diff --git a/2018/11xxx/CVE-2018-11777.json b/2018/11xxx/CVE-2018-11777.json index e0e26054aa7..578341d6412 100644 --- a/2018/11xxx/CVE-2018-11777.json +++ b/2018/11xxx/CVE-2018-11777.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use" + "value" : "In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E", + "refsource" : "MISC", "url" : "https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E" } ] diff --git a/2018/1xxx/CVE-2018-1314.json b/2018/1xxx/CVE-2018-1314.json index c2750af83e5..79147c74e0b 100644 --- a/2018/1xxx/CVE-2018-1314.json +++ b/2018/1xxx/CVE-2018-1314.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Hive \"EXPLAIN\" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do \"EXPLAIN\" on arbitrary table or view and expose table metadata and statistics." + "value" : "In Apache Hive 2.3.3, 3.1.0 and earlier, Hive \"EXPLAIN\" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do \"EXPLAIN\" on arbitrary table or view and expose table metadata and statistics." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E", + "refsource" : "MISC", "url" : "https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E" } ] diff --git a/2018/6xxx/CVE-2018-6433.json b/2018/6xxx/CVE-2018-6433.json index 0de3debb173..2808609b706 100644 --- a/2018/6xxx/CVE-2018-6433.json +++ b/2018/6xxx/CVE-2018-6433.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-728", + "refsource" : "CONFIRM", "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-728" } ] diff --git a/2018/6xxx/CVE-2018-6434.json b/2018/6xxx/CVE-2018-6434.json index 85cf489756d..40cde2ea527 100644 --- a/2018/6xxx/CVE-2018-6434.json +++ b/2018/6xxx/CVE-2018-6434.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-736", + "refsource" : "CONFIRM", "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-736" } ] diff --git a/2018/6xxx/CVE-2018-6435.json b/2018/6xxx/CVE-2018-6435.json index 64121ad3e58..91cc22f4fbc 100644 --- a/2018/6xxx/CVE-2018-6435.json +++ b/2018/6xxx/CVE-2018-6435.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A Vulnerability in the seccryptocfg command of Brocade Fabric OS command line interface (CLI) versions before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d could allow a local attacker to escape the restricted shell and, and gain root access." + "value" : "A Vulnerability in the secryptocfg command of Brocade Fabric OS command line interface (CLI) versions before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d could allow a local attacker to escape the restricted shell and, and gain root access." } ] }, @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-729", + "refsource" : "CONFIRM", "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-729" } ] diff --git a/2018/6xxx/CVE-2018-6441.json b/2018/6xxx/CVE-2018-6441.json index 3552d7c4741..3952b9e457e 100644 --- a/2018/6xxx/CVE-2018-6441.json +++ b/2018/6xxx/CVE-2018-6441.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-734", + "refsource" : "CONFIRM", "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-734" } ] diff --git a/2018/6xxx/CVE-2018-6442.json b/2018/6xxx/CVE-2018-6442.json index 1b87b5a7d2d..d3f8988d4c9 100644 --- a/2018/6xxx/CVE-2018-6442.json +++ b/2018/6xxx/CVE-2018-6442.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-735", + "refsource" : "CONFIRM", "url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-735" } ]