"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-01-06 17:08:23 +00:00
parent 72de3f88c5
commit a2663adf9a
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
49 changed files with 66 additions and 48 deletions

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2015-0780", "ID": "CVE-2015-0780",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2015-0783", "ID": "CVE-2015-0783",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2015-0786", "ID": "CVE-2015-0786",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2015-5968", "ID": "CVE-2015-5968",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2015-5969", "ID": "CVE-2015-5969",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-1593", "ID": "CVE-2016-1593",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-1605", "ID": "CVE-2016-1605",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-1606", "ID": "CVE-2016-1606",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-3135", "ID": "CVE-2016-3135",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-3142", "ID": "CVE-2016-3142",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-4579", "ID": "CVE-2016-4579",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-5360", "ID": "CVE-2016-5360",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-5755", "ID": "CVE-2016-5755",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-5756", "ID": "CVE-2016-5756",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-5757", "ID": "CVE-2016-5757",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-7942", "ID": "CVE-2016-7942",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"ID": "CVE-2016-7945", "ID": "CVE-2016-7945",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2016-7950", "ID": "CVE-2016-7950",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2017-14352", "ID": "CVE-2017-14352",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2017-14360", "ID": "CVE-2017-14360",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "MFSBGN03791 rev.1 - HPE Content Manager Workgroup Service, Denial of Service (DoS)" "TITLE": "MFSBGN03791 rev.1 - HPE Content Manager Workgroup Service, Denial of Service (DoS)"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-12-08T00:00:00", "DATE_PUBLIC": "2017-12-08T00:00:00",
"ID": "CVE-2017-14803", "ID": "CVE-2017-14803",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2017-5185", "ID": "CVE-2017-5185",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2017-09-15T00:00:00.000Z", "DATE_PUBLIC": "2017-09-15T00:00:00.000Z",
"ID": "CVE-2017-7427", "ID": "CVE-2017-7427",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z",
"ID": "CVE-2017-7429", "ID": "CVE-2017-7429",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-11-20T00:00:00.000Z", "DATE_PUBLIC": "2017-11-20T00:00:00.000Z",
"ID": "CVE-2017-9276", "ID": "CVE-2017-9276",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z",
"ID": "CVE-2017-9277", "ID": "CVE-2017-9277",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2017-09-01T00:00:00.000Z", "DATE_PUBLIC": "2017-09-01T00:00:00.000Z",
"ID": "CVE-2017-9278", "ID": "CVE-2017-9278",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2017-10-02T00:00:00.000Z", "DATE_PUBLIC": "2017-10-02T00:00:00.000Z",
"ID": "CVE-2017-9285", "ID": "CVE-2017-9285",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2017-10-04T00:00:00.000Z", "DATE_PUBLIC": "2017-10-04T00:00:00.000Z",
"ID": "CVE-2017-9286", "ID": "CVE-2017-9286",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@microfocus.com", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2018-07-24T00:00:00.000Z", "DATE_PUBLIC": "2018-07-24T00:00:00.000Z",
"ID": "CVE-2018-12466", "ID": "CVE-2018-12466",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-09-27T00:00:00.000Z", "DATE_PUBLIC": "2018-09-27T00:00:00.000Z",
"ID": "CVE-2018-12470", "ID": "CVE-2018-12470",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z", "DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
"ID": "CVE-2018-12473", "ID": "CVE-2018-12473",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-09-26T00:00:00.000Z", "DATE_PUBLIC": "2018-09-26T00:00:00.000Z",
"ID": "CVE-2018-12474", "ID": "CVE-2018-12474",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-11-15T00:00:00.000Z", "DATE_PUBLIC": "2018-11-15T00:00:00.000Z",
"ID": "CVE-2018-17953", "ID": "CVE-2018-17953",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2019-02-21T00:00:00.000Z", "DATE_PUBLIC": "2019-02-21T00:00:00.000Z",
"ID": "CVE-2018-19637", "ID": "CVE-2018-19637",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2019-01-23T01:00:00.000Z", "DATE_PUBLIC": "2019-01-23T01:00:00.000Z",
"ID": "CVE-2018-19642", "ID": "CVE-2018-19642",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2018-1350", "ID": "CVE-2018-1350",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "NetIQ Identity Manager Driver Component Information Leakage " "TITLE": "NetIQ Identity Manager Driver Component Information Leakage "

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-05-10T19:01:00.000Z", "DATE_PUBLIC": "2018-05-10T19:01:00.000Z",
"ID": "CVE-2018-6494", "ID": "CVE-2018-6494",
"STATE": "PUBLIC", "STATE": "PUBLIC",

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2018-6496", "ID": "CVE-2018-6496",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "MFSBGN03809 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF" "TITLE": "MFSBGN03809 rev.1 - Universal CMDB, Deserialization Java Objects and CSRF"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"ID": "CVE-2018-7676", "ID": "CVE-2018-7676",
"STATE": "PUBLIC", "STATE": "PUBLIC",
"TITLE": "IDM Information Leakage" "TITLE": "IDM Information Leakage"

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"DATE_PUBLIC": "2018-06-20T00:00:00", "DATE_PUBLIC": "2018-06-20T00:00:00",
"ID": "CVE-2018-7679", "ID": "CVE-2018-7679",
"STATE": "PUBLIC" "STATE": "PUBLIC"

View File

@ -4,7 +4,7 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-11646", "ID": "CVE-2019-11646",
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": { "affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-11647", "ID": "CVE-2019-11647",
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": { "affects": {

View File

@ -7,7 +7,7 @@
}, },
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-11654", "ID": "CVE-2019-11654",
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"TITLE": "A path traversal vulnerability has been identified in Verastream Host Integrator ", "TITLE": "A path traversal vulnerability has been identified in Verastream Host Integrator ",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-17089",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -7,7 +7,7 @@
}, },
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-11844", "ID": "CVE-2020-11844",
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"TITLE": "Incorrect Authorization vulnerability in the Micro Focus Container Deployment Foundation affecting multiple products.", "TITLE": "Incorrect Authorization vulnerability in the Micro Focus Container Deployment Foundation affecting multiple products.",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },

View File

@ -4,7 +4,7 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-11852", "ID": "CVE-2020-11852",
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": { "affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-11857", "ID": "CVE-2020-11857",
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": { "affects": {

View File

@ -4,7 +4,7 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2020-25837", "ID": "CVE-2020-25837",
"ASSIGNER": "security@suse.com", "ASSIGNER": "security@microfocus.com",
"STATE": "PUBLIC" "STATE": "PUBLIC"
}, },
"affects": { "affects": {