mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
8399581df0
commit
a9c2758269
@ -68,6 +68,11 @@
|
|||||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/159961/SunSSH-Solaris-10-x86-Remote-Root.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection allows remote attackers to obtain authentication cookies (if an XSS issue exists) via the /info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers, or /cache-node-info/headers path."
|
"value": "An issue was discovered in Gradle Enterprise 2017.3 - 2020.2.4 and Gradle Enterprise Build Cache Node 1.0 - 9.2. Unrestricted HTTP header reflection in Gradle Enterprise allows remote attackers to obtain authentication cookies, if they are able to discover a separate XSS vulnerability. This potentially allows an attacker to impersonate another user. Gradle Enterprise affected application request paths:/info/headers, /cache-info/headers, /admin-info/headers, /distribution-broker-info/headers. Gradle Enterprise Build Cache Node affected application request paths:/cache-node-info/headers."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -64,6 +64,11 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"name": "openSUSE-SU-2020:1831",
|
"name": "openSUSE-SU-2020:1831",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -64,6 +64,11 @@
|
|||||||
"refsource": "SUSE",
|
"refsource": "SUSE",
|
||||||
"name": "openSUSE-SU-2020:1831",
|
"name": "openSUSE-SU-2020:1831",
|
||||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html"
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/159975/Chrome-ConvertToJavaBitmap-Heap-Buffer-Overflow.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://www.jinsonvarghese.com/broken-access-control-csrf-in-genexis-platinum-4410/",
|
"name": "https://www.jinsonvarghese.com/broken-access-control-csrf-in-genexis-platinum-4410/",
|
||||||
"url": "https://www.jinsonvarghese.com/broken-access-control-csrf-in-genexis-platinum-4410/"
|
"url": "https://www.jinsonvarghese.com/broken-access-control-csrf-in-genexis-platinum-4410/"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/159936/Genexis-Platinum-4410-P4410-V2-1.28-Missing-Access-Control-CSRF.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/159936/Genexis-Platinum-4410-P4410-V2-1.28-Missing-Access-Control-CSRF.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -61,6 +61,11 @@
|
|||||||
"url": "https://github.com/mcorybillington/SuiteCRM-RCE",
|
"url": "https://github.com/mcorybillington/SuiteCRM-RCE",
|
||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://github.com/mcorybillington/SuiteCRM-RCE"
|
"name": "https://github.com/mcorybillington/SuiteCRM-RCE"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html",
|
||||||
|
"url": "http://packetstormsecurity.com/files/159937/SuiteCRM-7.11.15-Remote-Code-Execution.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,17 +1,61 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ID": "CVE-2020-28364",
|
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"STATE": "RESERVED"
|
"ID": "CVE-2020-28364",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "n/a",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
"description": {
|
"description": {
|
||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"value": "A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"url": "https://docs.locust.io/en/stable/changelog.html",
|
||||||
|
"refsource": "MISC",
|
||||||
|
"name": "https://docs.locust.io/en/stable/changelog.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
18
2020/28xxx/CVE-2020-28366.json
Normal file
18
2020/28xxx/CVE-2020-28366.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2020-28366",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2020/28xxx/CVE-2020-28367.json
Normal file
18
2020/28xxx/CVE-2020-28367.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2020-28367",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2020/28xxx/CVE-2020-28368.json
Normal file
18
2020/28xxx/CVE-2020-28368.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2020-28368",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2020/28xxx/CVE-2020-28369.json
Normal file
18
2020/28xxx/CVE-2020-28369.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2020-28369",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2020/28xxx/CVE-2020-28370.json
Normal file
18
2020/28xxx/CVE-2020-28370.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ID": "CVE-2020-28370",
|
||||||
|
"ASSIGNER": "cve@mitre.org",
|
||||||
|
"STATE": "RESERVED"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
@ -1,99 +1,99 @@
|
|||||||
{
|
{
|
||||||
"description" : {
|
"description": {
|
||||||
"description_data" : [
|
"description_data": [
|
||||||
{
|
|
||||||
"lang" : "eng",
|
|
||||||
"value" : "IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 186023."
