"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-11-06 18:01:52 +00:00
parent de09e59dce
commit 3a15ebab3d
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 73 additions and 1 deletions

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18926",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.openwall.com/lists/oss-security/2017/06/07/1",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2017/06/07/1"
},
{
"url": "https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1",
"refsource": "MISC",
"name": "https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1"
}
]
}
}

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider.\n\nOnly deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected.\n\nA fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty.\n\nAs a workaround LDAP administrators can disallow unauthenticated bind requests by clients."
"value": "In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients."
}
]
},

View File

@ -76,6 +76,11 @@
"refsource": "FULLDISC",
"name": "20201105 Git LFS (git-lfs) - Remote Code Execution (RCE) exploit CVE-2020-27955 - Clone to Pwn",
"url": "http://seclists.org/fulldisclosure/2020/Nov/1"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159923/git-lfs-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/159923/git-lfs-Remote-Code-Execution.html"
}
]
}