"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-28 19:00:49 +00:00
parent 55077c170d
commit 3ce8b85afe
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
24 changed files with 268 additions and 18 deletions

View File

@ -121,6 +121,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html", "name": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html" "url": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html"
},
{
"refsource": "EXPLOIT-DB",
"name": "46628",
"url": "https://www.exploit-db.com/exploits/46628/"
} }
] ]
} }

View File

@ -72,6 +72,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/", "name": "[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/",
"url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-dev] 20190328 Re: Website",
"url": "https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E"
} }
] ]
} }

View File

@ -87,6 +87,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/", "name": "[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/",
"url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-dev] 20190328 Re: Website",
"url": "https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E"
} }
] ]
} }

View File

@ -97,6 +97,16 @@
"refsource": "SUSE", "refsource": "SUSE",
"name": "openSUSE-SU-2019:1056", "name": "openSUSE-SU-2019:1056",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:0680",
"url": "https://access.redhat.com/errata/RHSA-2019:0680"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:0681",
"url": "https://access.redhat.com/errata/RHSA-2019:0681"
} }
] ]
} }

View File

@ -77,6 +77,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/", "name": "[activemq-commits] 20190327 svn commit: r1042639 - in /websites/production/activemq/content/activemq-website: ./ projects/artemis/download/ projects/classic/download/ projects/cms/download/ security-advisories.data/",
"url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-dev] 20190328 Re: Website",
"url": "https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E"
} }
] ]
} }

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003040", "ID": "CVE-2019-1003040",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003041", "ID": "CVE-2019-1003041",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003042", "ID": "CVE-2019-1003042",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003043", "ID": "CVE-2019-1003043",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003044", "ID": "CVE-2019-1003044",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003045", "ID": "CVE-2019-1003045",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003046", "ID": "CVE-2019-1003046",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003047", "ID": "CVE-2019-1003047",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -1,7 +1,8 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-1003048", "ID": "CVE-2019-1003048",
"ASSIGNER": "jenkinsci-cert@googlegroups.com" "ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -101,6 +101,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190327-0005/", "name": "https://security.netapp.com/advisory/ntap-20190327-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190327-0005/" "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:0679",
"url": "https://access.redhat.com/errata/RHSA-2019:0679"
} }
] ]
}, },

View File

@ -71,6 +71,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190327-0005/", "name": "https://security.netapp.com/advisory/ntap-20190327-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190327-0005/" "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:0679",
"url": "https://access.redhat.com/errata/RHSA-2019:0679"
} }
] ]
}, },

View File

@ -71,6 +71,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190327-0005/", "name": "https://security.netapp.com/advisory/ntap-20190327-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190327-0005/" "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:0679",
"url": "https://access.redhat.com/errata/RHSA-2019:0679"
} }
] ]
}, },

View File

@ -71,6 +71,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190327-0005/", "name": "https://security.netapp.com/advisory/ntap-20190327-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190327-0005/" "url": "https://security.netapp.com/advisory/ntap-20190327-0005/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:0679",
"url": "https://access.redhat.com/errata/RHSA-2019:0679"
} }
] ]
}, },

View File

@ -11,7 +11,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Command injection in Nagios XI before 5.5.11 allows an authenticated attacker to execute arbitrary remote commands via a new autodiscovery job." "value": "Command injection in Nagios XI before 5.5.11 allows an authenticated users to execute arbitrary remote commands via a new autodiscovery job."
} }
] ]
}, },
@ -44,6 +44,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://www.nagios.com/products/security/", "name": "https://www.nagios.com/products/security/",
"url": "https://www.nagios.com/products/security/" "url": "https://www.nagios.com/products/security/"
},
{
"refsource": "CONFIRM",
"name": "https://www.nagios.com/downloads/nagios-xi/change-log/",
"url": "https://www.nagios.com/downloads/nagios-xi/change-log/"
} }
] ]
}, },

View File

@ -2,7 +2,7 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9165", "ID": "CVE-2019-9165",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +11,56 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SQL injection vulnerability in Nagios XI before 5.5.11 allows attackers to execute arbitrary SQL commands via the API when using fusekeys and malicious user id."
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.nagios.com/products/security/",
"url": "https://www.nagios.com/products/security/"
},
{
"refsource": "CONFIRM",
"name": "https://www.nagios.com/downloads/nagios-xi/change-log/",
"url": "https://www.nagios.com/downloads/nagios-xi/change-log/"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9202", "ID": "CVE-2019-9202",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +11,51 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Nagios IM (component of Nagios XI) before 2.2.7 allows authenticated users to execute arbitrary code via API key issues."
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.nagios.com/products/security/",
"url": "https://www.nagios.com/products/security/"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9203", "ID": "CVE-2019-9203",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +11,51 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Authorization bypass in Nagios IM (component of Nagios XI) before 2.2.7 allows closing incidents in IM via the API."
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.nagios.com/products/security/",
"url": "https://www.nagios.com/products/security/"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9204", "ID": "CVE-2019-9204",
"STATE": "RESERVED" "STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +11,51 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "SQL injection vulnerability in Nagios IM (component of Nagios XI) before 2.2.7 allows attackers to execute arbitrary SQL commands."
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.nagios.com/products/security/",
"url": "https://www.nagios.com/products/security/"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.rapid7.com/db/modules/exploit/multi/http/cmsms_showtime2_rce", "name": "http://www.rapid7.com/db/modules/exploit/multi/http/cmsms_showtime2_rce",
"url": "http://www.rapid7.com/db/modules/exploit/multi/http/cmsms_showtime2_rce" "url": "http://www.rapid7.com/db/modules/exploit/multi/http/cmsms_showtime2_rce"
},
{
"refsource": "EXPLOIT-DB",
"name": "46627",
"url": "https://www.exploit-db.com/exploits/46627/"
} }
] ]
} }