mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
eb464a2df1
commit
9953d7602f
@ -57,6 +57,11 @@
|
||||
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00079&languageid=en-fr",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00079&languageid=en-fr"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26626",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26626"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00202.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00202.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-25662",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-25662"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00179.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00179.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-24799",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-24799"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "KioWare Server 4.9.6 allows local users to gain privileges by replacing \\kioware_com\\KWSS.exe with a Trojan horse program, because \\kioware_com has \"Everyone: (F)\" permissions."
|
||||
"value": "KioWare Server version 4.9.6 and older installs by default to \"C:\\kioware_com\" with weak folder permissions granting any user full permission \"Everyone: (F)\" to the contents of the directory and it's sub-folders. In addition, the program installs a service called \"KWSService\" which runs as \"Localsystem\", this will allow any user to escalate privileges to \"NT AUTHORITY\\SYSTEM\" by substituting the service's binary with a malicious one."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,30 @@
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-20200",
|
||||
"STATE": "RESERVED"
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
@ -11,7 +34,43 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "CertificatePinner.java in OkHttp 3.x through 3.12.0 allows man-in-the-middle attackers to bypass certificate pinning by changing SSLContext and the boolean values while hooking the application."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://square.github.io/okhttp/3.x/okhttp/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://square.github.io/okhttp/3.x/okhttp/"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/square/okhttp/releases",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/square/okhttp/releases"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/square/okhttp/commits/master",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/square/okhttp/commits/master"
|
||||
},
|
||||
{
|
||||
"url": "https://cxsecurity.com/issue/WLB-2018120252",
|
||||
"refsource": "MISC",
|
||||
"name": "https://cxsecurity.com/issue/WLB-2018120252"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"name": "https://twitter.com/thatcks/status/1076166645708668928",
|
||||
"refsource": "MISC",
|
||||
"url": "https://twitter.com/thatcks/status/1076166645708668928"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2019:1237",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4738",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4738"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00216.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00216.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26976",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26976"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-11084",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2019-11084",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "GAuth 0.9.9 beta has stored XSS that shows a popup repeatedly and discloses cookies."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/gbraad/gauth/issues/110",
|
||||
"url": "https://github.com/gbraad/gauth/issues/110"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -48,6 +48,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190305-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190305-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26771",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26771"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4772"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-26250",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-26250"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,6 +53,11 @@
|
||||
"refsource": "BID",
|
||||
"name": "107621",
|
||||
"url": "http://www.securityfocus.com/bid/107621"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://support.lenovo.com/us/en/solutions/LEN-27096",
|
||||
"url": "http://support.lenovo.com/us/en/solutions/LEN-27096"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1819912",
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1819912"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2019:1235",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00079.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"url": "http://savannah.gnu.org/bugs/?55369",
|
||||
"refsource": "MISC",
|
||||
"name": "http://savannah.gnu.org/bugs/?55369"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2019:1237",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user