mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
- Synchronized data.
This commit is contained in:
parent
e655161b8c
commit
4e6a355fa5
@ -1,77 +1,82 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta" : {
|
||||||
"data_format": "MITRE",
|
"ASSIGNER" : "psampaio@redhat.com",
|
||||||
"data_version": "4.0",
|
"ID" : "CVE-2018-16886",
|
||||||
"CVE_data_meta": {
|
"STATE" : "PUBLIC"
|
||||||
"ID": "CVE-2018-16886",
|
},
|
||||||
"ASSIGNER": "psampaio@redhat.com"
|
"affects" : {
|
||||||
},
|
"vendor" : {
|
||||||
"affects": {
|
"vendor_data" : [
|
||||||
"vendor": {
|
{
|
||||||
"vendor_data": [
|
"product" : {
|
||||||
{
|
"product_data" : [
|
||||||
"vendor_name": "The etcd Project",
|
{
|
||||||
"product": {
|
"product_name" : "etcd:",
|
||||||
"product_data": [
|
"version" : {
|
||||||
{
|
"version_data" : [
|
||||||
"product_name": "etcd:",
|
{
|
||||||
"version": {
|
"version_value" : "versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11"
|
||||||
"version_data": [
|
}
|
||||||
{
|
]
|
||||||
"version_value": "versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11"
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
}
|
"vendor_name" : "The etcd Project"
|
||||||
]
|
}
|
||||||
}
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact" : {
|
||||||
|
"cvss" : [
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"vectorString" : "6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"version" : "3.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "CWE-287"
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
]
|
||||||
"problemtype": {
|
},
|
||||||
"problemtype_data": [
|
"references" : {
|
||||||
{
|
"reference_data" : [
|
||||||
"description": [
|
{
|
||||||
{
|
"name" : "https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication",
|
||||||
"lang": "eng",
|
"refsource" : "MISC",
|
||||||
"value": "CWE-287"
|
"url" : "https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication"
|
||||||
}
|
},
|
||||||
]
|
{
|
||||||
}
|
"name" : "https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication",
|
||||||
]
|
"refsource" : "MISC",
|
||||||
},
|
"url" : "https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication"
|
||||||
"references": {
|
},
|
||||||
"reference_data": [
|
{
|
||||||
{
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886",
|
||||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886",
|
"refsource" : "CONFIRM",
|
||||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886",
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886"
|
||||||
"refsource": "CONFIRM"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description": {
|
|
||||||
"description_data": [
|
|
||||||
{
|
|
||||||
"lang": "eng",
|
|
||||||
"value": "etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway."
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"impact": {
|
|
||||||
"cvss": [
|
|
||||||
[
|
|
||||||
{
|
|
||||||
"vectorString": "6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
18
2019/6xxx/CVE-2019-6272.json
Normal file
18
2019/6xxx/CVE-2019-6272.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-6272",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/6xxx/CVE-2019-6273.json
Normal file
18
2019/6xxx/CVE-2019-6273.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-6273",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/6xxx/CVE-2019-6274.json
Normal file
18
2019/6xxx/CVE-2019-6274.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-6274",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/6xxx/CVE-2019-6275.json
Normal file
18
2019/6xxx/CVE-2019-6275.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-6275",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/6xxx/CVE-2019-6276.json
Normal file
18
2019/6xxx/CVE-2019-6276.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-6276",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/6xxx/CVE-2019-6277.json
Normal file
18
2019/6xxx/CVE-2019-6277.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-6277",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
62
2019/6xxx/CVE-2019-6278.json
Normal file
62
2019/6xxx/CVE-2019-6278.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-6278",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "XSS exists in JPress v1.0.4 via Markdown input, or Markdown input with the code input option."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://gitee.com/fuhai/jpress/issues/IQUXE",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://gitee.com/fuhai/jpress/issues/IQUXE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user