mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
- Synchronized data.
This commit is contained in:
parent
dfc060e2b9
commit
9635686fae
@ -60,6 +60,11 @@
|
||||
"name" : "[announce] 20181005 [CVE-2018-11797] DoS vulnerability in Apache PDFBox parser",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.apache.org/thread.html/a9760973a873522f4d4c0a99916ceb74f361d91006b663a0a418d34a@%3Cannounce.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"name" : "[announce] 20181006 [UPDATE][CVE-2018-11797] DoS vulnerability in Apache PDFBox parser",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.apache.org/thread.html/645574bc50b886d39c20b4065d51ccb1cd5d3a6b4750a22edbb565eb@%3Cannounce.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -45,7 +45,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "WECON Technology Co., Ltd. PI Studio has an affected product that parses files and passes invalidated user data to an unsafe method call, which may allow code to be executed in the context of an administrator."
|
||||
"value" : "WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior parse files and pass invalidated user data to an unsafe method call, which may allow code to be executed in the context of an administrator."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -64,6 +64,8 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01"
|
||||
}
|
||||
]
|
||||
|
@ -45,7 +45,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "WECON Technology Co., Ltd. PI Studio has a stack-based buffer overflow vulnerability which may allow remote code execution."
|
||||
"value" : "WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior have a stack-based buffer overflow vulnerability which may allow remote code execution."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -64,6 +64,8 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01"
|
||||
}
|
||||
]
|
||||
|
@ -45,7 +45,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "WECON Technology Co., Ltd. PI Studio when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure."
|
||||
"value" : "In WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -64,6 +64,8 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01"
|
||||
}
|
||||
]
|
||||
|
Loading…
x
Reference in New Issue
Block a user