"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-02-11 17:01:09 +00:00
parent 6c98714c71
commit 62dc312a90
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 147 additions and 4 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-1359",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,63 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An Authentication Bypass Vulnerability exists in DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, 5.1, and 6.0 via the skipSessionCheck parameter to the UMA interface (/appliance/), which could let a remote malicious user obtain access to the root account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.securityfocus.com/bid/57445",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/57445"
},
{
"url": "http://www.exploit-db.com/exploits/24204",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24204"
},
{
"url": "http://www.exploit-db.com/exploits/24322",
"refsource": "MISC",
"name": "http://www.exploit-db.com/exploits/24322"
},
{
"url": "http://www.securitytracker.com/id/1028007",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1028007"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81367",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81367"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/author/7547/",
"url": "https://packetstormsecurity.com/files/author/7547/"
},
{
"refsource": "MISC",
"name": "https://fortiguard.com/encyclopedia/ips/35264/multiple-sonicwall-products-authentication-bypass-vulns",
"url": "https://fortiguard.com/encyclopedia/ips/35264/multiple-sonicwall-products-authentication-bypass-vulns"
},
{
"refsource": "MISC",
"name": "https://seclists.org/fulldisclosure/2013/Jan/125",
"url": "https://seclists.org/fulldisclosure/2013/Jan/125"
}
]
}

View File

@ -2,7 +2,7 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-6447",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +11,56 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Multiple vulnerabilities exist in Juniper Junos J-Web error handling that may lead to cross site scripting (XSS) issues or crash the J-Web service (DoS). This affects Juniper Junos OS 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 13.1 before 13.1R5, 13.2 before 13.2R6, 13.3 before 13.3R4, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, 14.2 before 14.2R1, and 15.1 before 15.1R1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10682",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10682"
},
{
"refsource": "MISC",
"name": "http://www.securitytracker.com/id/1032846",
"url": "http://www.securitytracker.com/id/1032846"
}
]
}

View File

@ -136,6 +136,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200210-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200210-0001/"
},
{
"refsource": "UBUNTU",
"name": "USN-4263-2",
"url": "https://usn.ubuntu.com/4263-2/"
}
]
}

View File

@ -78,6 +78,16 @@
"refsource": "BUGTRAQ",
"name": "20200210 [SECURITY] [DSA 4618-1] libexif security update",
"url": "https://seclists.org/bugtraq/2020/Feb/9"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/libexif/libexif/issues/26",
"url": "https://github.com/libexif/libexif/issues/26"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/libexif/libexif/commit/75aa73267fdb1e0ebfbc00369e7312bac43d0566",
"url": "https://github.com/libexif/libexif/commit/75aa73267fdb1e0ebfbc00369e7312bac43d0566"
}
]
},