mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
- Synchronized data.
This commit is contained in:
parent
f17d95cf20
commit
7fe176bef4
@ -2,7 +2,30 @@
|
|||||||
"CVE_data_meta" : {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
"ID" : "CVE-2018-18692",
|
"ID" : "CVE-2018-18692",
|
||||||
"STATE" : "RESERVED"
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type" : "CVE",
|
"data_type" : "CVE",
|
||||||
@ -11,7 +34,28 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value" : "A reflected Cross-Site scripting (XSS) vulnerability in SEMCO Semcosoft 5.3 allows remote attackers to inject arbitrary web scripts or HTML via the username parameter to the Login Form."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://atomic111.github.io/article/semcosoft-cross-site-scripting",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://atomic111.github.io/article/semcosoft-cross-site-scripting"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"name" : "http://packetstormsecurity.com/files/150600/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-XSS.html",
|
"name" : "http://packetstormsecurity.com/files/150600/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-XSS.html",
|
||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "http://packetstormsecurity.com/files/150600/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-XSS.html"
|
"url" : "http://packetstormsecurity.com/files/150600/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-XSS.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name" : "106333",
|
||||||
|
"refsource" : "BID",
|
||||||
|
"url" : "http://www.securityfocus.com/bid/106333"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"name" : "http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html",
|
"name" : "http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html",
|
||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html"
|
"url" : "http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name" : "106333",
|
||||||
|
"refsource" : "BID",
|
||||||
|
"url" : "http://www.securityfocus.com/bid/106333"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -78,6 +78,11 @@
|
|||||||
"refsource" : "CONFIRM",
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10794133"
|
"url" : "https://www.ibm.com/support/docview.wss?uid=ibm10794133"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name" : "107122",
|
||||||
|
"refsource" : "BID",
|
||||||
|
"url" : "http://www.securityfocus.com/bid/107122"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name" : "ibm-rpa-cve20182006-dir-traversal(155008)",
|
"name" : "ibm-rpa-cve20182006-dir-traversal(155008)",
|
||||||
"refsource" : "XF",
|
"refsource" : "XF",
|
||||||
|
@ -132,6 +132,11 @@
|
|||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/"
|
"url" : "https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://www.synology.com/security/advisory/Synology_SA_19_06",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
|
"url" : "https://www.synology.com/security/advisory/Synology_SA_19_06"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc",
|
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc",
|
||||||
"refsource" : "CISCO",
|
"refsource" : "CISCO",
|
||||||
|
@ -65,6 +65,11 @@
|
|||||||
"refsource" : "CONFIRM",
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.drupal.org/sa-core-2019-003"
|
"url" : "https://www.drupal.org/sa-core-2019-003"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://www.synology.com/security/advisory/Synology_SA_19_09",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
|
"url" : "https://www.synology.com/security/advisory/Synology_SA_19_09"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name" : "107106",
|
"name" : "107106",
|
||||||
"refsource" : "BID",
|
"refsource" : "BID",
|
||||||
|
@ -56,6 +56,11 @@
|
|||||||
"name" : "https://support.citrix.com/article/CTX240139",
|
"name" : "https://support.citrix.com/article/CTX240139",
|
||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "https://support.citrix.com/article/CTX240139"
|
"url" : "https://support.citrix.com/article/CTX240139"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name" : "106783",
|
||||||
|
"refsource" : "BID",
|
||||||
|
"url" : "http://www.securityfocus.com/bid/106783"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -72,6 +72,11 @@
|
|||||||
"refsource" : "CONFIRM",
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://www.scribd.com/document/398350818/WiFi-CVE-2019-6496-Marvell-s-Statement"
|
"url" : "https://www.scribd.com/document/398350818/WiFi-CVE-2019-6496-Marvell-s-Statement"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://www.synology.com/security/advisory/Synology_SA_19_07",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
|
"url" : "https://www.synology.com/security/advisory/Synology_SA_19_07"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name" : "VU#730261",
|
"name" : "VU#730261",
|
||||||
"refsource" : "CERT-VN",
|
"refsource" : "CERT-VN",
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"name" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html",
|
"name" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html",
|
||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html"
|
"url" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name" : "107120",
|
||||||
|
"refsource" : "BID",
|
||||||
|
"url" : "http://www.securityfocus.com/bid/107120"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user