"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-04 19:00:57 +00:00
parent 61a351183c
commit a532476d41
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
2 changed files with 72 additions and 5 deletions

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-17179",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XSS in library/custom_template/add_template.php in OpenEMR through 5.0.2 allows a malicious user to execute code in the context of a victim's browser via a crafted list_id query parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/openemr/openemr/pull/2701",
"refsource": "MISC",
"name": "https://github.com/openemr/openemr/pull/2701"
}
]
}
}

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942",
"refsource": "MISC",
"name": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
]
},
@ -14,7 +18,7 @@
"description_data": [
{
"lang": "eng",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-6015",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {
@ -59,4 +64,4 @@
}
]
}
}
}