"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-24 14:01:01 +00:00
parent 15dac94eaa
commit 9f3a467184
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
3 changed files with 232 additions and 183 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "cve@mitre.org", "ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-9090", "ID": "CVE-2018-9090",
"STATE": "RESERVED" "STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
}, },
"data_format": "MITRE", "data_format": "MITRE",
"data_type": "CVE", "data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "CoreOS Tectonic 1.7.x and 1.8.x before 1.8.7-tectonic.2 deploys the Grafana web application using default credentials (admin/admin) for the administrator account located at grafana-credentials secret. This occurs because CoreOS does not randomize the administrative password to later be configured by Tectonic administrators. An attacker can insert an XSS payload into the dashboards."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://coreos.com/tectonic/releases/",
"refsource": "MISC",
"name": "https://coreos.com/tectonic/releases/"
},
{
"refsource": "MISC",
"name": "https://coreos.com/tectonic/releases/#1.8.7-tectonic.2",
"url": "https://coreos.com/tectonic/releases/#1.8.7-tectonic.2"
} }
] ]
} }

View File

@ -1,93 +1,93 @@
{ {
"problemtype" : { "problemtype": {
"problemtype_data" : [ "problemtype_data": [
{
"description" : [
{
"value" : "Gain Access",
"lang" : "eng"
}
]
}
]
},
"data_type" : "CVE",
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/290671",
"url" : "https://www.ibm.com/support/pages/node/290671",
"title" : "IBM Security Bulletin 1997949 (Security Key Lifecycle Manager)"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/165137",
"name" : "ibm-tivoli-cve20194515-csrf (165137)",
"title" : "X-Force Vulnerability Report",
"refsource" : "XF"
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{ {
"product" : { "description": [
"product_data" : [ {
{ "value": "Gain Access",
"product_name" : "Security Key Lifecycle Manager", "lang": "eng"
"version" : { }
"version_data" : [ ]
{
"version_value" : "3.0"
},
{
"version_value" : "3.0.1"
}
]
}
}
]
},
"vendor_name" : "IBM"
} }
] ]
} },
}, "data_type": "CVE",
"CVE_data_meta" : { "references": {
"ASSIGNER" : "psirt@us.ibm.com", "reference_data": [
"ID" : "CVE-2019-4515", {
"DATE_PUBLIC" : "2019-09-19T00:00:00", "refsource": "CONFIRM",
"STATE" : "PUBLIC" "name": "https://www.ibm.com/support/pages/node/290671",
}, "url": "https://www.ibm.com/support/pages/node/290671",
"data_format" : "MITRE", "title": "IBM Security Bulletin 1997949 (Security Key Lifecycle Manager)"
"data_version" : "4.0", },
"impact" : { {
"cvssv3" : { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/165137",
"TM" : { "name": "ibm-tivoli-cve20194515-csrf (165137)",
"RC" : "C", "title": "X-Force Vulnerability Report",
"E" : "U", "refsource": "XF"
"RL" : "O" }
}, ]
"BM" : { },
"AC" : "L", "affects": {
"S" : "U", "vendor": {
"UI" : "R", "vendor_data": [
"SCORE" : "4.300", {
"I" : "L", "product": {
"C" : "N", "product_data": [
"AV" : "N", {
"A" : "N", "product_name": "Security Key Lifecycle Manager",
"PR" : "N" "version": {
} "version_data": [
} {
}, "version_value": "3.0"
"description" : { },
"description_data" : [ {
{ "version_value": "3.0.1"
"lang" : "eng", }
"value" : "IBM Security Key Lifecycle Manager 3.0 and 3.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 165137." ]
} }
] }
} ]
} },
"vendor_name": "IBM"
}
]
}
},
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2019-4515",
"DATE_PUBLIC": "2019-09-19T00:00:00",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"impact": {
"cvssv3": {
"TM": {
"RC": "C",
"E": "U",
"RL": "O"
},
"BM": {
"AC": "L",
"S": "U",
"UI": "R",
"SCORE": "4.300",
"I": "L",
"C": "N",
"AV": "N",
"A": "N",
"PR": "N"
}
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Security Key Lifecycle Manager 3.0 and 3.0.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 165137."
}
]
}
}

View File

@ -1,93 +1,93 @@
{ {
"affects" : { "affects": {
"vendor" : { "vendor": {
"vendor_data" : [ "vendor_data": [
{ {
"vendor_name" : "IBM", "vendor_name": "IBM",
"product" : { "product": {
"product_data" : [ "product_data": [
{ {
"product_name" : "Security Key Lifecycle Manager", "product_name": "Security Key Lifecycle Manager",
"version" : { "version": {
"version_data" : [ "version_data": [
{ {
"version_value" : "3.0" "version_value": "3.0"
}, },
{ {
"version_value" : "3.0.1" "version_value": "3.0.1"
} }
] ]
} }
} }
] ]
} }
} }
]
}
},
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"title" : "IBM Security Bulletin 1074344 (Security Key Lifecycle Manager)",
"name" : "https://www.ibm.com/support/pages/node/1074344",
"url" : "https://www.ibm.com/support/pages/node/1074344"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/166627",
"name" : "ibm-tivoli-cve20194566-info-disc (166627)",
"title" : "X-Force Vulnerability Report",
"refsource" : "XF"
}
]
},
"data_format" : "MITRE",
"CVE_data_meta" : {
"DATE_PUBLIC" : "2019-09-20T00:00:00",
"STATE" : "PUBLIC",
"ID" : "CVE-2019-4566",
"ASSIGNER" : "psirt@us.ibm.com"
},
"data_type" : "CVE",
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
}
] ]
} }
] },
}, "references": {
"impact" : { "reference_data": [
"cvssv3" : { {
"BM" : { "refsource": "CONFIRM",
"UI" : "N", "title": "IBM Security Bulletin 1074344 (Security Key Lifecycle Manager)",
"SCORE" : "6.200", "name": "https://www.ibm.com/support/pages/node/1074344",
"AC" : "L", "url": "https://www.ibm.com/support/pages/node/1074344"
"S" : "U", },
"A" : "N", {
"AV" : "L", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/166627",
"PR" : "N", "name": "ibm-tivoli-cve20194566-info-disc (166627)",
"I" : "N", "title": "X-Force Vulnerability Report",
"C" : "H" "refsource": "XF"
}, }
"TM" : { ]
"RC" : "C", },
"E" : "U", "data_format": "MITRE",
"RL" : "O" "CVE_data_meta": {
} "DATE_PUBLIC": "2019-09-20T00:00:00",
} "STATE": "PUBLIC",
}, "ID": "CVE-2019-4566",
"data_version" : "4.0", "ASSIGNER": "psirt@us.ibm.com"
"description" : { },
"description_data" : [ "data_type": "CVE",
{ "problemtype": {
"value" : "IBM Security Key Lifecycle Manager 3.0 and 3.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 166627.", "problemtype_data": [
"lang" : "eng" {
} "description": [
] {
} "value": "Obtain Information",
} "lang": "eng"
}
]
}
]
},
"impact": {
"cvssv3": {
"BM": {
"UI": "N",
"SCORE": "6.200",
"AC": "L",
"S": "U",
"A": "N",
"AV": "L",
"PR": "N",
"I": "N",
"C": "H"
},
"TM": {
"RC": "C",
"E": "U",
"RL": "O"
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"value": "IBM Security Key Lifecycle Manager 3.0 and 3.0.1 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 166627.",
"lang": "eng"
}
]
}
}