"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-06 17:05:48 +00:00
parent 973a038587
commit 4b24802a37
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
48 changed files with 222 additions and 47 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2011-10-13T00:00:00.000Z",
"ID": "CVE-2011-3178",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2011-12-07T00:00:00.000Z",
"ID": "CVE-2011-4182",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2014-8709",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2015-0794",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-1595",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-1596",
"STATE": "PUBLIC"
},

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2016-1600",
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-3185",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-5748",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-5759",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-8666",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-9168",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2017-14353",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2017-14354",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2017-5183",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2017-5191",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-08-19T00:00:00",
"ID": "CVE-2017-7422",
"STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-06-01T00:00:00.000Z",
"ID": "CVE-2017-7437",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-06-01T00:00:00.000Z",
"ID": "CVE-2017-7438",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-08-03T00:00:00.000Z",
"ID": "CVE-2017-9269",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-06-28T16:00:00.000Z",
"ID": "CVE-2018-12464",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2018-17950",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-12-23T00:00:00.000Z",
"ID": "CVE-2018-17957",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-10-19T15:30:00.000Z",
"ID": "CVE-2018-18589",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2018-1347",
"STATE": "PUBLIC",
"TITLE": "NetIQ iManager, versions prior to 3.1, reflected XSS issue "

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-02-01T18:58:00.000Z",
"ID": "CVE-2018-6486",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-02-21T22:00:00.000Z",
"ID": "CVE-2018-6488",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2018-6491",
"STATE": "PUBLIC",
"TITLE": "MFSBGN03803 rev.1 - UCMDB, Installation File Access Control Privilege Escalation Vulnerability"

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-05-09T19:01:00.000Z",
"ID": "CVE-2018-6492",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-05-09T19:01:00.000Z",
"ID": "CVE-2018-6493",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-09-19T16:00:00.000Z",
"ID": "CVE-2018-6505",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-08-30T00:00:00.000Z",
"ID": "CVE-2018-7685",
"STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-06-06T00:00:00.000Z",
"ID": "CVE-2018-7688",
"STATE": "PUBLIC",

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11653",
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11655",
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11663",
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11667",
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16954",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SolarWinds Web Help Desk 12.7.0 allows HTML injection via a Comment in a Help Request ticket."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.solarwinds.com/SuccessCenter/s/",
"refsource": "MISC",
"name": "https://support.solarwinds.com/SuccessCenter/s/"
},
{
"url": "https://www.solarwinds.com/free-tools/free-help-desk-software",
"refsource": "MISC",
"name": "https://www.solarwinds.com/free-tools/free-help-desk-software"
},
{
"refsource": "MISC",
"name": "https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/",
"url": "https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16962",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Zoho ManageEngine Desktop Central 10.0.430 allows HTML injection via a modified Report Name in a New Custom Report."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.manageengine.com/products/desktop-central/download.html",
"refsource": "MISC",
"name": "https://www.manageengine.com/products/desktop-central/download.html"
},
{
"refsource": "MISC",
"name": "https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/",
"url": "https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-18946",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"ID": "CVE-2019-3475",
"STATE": "PUBLIC",
"TITLE": "Local privilege escalation in Filr famtd"

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-3493",
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-11861",
"ASSIGNER": "security@suse.com",
"ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC"
},
"affects": {

View File

@ -5,13 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2020-5102",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none."
}
]
}

View File

@ -5,13 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2020-5103",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none."
}
]
}

View File

@ -5,13 +5,13 @@
"CVE_data_meta": {
"ID": "CVE-2020-5104",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none."
}
]
}

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo.\n\nIn CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability.\n\nWhen processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS).\nIf an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time.\n\nThis is fixed in version 2.5.1. See Referenced GitHub advisory for more information."
"value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information."
}
]
},

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-3028",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}