mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d4d6371d9a
commit
88bcf3e6ea
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@suse.de",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"DATE_PUBLIC": "2020-01-27T00:00:00.000Z",
|
||||
"ID": "CVE-2017-14806",
|
||||
"STATE": "PUBLIC",
|
||||
@ -44,7 +44,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-common version 1.3.17-56.6.3 and prior versions."
|
||||
"value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security@suse.de",
|
||||
"ASSIGNER": "security@suse.com",
|
||||
"DATE_PUBLIC": "2020-01-27T00:00:00.000Z",
|
||||
"ID": "CVE-2017-14807",
|
||||
"STATE": "PUBLIC",
|
||||
@ -44,7 +44,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-ui-server version 1.3.17-56.6.3 and prior versions."
|
||||
"value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data. This issue affects: SUSE Studio onsite susestudio-ui-server version 1.3.17-56.6.3 and prior versions."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -346,6 +346,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]",
|
||||
"url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
|
||||
"url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -253,6 +253,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]",
|
||||
"url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
|
||||
"url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://f-revocrm.jp/2019/12/9393"
|
||||
"url": "https://f-revocrm.jp/2019/12/9393",
|
||||
"refsource": "MISC",
|
||||
"name": "https://f-revocrm.jp/2019/12/9393"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN97325754/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN97325754/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN97325754/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6036",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
|
||||
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN66435380/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN66435380/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5520",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
|
||||
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN66435380/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN66435380/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5521",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
|
||||
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN66435380/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN66435380/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2020-5522",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
Loading…
x
Reference in New Issue
Block a user