11-20 21:01:55 +00:00
parent fa02badfae
commit 318a9675cb
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
17 changed files with 382 additions and 12 deletions

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2092",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "dolibarr",
"version": {
"version_data": [
{
"version_value": "3.3.4-1"
}
]
}
}
]
},
"vendor_name": "dolibarr"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-Site Scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-2092",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2013-2092"
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/05/14/3",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/05/14/3"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/Dolibarr/dolibarr/commit/8a90598b23e1b2689848187941f7a96b04907005",
"url": "https://github.com/Dolibarr/dolibarr/commit/8a90598b23e1b2689848187941f7a96b04907005"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2093",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "dolibarr",
"version": {
"version_data": [
{
"version_value": "3.3.4-1"
}
]
}
}
]
},
"vendor_name": "dolibarr"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,43 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2013/05/14/3",
"url": "http://www.openwall.com/lists/oss-security/2013/05/14/3"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-2093",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2013-2093"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84249",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84249"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/Dolibarr/dolibarr/commit/526a80dd202bbca396687a502d52c27e06e97fff",
"url": "https://github.com/Dolibarr/dolibarr/commit/526a80dd202bbca396687a502d52c27e06e97fff"
}
]
}

View File

@ -1,8 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3166",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +11,103 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Other"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PostgreSQL Global Development Group",
"product": {
"product_data": [
{
"product_name": "PostgreSQL",
"version": {
"version_data": [
{
"version_value": "before 9.0.20"
},
{
"version_value": "9.1.x before 9.1.16"
},
{
"version_value": "9.2.x before 9.2.11"
},
{
"version_value": "9.3.x before 9.3.7"
},
{
"version_value": "and 9.4.x before 9.4.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1587/",
"url": "http://www.postgresql.org/about/news/1587/"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html",
"url": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html",
"url": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html",
"url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html"
},
{
"refsource": "MISC",
"name": "http://www.debian.org/security/2015/dsa-3269",
"url": "http://www.debian.org/security/2015/dsa-3269"
},
{
"refsource": "MISC",
"name": "http://www.debian.org/security/2015/dsa-3270",
"url": "http://www.debian.org/security/2015/dsa-3270"
},
{
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-2621-1",
"url": "http://ubuntu.com/usn/usn-2621-1"
}
]
}

View File

@ -1,8 +1,8 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-3167",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +11,103 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "contrib/pgcrypto in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 uses different error responses when an incorrect key is used, which makes it easier for attackers to obtain the key via a brute force attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Other"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PostgreSQL Global Development Group",
"product": {
"product_data": [
{
"product_name": "PostgreSQL",
"version": {
"version_data": [
{
"version_value": "before 9.0.20"
},
{
"version_value": "9.1.x before 9.1.16"
},
{
"version_value": "9.2.x before 9.2.11"
},
{
"version_value": "9.3.x before 9.3.7"
},
{
"version_value": "and 9.4.x before 9.4.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://www.postgresql.org/about/news/1587/",
"url": "http://www.postgresql.org/about/news/1587/"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html",
"url": "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html",
"url": "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html",
"url": "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html",
"url": "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html"
},
{
"refsource": "MISC",
"name": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html",
"url": "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html"
},
{
"refsource": "MISC",
"name": "http://www.debian.org/security/2015/dsa-3269",
"url": "http://www.debian.org/security/2015/dsa-3269"
},
{
"refsource": "MISC",
"name": "http://www.debian.org/security/2015/dsa-3270",
"url": "http://www.debian.org/security/2015/dsa-3270"
},
{
"refsource": "MISC",
"name": "http://ubuntu.com/usn/usn-2621-1",
"url": "http://ubuntu.com/usn/usn-2621-1"
}
]
}

View File

@ -202,6 +202,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
}

View File

@ -224,6 +224,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
}

View File

@ -132,6 +132,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
}

View File

@ -127,6 +127,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
}

View File

@ -176,6 +176,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
}

View File

@ -163,6 +163,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
},

View File

@ -133,6 +133,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
},

View File

@ -173,6 +173,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
},

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://customers.codesys.com/fileadmin/data/customers/security/2019/Advisory2019-10_CDS-68341.pdf",
"url": "https://customers.codesys.com/fileadmin/data/customers/security/2019/Advisory2019-10_CDS-68341.pdf"
},
{
"refsource": "MISC",
"name": "https://www.tenable.com/security/research/tra-2019-48",
"url": "https://www.tenable.com/security/research/tra-2019-48"
}
]
}

View File

@ -273,6 +273,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
},

View File

@ -268,6 +268,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
},

View File

@ -253,6 +253,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
},

View File

@ -253,6 +253,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3935",
"url": "https://access.redhat.com/errata/RHSA-2019:3935"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3932",
"url": "https://access.redhat.com/errata/RHSA-2019:3932"
}
]
},