mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
93dd54f9b7
commit
94824a6a02
@ -61,6 +61,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/aress31/cve-2017-12945/blob/master/images/changelog.png",
|
||||
"url": "https://github.com/aress31/cve-2017-12945/blob/master/images/changelog.png"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/11/msg00033.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14896",
|
||||
"ASSIGNER": "mrehak@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -68,4 +69,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -52,15 +52,20 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.lexmark.com/en_us.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.lexmark.com/en_us.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html",
|
||||
"url": "http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20191119 CVE-2019-16758 Lexmark Services Monitor 2.27.4.0.39 Directory Traversal",
|
||||
"url": "http://seclists.org/fulldisclosure/2019/Nov/17"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.symantec.com/security-center/vulnerabilities/writeup/110943",
|
||||
"url": "https://www.symantec.com/security-center/vulnerabilities/writeup/110943"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -37,7 +37,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0.\n\n"
|
||||
"value": "When using wagtail-2fa before 1.3.0, if someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. This problem has been patched in version 1.3.0."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user