- Synchronized data.

This commit is contained in:
CVE Team 2018-06-25 12:05:32 -04:00
parent 6e40922ea5
commit 6a94e195e9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
6 changed files with 286 additions and 60 deletions

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2016-10725",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -1 +1,64 @@
{"data_version": "4.0","references": {"reference_data": [{"url": "https://randorisec.fr/logicaldoc-from-guest-to-root/"}]},"description": {"description_data": [{"lang": "eng","value": "LogicalDoc CommunityEdition 7.5.3 and prior is vulnerable to XXE when indexing XML documents."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "Logicaldoc Community Edition 7.5.3"}]},"product_name": "LogicalDoc"}]},"vendor_name": "LogicalDoc"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2017-05-06T20:43:28.271797","STATE": "PUBLIC", "ID": "CVE-2017-1000021","ASSIGNER": "kurt@seifried.org","REQUESTER": "montel.florent@gmail.com"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "XML External Entity (XXE)"}]}]}}
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2017-05-06T20:43:28.271797",
"ID" : "CVE-2017-1000021",
"REQUESTER" : "montel.florent@gmail.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "LogicalDoc",
"version" : {
"version_data" : [
{
"version_value" : "Logicaldoc Community Edition 7.5.3"
}
]
}
}
]
},
"vendor_name" : "LogicalDoc"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "LogicalDoc Community Edition 7.5.3 and prior is vulnerable to XXE when indexing XML documents."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "XML External Entity (XXE)"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://randorisec.fr/logicaldoc-from-guest-to-root/",
"refsource" : "MISC",
"url" : "https://randorisec.fr/logicaldoc-from-guest-to-root/"
}
]
}
}

View File

@ -1 +1,64 @@
{"data_version": "4.0","references": {"reference_data": [{"url": "https://randorisec.fr/logicaldoc-from-guest-to-root/"}]},"description": {"description_data": [{"lang": "eng","value": "LogicalDoc CommunityEdition 7.5.3 and prior contain an Incorrect access control which could leave to privilege escalation"}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "Logicaldoc Community Edition 7.5.3"}]},"product_name": "LogicalDoc"}]},"vendor_name": "LogicalDoc"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2017-05-06T20:43:28.272586","STATE": "PUBLIC", "ID": "CVE-2017-1000022","ASSIGNER": "kurt@seifried.org","REQUESTER": "montel.florent@gmail.com"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "Incorrect Access Control"}]}]}}
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2017-05-06T20:43:28.272586",
"ID" : "CVE-2017-1000022",
"REQUESTER" : "montel.florent@gmail.com",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "LogicalDoc",
"version" : {
"version_data" : [
{
"version_value" : "Logicaldoc Community Edition 7.5.3"
}
]
}
}
]
},
"vendor_name" : "LogicalDoc"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "LogicalDoc Community Edition 7.5.3 and prior contain an Incorrect access control which could leave to privilege escalation."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Incorrect Access Control"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://randorisec.fr/logicaldoc-from-guest-to-root/",
"refsource" : "MISC",
"url" : "https://randorisec.fr/logicaldoc-from-guest-to-root/"
}
]
}
}

View File

@ -1,21 +1,11 @@
{
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://randorisec.fr/logicaldoc-from-guest-to-root/"
}
]
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org",
"DATE_ASSIGNED" : "2017-05-06T20:43:28.273402",
"ID" : "CVE-2017-1000023",
"REQUESTER" : "montel.florent@gmail.com",
"STATE" : "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "LogicalDoc CommunityEdition 7.5.3 and prior is vulnerable to an XSS when using preview on HTML document"
}
]
},
"data_type": "CVE",
"affects" : {
"vendor" : {
"vendor_data" : [
@ -23,14 +13,14 @@
"product" : {
"product_data" : [
{
"product_name" : "LogicalDoc",
"version" : {
"version_data" : [
{
"version_value" : "Logicaldoc Community Edition 7.5.3"
}
]
},
"product_name": "LogicalDoc"
}
}
]
},
@ -39,14 +29,17 @@
]
}
},
"CVE_data_meta": {
"DATE_ASSIGNED": "2017-05-06T20:43:28.273402",
"STATE": "PUBLIC",
"ID": "CVE-2017-1000023",
"ASSIGNER": "kurt@seifried.org",
"REQUESTER": "montel.florent@gmail.com"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "LogicalDoc Community Edition 7.5.3 and prior is vulnerable to an XSS when using preview on HTML document."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
@ -58,5 +51,14 @@
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://randorisec.fr/logicaldoc-from-guest-to-root/",
"refsource" : "MISC",
"url" : "https://randorisec.fr/logicaldoc-from-guest-to-root/"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-12734",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-12735",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "SAJ Solar Inverter allows remote attackers to obtain potentially sensitive information via a direct request for the inverter_info.htm or english_main.htm URI."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://www.seebug.org/vuldb/ssvid-97369",
"refsource" : "MISC",
"url" : "https://www.seebug.org/vuldb/ssvid-97369"
}
]
}
}