"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-06-28 17:01:02 +00:00
parent e1e8bfc851
commit 8bce4dc9c8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
7 changed files with 312 additions and 312 deletions

View File

@ -1,71 +1,17 @@
{ {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-17456",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-17456",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "The function d2alaw_array() in alaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address 0x000000000000), a different vulnerability than CVE-2017-14245." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-14245. Reason: This candidate is a duplicate of CVE-2017-14245. Notes: All CVE users should reference CVE-2017-14245 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/erikd/libsndfile/issues/344",
"refsource": "MISC",
"url": "https://github.com/erikd/libsndfile/issues/344"
},
{
"name": "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4013-1",
"url": "https://usn.ubuntu.com/4013-1/"
} }
] ]
} }

View File

@ -1,71 +1,17 @@
{ {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-17457",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-17457",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "The function d2ulaw_array() in ulaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address 0x000000000000), a different vulnerability than CVE-2017-14246." "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-14246. Reason: This candidate is a duplicate of CVE-2017-14246. Notes: All CVE users should reference CVE-2017-14246 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/erikd/libsndfile/issues/344",
"refsource": "MISC",
"url": "https://github.com/erikd/libsndfile/issues/344"
},
{
"name": "[debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4013-1",
"url": "https://usn.ubuntu.com/4013-1/"
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-14919", "ID": "CVE-2018-14919",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +34,43 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "LOYTEC LGATE-902 6.3.2 devices allow XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "FULLDISC",
"name": "20190409 Loytec LGATE-902: Multiple Vulnerabilities (XSS, Path traversal and File Deletion)",
"url": "http://seclists.org/fulldisclosure/2019/Apr/12"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html",
"url": "http://packetstormsecurity.com/files/152453/Loytec-LGATE-902-XSS-Traversal-File-Deletion.html"
},
{
"refsource": "MISC",
"name": "https://www.mag-securs.com/alertes/artmid/1894/articleid/41651/loytec-lgate-902-up-to-641-alarm-log-obj-handle-cross-site-scripting.aspx",
"url": "https://www.mag-securs.com/alertes/artmid/1894/articleid/41651/loytec-lgate-902-up-to-641-alarm-log-obj-handle-cross-site-scripting.aspx"
},
{
"refsource": "FULLDISC",
"name": "20190407 Loytec LGATE-902: Multiple Vulnerabilities (XSS, Path traversal and File Deletion)",
"url": "https://seclists.org/fulldisclosure/2019/Apr/12"
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-15519", "ID": "CVE-2018-15519",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "Various Lexmark devices have a Buffer Overflow (issue 1 of 2)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://support.lexmark.com/index?page=content&id=TE892",
"url": "http://support.lexmark.com/index?page=content&id=TE892"
} }
] ]
} }

View File

@ -71,6 +71,11 @@
"refsource": "MISC", "refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html", "name": "http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html",
"url": "http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html" "url": "http://packetstormsecurity.com/files/153188/LibreNMS-addhost-Command-Injection.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/153448/LibreNMS-1.46-addhost-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/153448/LibreNMS-1.46-addhost-Remote-Code-Execution.html"
} }
] ]
} }

