"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-07-30 19:00:49 +00:00
parent 2a563b8bf7
commit 9d3b314b15
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
15 changed files with 605 additions and 9 deletions

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Centreon 2.6.1."
"value": "Cross-site scripting (XSS) vulnerability in Centreon 2.6.1 (fixed in Centreon 18.10.0 and Centreon web 2.8.27)."
}
]
},
@ -56,6 +56,26 @@
"name": "https://www.youtube.com/watch?v=sIONzwQAngU",
"refsource": "MISC",
"url": "https://www.youtube.com/watch?v=sIONzwQAngU"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6953",
"url": "https://github.com/centreon/centreon/pull/6953"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6637",
"url": "https://github.com/centreon/centreon/pull/6637"
}
]
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18381",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The installation process in Open edX before 2017-01-10 exposes a MongoDB instance to external connections with default credentials."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://groups.google.com/forum/#!topic/openedx-announce/mpyyx34LWSY",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/openedx-announce/mpyyx34LWSY"
},
{
"url": "https://groups.google.com/forum/#!topic/openedx-announce/jRXyo1HJzNk",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/openedx-announce/jRXyo1HJzNk"
}
]
}
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Centreon 3.4.x allows SQL Injection via the main.php searchH parameter."
"value": "Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.28) allows SQL Injection via the main.php searchH parameter."
}
]
},
@ -58,9 +58,19 @@
"url": "http://www.rootlabs.com.br/authenticated-sql-injection-in-centreon-3-4-x/"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6625",
"refsource": "MISC",
"url": "https://github.com/centreon/centreon/pull/6625"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.28.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.28.html"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro."
"value": "Centreon 3.4.x (fixed in Centreon 18.10.0) has XSS via the resource name or macro expression of a poller macro."
}
]
},
@ -53,8 +53,13 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6626",
"refsource": "MISC",
"url": "https://github.com/centreon/centreon/pull/6626"
}
]

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Centreon 3.4.x allows SNMP trap SQL Injection."
"value": "Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.27) allows SNMP trap SQL Injection."
}
]
},
@ -53,9 +53,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6627",
"refsource": "MISC",
"url": "https://github.com/centreon/centreon/pull/6627"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/7069",
"url": "https://github.com/centreon/centreon/pull/7069"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Centreon 3.4.x allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the \"Monitoring > Status Details > Services\" screen."
"value": "Centreon 3.4.x (fixed in Centreon 18.10.0) allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the \"Monitoring > Status Details > Services\" screen."
}
]
},
@ -56,6 +56,16 @@
"name": "http://www.roothc.com.br/1349-2/",
"refsource": "MISC",
"url": "http://www.roothc.com.br/1349-2/"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6632",
"url": "https://github.com/centreon/centreon/pull/6632"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Centreon 3.4.x allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI."
"value": "Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.24) allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI."
}
]
},
@ -52,10 +52,30 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6257",
"url": "https://github.com/centreon/centreon/pull/6257"
},
{
"name": "http://www.roothc.com.br/1349-2/",
"refsource": "MISC",
"url": "http://www.roothc.com.br/1349-2/"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.24.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.24.html"
},
{
"refsource": "CONFIRM",
"name": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html",
"url": "https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/centreon/centreon/pull/6628",
"url": "https://github.com/centreon/centreon/pull/6628"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20859",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "edx-platform before 2018-07-18 allows XSS via a response to a Chemical Equation advanced problem."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://groups.google.com/forum/#!topic/openedx-announce/wsm5mtUhhME",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/openedx-announce/wsm5mtUhhME"
},
{
"refsource": "MISC",
"name": "https://github.com/edx/edx-platform/commit/5b144559fbdba7ff673cc1c165aa2d343e07b6bd.patch",
"url": "https://github.com/edx/edx-platform/commit/5b144559fbdba7ff673cc1c165aa2d343e07b6bd.patch"
},
{
"refsource": "MISC",
"name": "https://patch-diff.githubusercontent.com/raw/edx/edx-platform/pull/18639.patch",
"url": "https://patch-diff.githubusercontent.com/raw/edx/edx-platform/pull/18639.patch"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20860",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libopenmpt before 0.3.13 allows a crash with malformed MED files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/",
"refsource": "MISC",
"name": "https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20861",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libopenmpt before 0.3.11 allows a crash with certain malformed custom tunings in MPTM files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lib.openmpt.org/libopenmpt/2018/07/28/security-updates-0.3.11-0.2.10635-beta34-0.2.7561-beta20.5-p10-0.2.7386-beta20.3-p13/",
"refsource": "MISC",
"name": "https://lib.openmpt.org/libopenmpt/2018/07/28/security-updates-0.3.11-0.2.10635-beta34-0.2.7561-beta20.5-p10-0.2.7386-beta20.3-p13/"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20871",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Univa Grid Engine before 8.6.3, when configured for Docker jobs and execd spooling on root_squash, weak file permissions (\"other\" write access) occur in certain cases (GE-6890)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.univa.com/resources/files/Release_Notes_Univa_Grid_Engine_8.6.6.pdf",
"refsource": "MISC",
"name": "http://www.univa.com/resources/files/Release_Notes_Univa_Grid_Engine_8.6.6.pdf"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14380",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libopenmpt before 0.4.5 allows a crash during playback due to an out-of-bounds read in XM and MT2 files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lib.openmpt.org/libopenmpt/2019/05/27/security-update-0.4.5/",
"refsource": "MISC",
"name": "https://lib.openmpt.org/libopenmpt/2019/05/27/security-update-0.4.5/"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "DSM in libopenmpt before 0.4.2 allows an assertion failure during file parsing with debug STLs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/",
"refsource": "MISC",
"name": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14383",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "J2B in libopenmpt before 0.4.2 allows an assertion failure during file parsing with debug STLs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/",
"refsource": "MISC",
"name": "https://lib.openmpt.org/libopenmpt/2019/01/22/security-updates-0.4.2-0.3.15-0.2.11253-beta37-0.2.7561-beta20.5-p13-0.2.7386-beta20.3-p16/"
}
]
}
}

View File

@ -61,6 +61,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1771",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1972",
"url": "https://access.redhat.com/errata/RHSA-2019:1972"
}
]
}