"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-24 16:00:48 +00:00
parent 1646751791
commit 7727dc44e9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
14 changed files with 286 additions and 259 deletions

View File

@ -72,6 +72,11 @@
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152617/VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/152617/VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html"
} }
] ]
} }

View File

@ -77,6 +77,11 @@
"name": "https://www.win-rar.com/whatsnew.html", "name": "https://www.win-rar.com/whatsnew.html",
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.win-rar.com/whatsnew.html" "url": "https://www.win-rar.com/whatsnew.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html"
} }
] ]
} }

View File

@ -61,6 +61,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "https://www.pluginvulnerabilities.com/2019/04/05/arbitrary-file-upload-vulnerability-in-supportcandy/", "name": "https://www.pluginvulnerabilities.com/2019/04/05/arbitrary-file-upload-vulnerability-in-supportcandy/",
"url": "https://www.pluginvulnerabilities.com/2019/04/05/arbitrary-file-upload-vulnerability-in-supportcandy/" "url": "https://www.pluginvulnerabilities.com/2019/04/05/arbitrary-file-upload-vulnerability-in-supportcandy/"
},
{
"refsource": "MISC",
"name": "https://cert.kalasag.com.ph/news/research/vulnerable-wordpress-plugin-lets-you-take-over-websites/",
"url": "https://cert.kalasag.com.ph/news/research/vulnerable-wordpress-plugin-lets-you-take-over-websites/"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1695783", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1695783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695783" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695783"
},
{
"refsource": "UBUNTU",
"name": "USN-3954-1",
"url": "https://usn.ubuntu.com/3954-1/"
} }
] ]
} }

View File

@ -76,6 +76,11 @@
"refsource": "CONFIRM", "refsource": "CONFIRM",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1695748", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1695748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695748" "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695748"
},
{
"refsource": "UBUNTU",
"name": "USN-3954-1",
"url": "https://usn.ubuntu.com/3954-1/"
} }
] ]
} }

View File

@ -57,11 +57,6 @@
"name": "46691", "name": "46691",
"url": "https://www.exploit-db.com/exploits/46691/" "url": "https://www.exploit-db.com/exploits/46691/"
}, },
{
"url": "https://www.exploit-db.com/exploits/46691",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/46691"
},
{ {
"url": "http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html", "url": "http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html",
"refsource": "MISC", "refsource": "MISC",

View File

@ -61,6 +61,11 @@
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC", "refsource": "MISC",
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"refsource": "EXPLOIT-DB",
"name": "46747",
"url": "https://www.exploit-db.com/exploits/46747/"
} }
] ]
} }

View File

@ -83,11 +83,6 @@
"refsource": "MISC", "refsource": "MISC",
"url": "https://www.dell.com/support/article/us/en/19/sln316857/dsa-2019-051-dell-supportassist-client-multiple-vulnerabilities?lang=en", "url": "https://www.dell.com/support/article/us/en/19/sln316857/dsa-2019-051-dell-supportassist-client-multiple-vulnerabilities?lang=en",
"name": "https://www.dell.com/support/article/us/en/19/sln316857/dsa-2019-051-dell-supportassist-client-multiple-vulnerabilities?lang=en" "name": "https://www.dell.com/support/article/us/en/19/sln316857/dsa-2019-051-dell-supportassist-client-multiple-vulnerabilities?lang=en"
},
{
"refsource": "BID",
"name": "108020",
"url": "http://www.securityfocus.com/bid/108020"
} }
] ]
}, },

View File

@ -3,7 +3,7 @@
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secure@dell.com", "ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2019-04-08T00:00:00.000Z", "DATE_PUBLIC": "2019-04-08T00:00:00.000Z",
"ID": "CVE-2019-3786", "ID": "CVE-2019-3786",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -3,7 +3,7 @@
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secure@dell.com", "ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2019-04-16T00:00:00.000Z", "DATE_PUBLIC": "2019-04-16T00:00:00.000Z",
"ID": "CVE-2019-3789", "ID": "CVE-2019-3789",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -3,7 +3,7 @@
"data_format": "MITRE", "data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "secure@dell.com", "ASSIGNER": "security_alert@emc.com",
"DATE_PUBLIC": "2019-04-16T15:45:27.000Z", "DATE_PUBLIC": "2019-04-16T15:45:27.000Z",
"ID": "CVE-2019-3793", "ID": "CVE-2019-3793",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-3868", "ID": "CVE-2019-3868",
"ASSIGNER": "lpardo@redhat.com" "ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -54,7 +55,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack users browser session." "value": "Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user\u2019s browser session."
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-3882", "ID": "CVE-2019-3882",
"ASSIGNER": "psampaio@redhat.com" "ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {

View File

@ -44,6 +44,11 @@
}, },
"references": { "references": {
"reference_data": [ "reference_data": [
{
"refsource": "BID",
"name": "107830",
"url": "http://www.securityfocus.com/bid/107830"
},
{ {
"refsource": "MISC", "refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-324467.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-324467.pdf",
@ -55,7 +60,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in Spectrum Power\u2122 4 (with Web Office Portal). An attacker with network access to the web server on port 80/TCP or 443/TCP could execute system commands with administrative privileges. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises confidentiality, integrity or availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known." "value": "A vulnerability has been identified in Spectrum Power 4 (with Web Office Portal). An attacker with network access to the web server on port 80/TCP or 443/TCP could execute system commands with administrative privileges. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises confidentiality, integrity or availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known."
} }
] ]
} }