- Synchronized data.

This commit is contained in:
CVE Team 2018-11-09 14:05:26 -05:00
parent a7ae417a09
commit 9cbbda90f6
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 204 additions and 74 deletions

View File

@ -1,16 +1,13 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "lpardo@redhat.com",
"ID" : "CVE-2018-14644",
"ASSIGNER": "lpardo@redhat.com"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name": "[UNKNOWN]",
"product" : {
"product_data" : [
{
@ -27,32 +24,15 @@
}
}
]
}
},
"vendor_name" : "[UNKNOWN]"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644",
"refsource": "CONFIRM"
}
]
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
@ -70,5 +50,31 @@
}
]
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-20"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644"
},
{
"name" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html",
"refsource" : "CONFIRM",
"url" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html"
}
]
}
}

View File

@ -34,7 +34,7 @@
"description_data" : [
{
"lang" : "eng",
"value" : "Sandboxie 5.26 allows a Sandbox Escape via an \"import os\" statement, followed by os.system(\"cmd\") or os.system(\"powershell\"), within a .py file."
"value" : "** DISPUTED ** Sandboxie 5.26 allows a Sandbox Escape via an \"import os\" statement, followed by os.system(\"cmd\") or os.system(\"powershell\"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality."
}
]
},
@ -53,9 +53,9 @@
"references" : {
"reference_data" : [
{
"name" : "https://github.com/sandboxescape/Sandboxie-5.26-Sandbox-Escape-Exploit",
"name" : "https://github.com/sandboxescape/Sandboxie-5.26-Sandbox-Escape-Exploit/blob/2632a5f7409e52b2e020f5d4467fa019f9095e73/README.doc",
"refsource" : "MISC",
"url" : "https://github.com/sandboxescape/Sandboxie-5.26-Sandbox-Escape-Exploit"
"url" : "https://github.com/sandboxescape/Sandboxie-5.26-Sandbox-Escape-Exploit/blob/2632a5f7409e52b2e020f5d4467fa019f9095e73/README.doc"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-19136",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "DomainMOD through 4.11.01 has XSS via the assets/edit/registrar-account.php raid parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/domainmod/domainmod/issues/79",
"refsource" : "MISC",
"url" : "https://github.com/domainmod/domainmod/issues/79"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-19137",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "DomainMOD through 4.11.01 has XSS via the assets/edit/ip-address.php ipid parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/domainmod/domainmod/issues/79",
"refsource" : "MISC",
"url" : "https://github.com/domainmod/domainmod/issues/79"
}
]
}
}