"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-01-27 10:01:17 +00:00
parent d4d6371d9a
commit 88bcf3e6ea
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
8 changed files with 46 additions and 16 deletions

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.de", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z",
"ID": "CVE-2017-14806", "ID": "CVE-2017-14806",
"STATE": "PUBLIC", "STATE": "PUBLIC",
@ -44,7 +44,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-common version 1.3.17-56.6.3 and prior versions." "value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions."
} }
] ]
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.de", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z",
"ID": "CVE-2017-14807", "ID": "CVE-2017-14807",
"STATE": "PUBLIC", "STATE": "PUBLIC",
@ -44,7 +44,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-ui-server version 1.3.17-56.6.3 and prior versions." "value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data. This issue affects: SUSE Studio onsite susestudio-ui-server version 1.3.17-56.6.3 and prior versions."
} }
] ]
}, },

View File

@ -346,6 +346,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]", "name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]",
"url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E" "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
"url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
} }
] ]
} }

View File

@ -253,6 +253,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]", "name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]",
"url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E" "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571",
"url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E"
} }
] ]
}, },

View File

@ -3,10 +3,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://f-revocrm.jp/2019/12/9393" "url": "https://f-revocrm.jp/2019/12/9393",
"refsource": "MISC",
"name": "https://f-revocrm.jp/2019/12/9393"
}, },
{ {
"url": "http://jvn.jp/en/jp/JVN97325754/index.html" "url": "http://jvn.jp/en/jp/JVN97325754/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN97325754/index.html"
} }
] ]
}, },
@ -44,7 +48,8 @@
}, },
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-6036", "ID": "CVE-2019-6036",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"problemtype": { "problemtype": {

View File

@ -3,10 +3,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html" "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
"refsource": "MISC",
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
}, },
{ {
"url": "http://jvn.jp/en/jp/JVN66435380/index.html" "url": "http://jvn.jp/en/jp/JVN66435380/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
} }
] ]
}, },
@ -44,7 +48,8 @@
}, },
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-5520", "ID": "CVE-2020-5520",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"problemtype": { "problemtype": {

View File

@ -3,10 +3,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html" "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
"refsource": "MISC",
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
}, },
{ {
"url": "http://jvn.jp/en/jp/JVN66435380/index.html" "url": "http://jvn.jp/en/jp/JVN66435380/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
} }
] ]
}, },
@ -44,7 +48,8 @@
}, },
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-5521", "ID": "CVE-2020-5521",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"problemtype": { "problemtype": {

View File

@ -3,10 +3,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://www.printing.ne.jp/support/information/AppVulnerability.html" "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html",
"refsource": "MISC",
"name": "https://www.printing.ne.jp/support/information/AppVulnerability.html"
}, },
{ {
"url": "http://jvn.jp/en/jp/JVN66435380/index.html" "url": "http://jvn.jp/en/jp/JVN66435380/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN66435380/index.html"
} }
] ]
}, },
@ -44,7 +48,8 @@
}, },
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-5522", "ID": "CVE-2020-5522",
"ASSIGNER": "vultures@jpcert.or.jp" "ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
}, },
"data_format": "MITRE", "data_format": "MITRE",
"problemtype": { "problemtype": {