"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-01-27 10:01:17 +00:00
parent d4d6371d9a
commit 88bcf3e6ea
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
8 changed files with 46 additions and 16 deletions

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.de",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2020-01-27T00:00:00.000Z",
"ID": "CVE-2017-14806",
"STATE": "PUBLIC",
@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-common version 1.3.17-56.6.3 and prior versions."
"value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions."
}
]
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@suse.de",
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2020-01-27T00:00:00.000Z",
"ID": "CVE-2017-14807",
"STATE": "PUBLIC",
@ -44,7 +44,7 @@
"description_data": [
{
"lang": "eng",
"value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-ui-server version 1.3.17-56.6.3 and prior versions."
"value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data. This issue affects: SUSE Studio onsite susestudio-ui-server version 1.3.17-56.6.3 and prior versions."
}
]
},

View File

@ -346,6 +346,11 @@
"refsource": "MLIST",
"name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]",
"url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
"url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
}
]
}

View File

@ -253,6 +253,11 @@
"refsource": "MLIST",
"name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]",
"url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
"url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
}
]
},

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://f-revocrm.jp/2019/12/9393"
"url": "https://f-revocrm.jp/2019/12/9393",
"refsource": "MISC",
"name": "https://f-revocrm.jp/2019/12/9393"
},
{
"url": "http://jvn.jp/en/jp/JVN97325754/index.html"
"url": "http://jvn.jp/en/jp/JVN97325754/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN97325754/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-6036",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
"refsource": "MISC",
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
},
{
"url": "http://jvn.jp/en/jp/JVN66435380/index.html"
"url": "http://jvn.jp/en/jp/JVN66435380/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5520",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
"refsource": "MISC",
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
},
{
"url": "http://jvn.jp/en/jp/JVN66435380/index.html"
"url": "http://jvn.jp/en/jp/JVN66435380/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5521",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
"refsource": "MISC",
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
},
{
"url": "http://jvn.jp/en/jp/JVN66435380/index.html"
"url": "http://jvn.jp/en/jp/JVN66435380/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2020-5522",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {