mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
973a038587
commit
4b24802a37
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2011-10-13T00:00:00.000Z",
|
"DATE_PUBLIC": "2011-10-13T00:00:00.000Z",
|
||||||
"ID": "CVE-2011-3178",
|
"ID": "CVE-2011-3178",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2011-12-07T00:00:00.000Z",
|
"DATE_PUBLIC": "2011-12-07T00:00:00.000Z",
|
||||||
"ID": "CVE-2011-4182",
|
"ID": "CVE-2011-4182",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2014-8709",
|
"ID": "CVE-2014-8709",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2015-0794",
|
"ID": "CVE-2015-0794",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2016-1595",
|
"ID": "CVE-2016-1595",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2016-1596",
|
"ID": "CVE-2016-1596",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2016-1600",
|
"ID": "CVE-2016-1600",
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2016-3185",
|
"ID": "CVE-2016-3185",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2016-5748",
|
"ID": "CVE-2016-5748",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2016-5759",
|
"ID": "CVE-2016-5759",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2016-8666",
|
"ID": "CVE-2016-8666",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2016-9168",
|
"ID": "CVE-2016-9168",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2017-14353",
|
"ID": "CVE-2017-14353",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2017-14354",
|
"ID": "CVE-2017-14354",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2017-5183",
|
"ID": "CVE-2017-5183",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2017-5191",
|
"ID": "CVE-2017-5191",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2017-08-19T00:00:00",
|
"DATE_PUBLIC": "2017-08-19T00:00:00",
|
||||||
"ID": "CVE-2017-7422",
|
"ID": "CVE-2017-7422",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2017-06-01T00:00:00.000Z",
|
"DATE_PUBLIC": "2017-06-01T00:00:00.000Z",
|
||||||
"ID": "CVE-2017-7437",
|
"ID": "CVE-2017-7437",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2017-06-01T00:00:00.000Z",
|
"DATE_PUBLIC": "2017-06-01T00:00:00.000Z",
|
||||||
"ID": "CVE-2017-7438",
|
"ID": "CVE-2017-7438",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2017-08-03T00:00:00.000Z",
|
"DATE_PUBLIC": "2017-08-03T00:00:00.000Z",
|
||||||
"ID": "CVE-2017-9269",
|
"ID": "CVE-2017-9269",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-06-28T16:00:00.000Z",
|
"DATE_PUBLIC": "2018-06-28T16:00:00.000Z",
|
||||||
"ID": "CVE-2018-12464",
|
"ID": "CVE-2018-12464",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2018-17950",
|
"ID": "CVE-2018-17950",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-12-23T00:00:00.000Z",
|
"DATE_PUBLIC": "2018-12-23T00:00:00.000Z",
|
||||||
"ID": "CVE-2018-17957",
|
"ID": "CVE-2018-17957",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-10-19T15:30:00.000Z",
|
"DATE_PUBLIC": "2018-10-19T15:30:00.000Z",
|
||||||
"ID": "CVE-2018-18589",
|
"ID": "CVE-2018-18589",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2018-1347",
|
"ID": "CVE-2018-1347",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
"TITLE": "NetIQ iManager, versions prior to 3.1, reflected XSS issue "
|
"TITLE": "NetIQ iManager, versions prior to 3.1, reflected XSS issue "
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-02-01T18:58:00.000Z",
|
"DATE_PUBLIC": "2018-02-01T18:58:00.000Z",
|
||||||
"ID": "CVE-2018-6486",
|
"ID": "CVE-2018-6486",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-02-21T22:00:00.000Z",
|
"DATE_PUBLIC": "2018-02-21T22:00:00.000Z",
|
||||||
"ID": "CVE-2018-6488",
|
"ID": "CVE-2018-6488",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2018-6491",
|
"ID": "CVE-2018-6491",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
"TITLE": "MFSBGN03803 rev.1 - UCMDB, Installation File Access Control Privilege Escalation Vulnerability"
|
"TITLE": "MFSBGN03803 rev.1 - UCMDB, Installation File Access Control Privilege Escalation Vulnerability"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-05-09T19:01:00.000Z",
|
"DATE_PUBLIC": "2018-05-09T19:01:00.000Z",
|
||||||
"ID": "CVE-2018-6492",
|
"ID": "CVE-2018-6492",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-05-09T19:01:00.000Z",
|
"DATE_PUBLIC": "2018-05-09T19:01:00.000Z",
|
||||||
"ID": "CVE-2018-6493",
|
