- Synchronized data.

This commit is contained in:
CVE Team 2018-04-09 16:03:56 -04:00
parent 4b61d088a3
commit 93b4b72e16
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
6 changed files with 86 additions and 3 deletions

View File

@ -54,6 +54,8 @@
"references" : {
"reference_data" : [
{
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327"
}
]

View File

@ -38,7 +38,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Avamar Installation Manager is affected by a missing access control check vulnerability which could potentially allow a remote unauthenticated attacker to read or change the Local Download Service (LDLS) credentials. The LDLS credentials are used to connect to Dell EMC Online Support. If the LDLS configuration was changed to an invalid configuration, then Avamar Installation Manager may not be able to connect to Dell EMC Online Support web site successfully. The remote unauthenticated attacker can also read and use the credentials to login to Dell EMC Online Support, impersonating the AVI serviceactions using those credentials."
"value" : "Avamar Installation Manager in Dell EMC Avamar Server 7.3.1, 7.4.1, and 7.5.0, and Dell EMC Integrated Data Protection Appliance 2.0 and 2.1, is affected by a missing access control check vulnerability which could potentially allow a remote unauthenticated attacker to read or change the Local Download Service (LDLS) credentials. The LDLS credentials are used to connect to Dell EMC Online Support. If the LDLS configuration was changed to an invalid configuration, then Avamar Installation Manager may not be able to connect to Dell EMC Online Support web site successfully. The remote unauthenticated attacker can also read and use the credentials to login to Dell EMC Online Support, impersonating the AVI service actions using those credentials."
}
]
},
@ -57,6 +57,8 @@
"references" : {
"reference_data" : [
{
"name" : "20180405 DSA-2018-025: Dell EMC Avamar and Integrated Data Protection Appliance Installation Manager Missing Access Control Vulnerability",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/Apr/14"
}
]

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-6182",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,33 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "Mahara 16.10 before 16.10.9 and 17.04 before 17.04.7 and 17.10 before 17.10.4 are vulnerable to bad input when TinyMCE is bypassed by POST packages. Therefore, Mahara should not rely on TinyMCE's code stripping alone but also clean input on the server / PHP side as one can create own packets of POST data containing bad content with which to hit the server."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugs.launchpad.net/mahara/+bug/1744789",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/mahara/+bug/1744789"
},
{
"name" : "https://mahara.org/interaction/forum/topic.php?id=8215",
"refsource" : "CONFIRM",
"url" : "https://mahara.org/interaction/forum/topic.php?id=8215"
}
]
}

View File

@ -52,10 +52,20 @@
},
"references" : {
"reference_data" : [
{
"name" : "44405",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44405/"
},
{
"name" : "https://github.com/ponyma233/YzmCMS/blob/master/YzmCMS_3.6_bug.md",
"refsource" : "MISC",
"url" : "https://github.com/ponyma233/YzmCMS/blob/master/YzmCMS_3.6_bug.md"
},
{
"name" : "https://packetstormsecurity.com/files/147065/YzmCMS-3.6-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "https://packetstormsecurity.com/files/147065/YzmCMS-3.6-Cross-Site-Scripting.html"
}
]
}

View File

@ -52,10 +52,20 @@
},
"references" : {
"reference_data" : [
{
"name" : "44406",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44406/"
},
{
"name" : "https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md",
"refsource" : "MISC",
"url" : "https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md"
},
{
"name" : "https://packetstormsecurity.com/files/147066/Z-Blog-1.5.1.1740-Cross-Site-Scripting.html",
"refsource" : "MISC",
"url" : "https://packetstormsecurity.com/files/147066/Z-Blog-1.5.1.1740-Cross-Site-Scripting.html"
}
]
}

View File

@ -52,10 +52,20 @@
},
"references" : {
"reference_data" : [
{
"name" : "44407",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/44407/"
},
{
"name" : "https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md#web-site-physical-path-leakage",
"refsource" : "MISC",
"url" : "https://github.com/ponyma233/cms/blob/master/Z-Blog_1.5.1.1740_bugs.md#web-site-physical-path-leakage"
},
{
"name" : "https://packetstormsecurity.com/files/147063/Z-Blog-1.5.1.1740-Full-Path-Disclosure.html",
"refsource" : "MISC",
"url" : "https://packetstormsecurity.com/files/147063/Z-Blog-1.5.1.1740-Full-Path-Disclosure.html"
}
]
}