View File

@ -1,102 +1,102 @@
{ {
"data_format" : "MITRE", "data_format": "MITRE",
"data_version" : "4.0", "data_version": "4.0",
"references" : { "references": {
"reference_data" : [ "reference_data": [
{
"refsource" : "CONFIRM",
"url" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10884032",
"name" : "https://www-01.ibm.com/support/docview.wss?uid=ibm10884032",
"title" : "IBM Security Bulletin 884032 (WebSphere Application Server)"
},
{
"title" : "X-Force Vulnerability Report",
"name" : "ibm-websphere-cve20194269-info-disc (160202)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/160202",
"refsource" : "XF"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"CVE_data_meta" : {
"ID" : "CVE-2019-4269",
"ASSIGNER" : "psirt@us.ibm.com",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2019-06-26T00:00:00"
},
"data_type" : "CVE",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin Console could allow a remote attacker to obtain sensitive information when a specially crafted url causes a stack trace to be dumped. IBM X-Force ID: 160202."
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{ {
"vendor_name" : "IBM", "refsource": "CONFIRM",
"product" : { "url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10884032",
"product_data" : [ "name": "https://www-01.ibm.com/support/docview.wss?uid=ibm10884032",
{ "title": "IBM Security Bulletin 884032 (WebSphere Application Server)"
"version" : { },
"version_data" : [ {
{ "title": "X-Force Vulnerability Report",
"version_value" : "7.0" "name": "ibm-websphere-cve20194269-info-disc (160202)",
}, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/160202",
{ "refsource": "XF"
"version_value" : "8.0"
},
{
"version_value" : "8.5"
},
{
"version_value" : "9.0"
},
{
"version_value" : "9"
}
]
},
"product_name" : "WebSphere Application Server"
}
]
}
} }
] ]
} },
}, "problemtype": {
"impact" : { "problemtype_data": [
"cvssv3" : { {
"BM" : { "description": [
"S" : "U", {
"A" : "N", "lang": "eng",
"SCORE" : "5.300", "value": "Obtain Information"
"AV" : "N", }
"C" : "L", ]
"PR" : "N", }
"I" : "N", ]
"UI" : "N", },
"AC" : "L" "CVE_data_meta": {
}, "ID": "CVE-2019-4269",
"TM" : { "ASSIGNER": "psirt@us.ibm.com",
"RL" : "O", "STATE": "PUBLIC",
"RC" : "C", "DATE_PUBLIC": "2019-06-26T00:00:00"
"E" : "U" },
} "data_type": "CVE",
} "description": {
} "description_data": [
} {
"lang": "eng",
"value": "IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin Console could allow a remote attacker to obtain sensitive information when a specially crafted url causes a stack trace to be dumped. IBM X-Force ID: 160202."
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "7.0"
},
{
"version_value": "8.0"
},
{
"version_value": "8.5"
},
{
"version_value": "9.0"
},
{
"version_value": "9"
}
]
},
"product_name": "WebSphere Application Server"
}
]
}
}
]
}
},
"impact": {
"cvssv3": {
"BM": {
"S": "U",
"A": "N",
"SCORE": "5.300",
"AV": "N",
"C": "L",
"PR": "N",
"I": "N",
"UI": "N",
"AC": "L"
},
"TM": {
"RL": "O",
"RC": "C",
"E": "U"
}
}
}
}

View File

@ -1,90 +1,90 @@
{ {
"impact" : { "impact": {
"cvssv3" : { "cvssv3": {
"TM" : { "TM": {
"RC" : "C", "RC": "C",
"E" : "U", "E": "U",
"RL" : "O" "RL": "O"
}, },
"BM" : { "BM": {
"A" : "N", "A": "N",
"S" : "U", "S": "U",
"AC" : "L", "AC": "L",
"UI" : "N", "UI": "N",
"I" : "N", "I": "N",
"PR" : "L", "PR": "L",
"AV" : "N", "AV": "N",
"C" : "L", "C": "L",
"SCORE" : "4.300" "SCORE": "4.300"
}
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM BigFix Inventory v9 (SUA v9 / ILMT v9) discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 161807."
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "9.2"
}
]
},
"product_name" : "License Metric Tool"
}
]
},
"vendor_name" : "IBM"
} }
] }
} },
}, "description": {
"problemtype" : { "description_data": [
"problemtype_data" : [ {
{ "lang": "eng",
"description" : [ "value": "IBM BigFix Inventory v9 (SUA v9 / ILMT v9) discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 161807."
{ }
"value" : "Obtain Information", ]
"lang" : "eng" },
} "affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "9.2"
}
]
},
"product_name": "License Metric Tool"
}
]
},
"vendor_name": "IBM"
}
] ]
} }
] },
}, "problemtype": {
"references" : { "problemtype_data": [
"reference_data" : [ {
{ "description": [
"title" : "IBM Security Bulletin 957265 (License Metric Tool)", {
"name" : "http://www.ibm.com/support/docview.wss?uid=ibm10957265", "value": "Obtain Information",
"url" : "http://www.ibm.com/support/docview.wss?uid=ibm10957265", "lang": "eng"
"refsource" : "CONFIRM" }
}, ]
{ }
"name" : "ibm-bigfix-cve20194369-info-disc (161807)", ]
"title" : "X-Force Vulnerability Report", },
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/161807", "references": {
"refsource" : "XF" "reference_data": [
} {
] "title": "IBM Security Bulletin 957265 (License Metric Tool)",
}, "name": "http://www.ibm.com/support/docview.wss?uid=ibm10957265",
"CVE_data_meta" : { "url": "http://www.ibm.com/support/docview.wss?uid=ibm10957265",
"DATE_PUBLIC" : "2019-06-26T00:00:00", "refsource": "CONFIRM"
"STATE" : "PUBLIC", },
"ASSIGNER" : "psirt@us.ibm.com", {
"ID" : "CVE-2019-4369" "name": "ibm-bigfix-cve20194369-info-disc (161807)",
}, "title": "X-Force Vulnerability Report",
"data_type" : "CVE", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/161807",
"data_version" : "4.0", "refsource": "XF"
"data_format" : "MITRE" }
} ]
},
"CVE_data_meta": {
"DATE_PUBLIC": "2019-06-26T00:00:00",
"STATE": "PUBLIC",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2019-4369"
},
"data_type": "CVE",
"data_version": "4.0",
"data_format": "MITRE"
}