mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 05:58:08 +00:00
- Synchronized data.
This commit is contained in:
parent
955197390f
commit
45e3676a32
@ -1,76 +1,77 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta" : {
|
||||||
"data_format": "MITRE",
|
"ASSIGNER" : "psampaio@redhat.com",
|
||||||
"data_version": "4.0",
|
"ID" : "CVE-2019-3806",
|
||||||
"CVE_data_meta": {
|
"STATE" : "PUBLIC"
|
||||||
"ID": "CVE-2019-3806",
|
},
|
||||||
"ASSIGNER": "psampaio@redhat.com"
|
"affects" : {
|
||||||
},
|
"vendor" : {
|
||||||
"affects": {
|
"vendor_data" : [
|
||||||
"vendor": {
|
{
|
||||||
"vendor_data": [
|
"product" : {
|
||||||
{
|
"product_data" : [
|
||||||
"vendor_name": "Power DNS",
|
{
|
||||||
"product": {
|
"product_name" : "pdns-recursor",
|
||||||
"product_data": [
|
"version" : {
|
||||||
{
|
"version_data" : [
|
||||||
"product_name": "pdns-recursor",
|
{
|
||||||
"version": {
|
"version_value" : "versions after 4.1.3 before 4.1.9"
|
||||||
"version_data": [
|
}
|
||||||
{
|
]
|
||||||
"version_value": "versions after 4.1.3 before 4.1.9"
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
}
|
"vendor_name" : "Power DNS"
|
||||||
]
|
}
|
||||||
}
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact" : {
|
||||||
|
"cvss" : [
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"vectorString" : "5.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H",
|
||||||
|
"version" : "3.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "CWE-358"
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
]
|
||||||
"problemtype": {
|
},
|
||||||
"problemtype_data": [
|
"references" : {
|
||||||
{
|
"reference_data" : [
|
||||||
"description": [
|
{
|
||||||
{
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806",
|
||||||
"lang": "eng",
|
"refsource" : "CONFIRM",
|
||||||
"value": "CWE-358"
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806"
|
||||||
}
|
},
|
||||||
]
|
{
|
||||||
}
|
"name" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html",
|
||||||
]
|
"refsource" : "CONFIRM",
|
||||||
},
|
"url" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html"
|
||||||
"references": {
|
}
|
||||||
"reference_data": [
|
]
|
||||||
{
|
}
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806",
|
|
||||||
"refsource": "CONFIRM"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html",
|
|
||||||
"name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html",
|
|
||||||
"refsource": "CONFIRM"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua."
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "5.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
@ -1,76 +1,77 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta" : {
|
||||||
"data_format": "MITRE",
|
"ASSIGNER" : "psampaio@redhat.com",
|
||||||
"data_version": "4.0",
|
"ID" : "CVE-2019-3807",
|
||||||
"CVE_data_meta": {
|
"STATE" : "PUBLIC"
|
||||||
"ID": "CVE-2019-3807",
|
},
|
||||||
"ASSIGNER": "psampaio@redhat.com"
|
"affects" : {
|
||||||
},
|
"vendor" : {
|
||||||
"affects": {
|
"vendor_data" : [
|
||||||
"vendor": {
|
{
|
||||||
"vendor_data": [
|
"product" : {
|
||||||
{
|
"product_data" : [
|
||||||
"vendor_name": "Power DNS",
|
{
|
||||||
"product": {
|
"product_name" : "pdns-recursor",
|
||||||
"product_data": [
|
"version" : {
|
||||||
{
|
"version_data" : [
|
||||||
"product_name": "pdns-recursor",
|
{
|
||||||
"version": {
|
"version_value" : "versions 4.1.x before 4.1.9"
|
||||||
"version_data": [
|
}
|
||||||
{
|
]
|
||||||
"version_value": "versions 4.1.x before 4.1.9"
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
}
|
"vendor_name" : "Power DNS"
|
||||||
]
|
}
|
||||||
}
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact" : {
|
||||||
|
"cvss" : [
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"vectorString" : "3.7/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||||
|
"version" : "3.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "CWE-345"
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
]
|
||||||
"problemtype": {
|
},
|
||||||
"problemtype_data": [
|
"references" : {
|
||||||
{
|
"reference_data" : [
|
||||||
"description": [
|
{
|
||||||
{
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807",
|
||||||
"lang": "eng",
|
"refsource" : "CONFIRM",
|
||||||
"value": "CWE-345"
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807"
|
||||||
}
|
},
|
||||||
]
|
{
|
||||||
}
|
"name" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html",
|
||||||
]
|
"refsource" : "CONFIRM",
|
||||||
},
|
"url" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html"
|
||||||
"references": {
|
}
|
||||||
"reference_data": [
|
]
|
||||||
{
|
}
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807",
|
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807",
|
|
||||||
"refsource": "CONFIRM"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html",
|
|
||||||
"name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html",
|
|
||||||
"refsource": "CONFIRM"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation."
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "3.7/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
18
2019/7xxx/CVE-2019-7161.json
Normal file
18
2019/7xxx/CVE-2019-7161.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-7161",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/7xxx/CVE-2019-7162.json
Normal file
18
2019/7xxx/CVE-2019-7162.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-7162",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/7xxx/CVE-2019-7163.json
Normal file
18
2019/7xxx/CVE-2019-7163.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-7163",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/7xxx/CVE-2019-7164.json
Normal file
18
2019/7xxx/CVE-2019-7164.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-7164",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/7xxx/CVE-2019-7165.json
Normal file
18
2019/7xxx/CVE-2019-7165.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-7165",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user