mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 18:53:08 +00:00
Updated CVEs
This commit is contained in:
parent
dac2977d76
commit
48d5c94acf
@ -47,6 +47,26 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14857",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14857",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zmartzone/mod_auth_openidc/commit/5c15dfb08106c2451c2c44ce7ace6813c216ba75",
|
||||
"name": "https://github.com/zmartzone/mod_auth_openidc/commit/5c15dfb08106c2451c2c44ce7ace6813c216ba75",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zmartzone/mod_auth_openidc/commit/ce37080c6aea30aabae8b4a9b4eea7808445cc8e",
|
||||
"name": "https://github.com/zmartzone/mod_auth_openidc/commit/ce37080c6aea30aabae8b4a9b4eea7808445cc8e",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zmartzone/mod_auth_openidc/pull/451",
|
||||
"name": "https://github.com/zmartzone/mod_auth_openidc/pull/451",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"url": "https://groups.google.com/forum/#!topic/mod_auth_openidc/boy1Ba3Gdk4",
|
||||
"name": "https://groups.google.com/forum/#!topic/mod_auth_openidc/boy1Ba3Gdk4",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
@ -55,7 +75,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "mod_auth_openidc before version 2.4.0.1 is vulnerable to a None"
|
||||
"value": "A flaw was found in mod_auth_openidc before version 2.4.0.1. An open redirect issue exists in URLs with trailing slashes similar to CVE-2019-3877 in mod_auth_mellon."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -69,4 +89,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -55,7 +55,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An attacker with low privilege could retrieve usernames and passwords credentials from the new RHSM saved in plain text into the database at '/api/v2/config' when applying the Ansible Tower license."
|
||||
"value": "A vulnerability was found in Ansible Tower before 3.6.1 where an attacker with low privilege could retrieve usernames and passwords credentials from the new RHSM saved in plain text into the database at '/api/v2/config' when applying the Ansible Tower license."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -69,4 +69,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user