- Synchronized data.

This commit is contained in:
CVE Team 2018-11-08 14:06:44 -05:00
parent d9aea212c2
commit 8d873c945e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
6 changed files with 255 additions and 249 deletions

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "psirt@cisco.com", "ASSIGNER" : "psirt@cisco.com",
"DATE_PUBLIC": "2018-11-07T16:00:00-0600", "DATE_PUBLIC" : "2018-11-07T16:00:00-0600",
"ID": "CVE-2018-15447", "ID" : "CVE-2018-15447",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Cisco Integrated Management Controller Supervisor SQL Injection Vulnerability" "TITLE" : "Cisco Integrated Management Controller Supervisor SQL Injection Vulnerability"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Cisco Integrated Management Controller (IMC) Supervisor ", "product_name" : "Cisco Integrated Management Controller (IMC) Supervisor ",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"version_value": "n/a" "version_value" : "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Cisco" "vendor_name" : "Cisco"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "A vulnerability in the web framework code of Cisco Integrated Management Controller (IMC) Supervisor could allow an unauthenticated, remote attacker to execute arbitrary SQL queries. The vulnerability is due to a lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected application. " "value" : "A vulnerability in the web framework code of Cisco Integrated Management Controller (IMC) Supervisor could allow an unauthenticated, remote attacker to execute arbitrary SQL queries. The vulnerability is due to a lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected application."
} }
] ]
}, },
"exploit": [ "exploit" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " "value" : "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
} }
], ],
"impact": { "impact" : {
"cvss": { "cvss" : {
"baseScore": "6.5", "baseScore" : "6.5",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N ", "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N ",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "CWE-89" "value" : "CWE-89"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"name": "20181107 Cisco Integrated Management Controller Supervisor SQL Injection Vulnerability", "name" : "20181107 Cisco Integrated Management Controller Supervisor SQL Injection Vulnerability",
"refsource": "CISCO", "refsource" : "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cimc-sql-inject" "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cimc-sql-inject"
} }
] ]
}, },
"source": { "source" : {
"advisory": "cisco-sa-20181107-cimc-sql-inject", "advisory" : "cisco-sa-20181107-cimc-sql-inject",
"defect": [ "defect" : [
[ [
"CSCvm10518" "CSCvm10518"
] ]
], ],
"discovery": "INTERNAL" "discovery" : "INTERNAL"
} }
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "psirt@cisco.com", "ASSIGNER" : "psirt@cisco.com",
"DATE_PUBLIC": "2018-11-07T16:00:00-0600", "DATE_PUBLIC" : "2018-11-07T16:00:00-0600",
"ID": "CVE-2018-15448", "ID" : "CVE-2018-15448",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Cisco Registered Envelope Service Information Disclosure Vulnerability" "TITLE" : "Cisco Registered Envelope Service Information Disclosure Vulnerability"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Cisco Registered Envelope Service ", "product_name" : "Cisco Registered Envelope Service ",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"version_value": "n/a" "version_value" : "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Cisco" "vendor_name" : "Cisco"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "A vulnerability in the user management functions of Cisco Registered Envelope Service could allow an unauthenticated, remote attacker to discover sensitive user information. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to an insecure configuration that allows improper indexing. An attacker could exploit this vulnerability by using a search engine to look for specific data strings. A successful exploit could allow the attacker to discover certain sensitive information about the application, including usernames. " "value" : "A vulnerability in the user management functions of Cisco Registered Envelope Service could allow an unauthenticated, remote attacker to discover sensitive user information. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to an insecure configuration that allows improper indexing. An attacker could exploit this vulnerability by using a search engine to look for specific data strings. A successful exploit could allow the attacker to discover certain sensitive information about the application, including usernames."
} }
] ]
}, },
"exploit": [ "exploit" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " "value" : "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
} }
], ],
"impact": { "impact" : {
"cvss": { "cvss" : {
"baseScore": "5.3", "baseScore" : "5.3",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N ", "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N ",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "CWE-16" "value" : "CWE-16"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"name": "20181107 Cisco Registered Envelope Service Information Disclosure Vulnerability", "name" : "20181107 Cisco Registered Envelope Service Information Disclosure Vulnerability",
"refsource": "CISCO", "refsource" : "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-res-info-disc" "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-res-info-disc"
} }
] ]
}, },
"source": { "source" : {
"advisory": "cisco-sa-20181107-res-info-disc", "advisory" : "cisco-sa-20181107-res-info-disc",
"defect": [ "defect" : [
[ [
"CSCvj88457" "CSCvj88457"
] ]
], ],
"discovery": "INTERNAL" "discovery" : "INTERNAL"
} }
} }

View File

@ -1,86 +1,86 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "psirt@cisco.com", "ASSIGNER" : "psirt@cisco.com",
"DATE_PUBLIC": "2018-11-07T16:00:00-0600", "DATE_PUBLIC" : "2018-11-07T16:00:00-0600",
"ID": "CVE-2018-15449", "ID" : "CVE-2018-15449",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Cisco Video Surveillance Media Server Denial of Service Vulnerability" "TITLE" : "Cisco Video Surveillance Media Server Denial of Service Vulnerability"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Cisco Video Surveillance Media Server Software ", "product_name" : "Cisco Video Surveillance Media Server Software ",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"version_value": "n/a" "version_value" : "n/a"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Cisco" "vendor_name" : "Cisco"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "A vulnerability in the web-based management interface of Cisco Video Surveillance Media Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to cause the web-based management interface to become unreachable, resulting in a DoS condition. " "value" : "A vulnerability in the web-based management interface of Cisco Video Surveillance Media Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to cause the web-based management interface to become unreachable, resulting in a DoS condition."
} }
] ]
}, },
"exploit": [ "exploit" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " "value" : "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
} }
], ],
"impact": { "impact" : {
"cvss": { "cvss" : {
"baseScore": "4.3", "baseScore" : "4.3",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L ", "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L ",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "CWE-20" "value" : "CWE-20"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"name": "20181107 Cisco Video Surveillance Media Server Denial of Service Vulnerability", "name" : "20181107 Cisco Video Surveillance Media Server Denial of Service Vulnerability",
"refsource": "CISCO", "refsource" : "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vsms-dos" "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vsms-dos"
} }
] ]
}, },
"source": { "source" : {
"advisory": "cisco-sa-20181107-vsms-dos", "advisory" : "cisco-sa-20181107-vsms-dos",
"defect": [ "defect" : [
[ [
"CSCvm36780" "CSCvm36780"
] ]
], ],
"discovery": "INTERNAL" "discovery" : "INTERNAL"
} }
} }

View File

@ -53,6 +53,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-730",
"refsource" : "CONFIRM",
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-730" "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-730"
} }
] ]

View File

@ -53,6 +53,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731",
"refsource" : "CONFIRM",
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731" "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731"
} }
] ]

View File

@ -53,6 +53,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731",
"refsource" : "CONFIRM",
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731" "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-731"
} }
] ]