"ID": "CVE-2018-6493",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-09-19T16:00:00.000Z",
|
"DATE_PUBLIC": "2018-09-19T16:00:00.000Z",
|
||||||
"ID": "CVE-2018-6505",
|
"ID": "CVE-2018-6505",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-08-30T00:00:00.000Z",
|
"DATE_PUBLIC": "2018-08-30T00:00:00.000Z",
|
||||||
"ID": "CVE-2018-7685",
|
"ID": "CVE-2018-7685",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"DATE_PUBLIC": "2018-06-06T00:00:00.000Z",
|
"DATE_PUBLIC": "2018-06-06T00:00:00.000Z",
|
||||||
"ID": "CVE-2018-7688",
|
"ID": "CVE-2018-7688",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-11653",
|
"ID": "CVE-2019-11653",
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-11655",
|
"ID": "CVE-2019-11655",
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-11663",
|
"ID": "CVE-2019-11663",
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-11667",
|
"ID": "CVE-2019-11667",
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
|
72
2019/16xxx/CVE-2019-16954.json
Normal file
72
2019/16xxx/CVE-2019-16954.json
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"ID": "CVE-2019-16954",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "SolarWinds Web Help Desk 12.7.0 allows HTML injection via a Comment in a Help Request ticket."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://support.solarwinds.com/SuccessCenter/s/",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://support.solarwinds.com/SuccessCenter/s/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.solarwinds.com/free-tools/free-help-desk-software",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.solarwinds.com/free-tools/free-help-desk-software"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/",
|
||||||
|
"url": "https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
67
2019/16xxx/CVE-2019-16962.json
Normal file
67
2019/16xxx/CVE-2019-16962.json
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"ID": "CVE-2019-16962",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Zoho ManageEngine Desktop Central 10.0.430 allows HTML injection via a modified Report Name in a New Custom Report."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://www.manageengine.com/products/desktop-central/download.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.manageengine.com/products/desktop-central/download.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/",
|
||||||
|
"url": "https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/18xxx/CVE-2019-18946.json
Normal file
18
2019/18xxx/CVE-2019-18946.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2019-18946",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
@ -1,6 +1,6 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"ID": "CVE-2019-3475",
|
"ID": "CVE-2019-3475",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
"TITLE": "Local privilege escalation in Filr famtd"
|
"TITLE": "Local privilege escalation in Filr famtd"
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2019-3493",
|
"ID": "CVE-2019-3493",
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2020-11861",
|
"ID": "CVE-2020-11861",
|
||||||
"ASSIGNER": "security@suse.com",
|
"ASSIGNER": "security@microfocus.com",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
|
@ -5,13 +5,13 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2020-5102",
|
"ID": "CVE-2020-5102",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -5,13 +5,13 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2020-5103",
|
"ID": "CVE-2020-5103",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -5,13 +5,13 @@
|
|||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2020-5104",
|
"ID": "CVE-2020-5104",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"STATE": "REJECT"
|
||||||
},
|
},
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -35,7 +35,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo.\n\nIn CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability.\n\nWhen processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS).\nIf an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time.\n\nThis is fixed in version 2.5.1. See Referenced GitHub advisory for more information."
|
"value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
18
2021/3xxx/CVE-2021-3028.json
Normal file
18
2021/3xxx/CVE-2021-3028.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2021-3028",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user