mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 05:58:08 +00:00
- Synchronized data.
This commit is contained in:
parent
64bc38a45d
commit
37a1cf928f
@ -57,6 +57,9 @@
|
||||
},
|
||||
{
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1116.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2013-1119.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -102,6 +102,9 @@
|
||||
},
|
||||
{
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1930-1"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.ubuntu.com/usn/USN-1920-1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
{
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61297"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95404"
|
||||
},
|
||||
{
|
||||
"url" : "http://secunia.com/advisories/54249"
|
||||
}
|
||||
|
@ -55,6 +55,12 @@
|
||||
{
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130717-cucm"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61296"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95403"
|
||||
},
|
||||
{
|
||||
"url" : "http://secunia.com/advisories/54249"
|
||||
}
|
||||
|
@ -58,8 +58,17 @@
|
||||
{
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3436"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61362"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95460"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1028810"
|
||||
},
|
||||
{
|
||||
"url" : "http://xforce.iss.net/xforce/xfdb/85868"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,8 +58,14 @@
|
||||
{
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3439"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61416"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95585"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1028825"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,8 +58,14 @@
|
||||
{
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3440"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61414"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95584"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1028819"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,8 +58,14 @@
|
||||
{
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3441"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61404"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95548"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1028818"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,8 +58,17 @@
|
||||
{
|
||||
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3445"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61452"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95659"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1028837"
|
||||
},
|
||||
{
|
||||
"url" : "http://xforce.iss.net/xforce/xfdb/85982"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -60,6 +60,9 @@
|
||||
},
|
||||
{
|
||||
"url" : "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000069"
|
||||
},
|
||||
{
|
||||
"url" : "http://xforce.iss.net/xforce/xfdb/85894"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -79,6 +79,9 @@
|
||||
{
|
||||
"url" : "http://www.us-cert.gov/ncas/alerts/TA13-169A"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/60654"
|
||||
},
|
||||
{
|
||||
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17180"
|
||||
},
|
||||
|
@ -54,6 +54,9 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
|
||||
},
|
||||
{
|
||||
"url" : "http://secunia.com/advisories/54239"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,9 @@
|
||||
{
|
||||
"url" : "http://osvdb.org/95306"
|
||||
},
|
||||
{
|
||||
"url" : "http://secunia.com/advisories/54239"
|
||||
},
|
||||
{
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85693"
|
||||
}
|
||||
|
@ -58,6 +58,9 @@
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61105"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95702"
|
||||
},
|
||||
{
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/85990"
|
||||
}
|
||||
|
@ -57,6 +57,18 @@
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/61290"
|
||||
},
|
||||
{
|
||||
"url" : "http://osvdb.org/95581"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1028820"
|
||||
},
|
||||
{
|
||||
"url" : "http://secunia.com/advisories/54214"
|
||||
},
|
||||
{
|
||||
"url" : "http://xforce.iss.net/xforce/xfdb/85902"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,62 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.340007",
|
||||
"ID": "CVE-2017-1000126",
|
||||
"STATE": "PUBLIC",
|
||||
"REQUESTER": "hanno@hboeck.de"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "exiv2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0.26"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": ""
|
||||
}
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"DATE_ASSIGNED" : "2017-08-22T17:29:33.340007",
|
||||
"ID" : "CVE-2017-1000126",
|
||||
"REQUESTER" : "hanno@hboeck.de",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "exiv2",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "0.26"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : ""
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "exiv2 0.26 contains a Stack out of bounds read in webp parser"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "exiv2 0.26 contains a Stack out of bounds read in webp parser"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/06/30/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/06/30/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,62 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.340860",
|
||||
"ID": "CVE-2017-1000127",
|
||||
"STATE": "PUBLIC",
|
||||
"REQUESTER": "hanno@hboeck.de"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "exiv2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0.26"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": ""
|
||||
}
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"DATE_ASSIGNED" : "2017-08-22T17:29:33.340860",
|
||||
"ID" : "CVE-2017-1000127",
|
||||
"REQUESTER" : "hanno@hboeck.de",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "exiv2",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "0.26"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : ""
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Exiv2 0.26 contains a heap buffer overflow in tiff parser"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Exiv2 0.26 contains a heap buffer overflow in tiff parser"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/06/30/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/06/30/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,62 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.341797",
|
||||
"ID": "CVE-2017-1000128",
|
||||
"STATE": "PUBLIC",
|
||||
"REQUESTER": "hanno@hboeck.de"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "exiv2",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "0.26"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": ""
|
||||
}
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"DATE_ASSIGNED" : "2017-08-22T17:29:33.341797",
|
||||
"ID" : "CVE-2017-1000128",
|
||||
"REQUESTER" : "hanno@hboeck.de",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "exiv2",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "0.26"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : ""
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2017/06/30/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2017/06/30/1"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,65 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.445777",
|
||||
"ID": "CVE-2017-1000217",
|
||||
"REQUESTER": "lkiesow@uos.de",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Opencast",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.3.2 and older"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Apereo Foundation"
|
||||
}
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"DATE_ASSIGNED" : "2017-08-22T17:29:33.445777",
|
||||
"ID" : "CVE-2017-1000217",
|
||||
"REQUESTER" : "lkiesow@uos.de",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Opencast",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "2.3.2 and older"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Apereo Foundation"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Opencast 2.3.2 and older versions are vulnerable to script injections through media and metadata in the player and media module resulting in arbitrary code execution, fixed in 2.3.3 and 3.0."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Cross Site Scripting (XSS)"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Opencast 2.3.2 and older versions are vulnerable to script injections through media and metadata in the player and media module resulting in arbitrary code execution, fixed in 2.3.3 and 3.0."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Cross Site Scripting (XSS)"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://groups.google.com/a/opencast.org/forum/#!forum/security-notices"
|
||||
},
|
||||
{
|
||||
"url": "https://groups.google.com/a/opencast.org/forum/#!topic/security-notices/sCpt0pIPEFg"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://groups.google.com/a/opencast.org/forum/#!topic/security-notices/sCpt0pIPEFg"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,62 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED": "2017-08-22T17:29:33.450633",
|
||||
"ID": "CVE-2017-1000221",
|
||||
"REQUESTER": "lkiesow@uos.de",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Opencast",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "2.2.3 and older"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Apereo"
|
||||
}
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"DATE_ASSIGNED" : "2017-08-22T17:29:33.450633",
|
||||
"ID" : "CVE-2017-1000221",
|
||||
"REQUESTER" : "lkiesow@uos.de",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Opencast",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "2.2.3 and older"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Apereo"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "In Opencast 2.2.3 and older if user names overlap, the Opencast search service used for publication to the media modules and players will handle the access control incorrectly so that users only need to match part of the user name used for the access restriction. For example, a user with the role ROLE_USER will have access to recordings published only for ROLE_USER_X."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Incorrect Access Control"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In Opencast 2.2.3 and older if user names overlap, the Opencast search service used for publication to the media modules and players will handle the access control incorrectly so that users only need to match part of the user name used for the access restriction. For example, a user with the role ROLE_USER will have access to recordings published only for ROLE_USER_X."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Incorrect Access Control"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://opencast.jira.com/browse/MH-11862"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://opencast.jira.com/browse/MH-11862"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user