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references" : {
|
|
||||||
"reference_data" : [
|
|
||||||
{
|
|
||||||
"title" : "IBM Security Bulletin 6361769 (Maximo Spatial Asset Management)",
|
|
||||||
"name" : "https://www.ibm.com/support/pages/node/6361769",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ibm.com/support/pages/node/6361769"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ibm-maximo-cve20204650-info-disc (186023)",
|
|
||||||
"title" : "X-Force Vulnerability Report",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/186023"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"CVE_data_meta" : {
|
|
||||||
"ASSIGNER" : "psirt@us.ibm.com",
|
|
||||||
"DATE_PUBLIC" : "2020-11-06T00:00:00",
|
|
||||||
"ID" : "CVE-2020-4650",
|
|
||||||
"STATE" : "PUBLIC"
|
|
||||||
},
|
|
||||||
"problemtype" : {
|
|
||||||
"problemtype_data" : [
|
|
||||||
{
|
|
||||||
"description" : [
|
|
||||||
{
|
|
||||||
"value" : "Obtain Information",
|
|
||||||
"lang" : "eng"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"impact" : {
|
|
||||||
"cvssv3" : {
|
|
||||||
"BM" : {
|
|
||||||
"AV" : "L",
|
|
||||||
"PR" : "N",
|
|
||||||
"UI" : "N",
|
|
||||||
"I" : "N",
|
|
||||||
"SCORE" : "4.000",
|
|
||||||
"A" : "N",
|
|
||||||
"C" : "L",
|
|
||||||
"AC" : "L",
|
|
||||||
"S" : "U"
|
|
||||||
},
|
|
||||||
"TM" : {
|
|
||||||
"RC" : "C",
|
|
||||||
"E" : "U",
|
|
||||||
"RL" : "O"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"affects" : {
|
|
||||||
"vendor" : {
|
|
||||||
"vendor_data" : [
|
|
||||||
{
|
{
|
||||||
"product" : {
|
"lang": "eng",
|
||||||
"product_data" : [
|
"value": "IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 186023."
|
||||||
{
|
|
||||||
"version" : {
|
|
||||||
"version_data" : [
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.0.3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.0.4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.0.5"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.1.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"product_name" : "Maximo Spatial Asset Management"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name" : "IBM"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
},
|
"references": {
|
||||||
"data_format" : "MITRE"
|
"reference_data": [
|
||||||
}
|
{
|
||||||
|
"title": "IBM Security Bulletin 6361769 (Maximo Spatial Asset Management)",
|
||||||
|
"name": "https://www.ibm.com/support/pages/node/6361769",
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/6361769"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ibm-maximo-cve20204650-info-disc (186023)",
|
||||||
|
"title": "X-Force Vulnerability Report",
|
||||||
|
"refsource": "XF",
|
||||||
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/186023"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"data_version": "4.0",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"CVE_data_meta": {
|
||||||
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
|
"DATE_PUBLIC": "2020-11-06T00:00:00",
|
||||||
|
"ID": "CVE-2020-4650",
|
||||||
|
"STATE": "PUBLIC"
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "Obtain Information",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"impact": {
|
||||||
|
"cvssv3": {
|
||||||
|
"BM": {
|
||||||
|
"AV": "L",
|
||||||
|
"PR": "N",
|
||||||
|
"UI": "N",
|
||||||
|
"I": "N",
|
||||||
|
"SCORE": "4.000",
|
||||||
|
"A": "N",
|
||||||
|
"C": "L",
|
||||||
|
"AC": "L",
|
||||||
|
"S": "U"
|
||||||
|
},
|
||||||
|
"TM": {
|
||||||
|
"RC": "C",
|
||||||
|
"E": "U",
|
||||||
|
"RL": "O"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "7.6.0.3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "7.6.0.4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "7.6.0.5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "7.6.1.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"product_name": "Maximo Spatial Asset Management"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "IBM"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE"
|
||||||
|
}
|
@ -1,99 +1,99 @@
|
|||||||
{
|
{
|
||||||
"description" : {
|
"description": {
|
||||||
"description_data" : [
|
"description_data": [
|
||||||
{
|
|
||||||
"lang" : "eng",
|
|
||||||
"value" : "IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186024."
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"data_type" : "CVE",
|
|
||||||
"CVE_data_meta" : {
|
|
||||||
"ASSIGNER" : "psirt@us.ibm.com",
|
|
||||||
"DATE_PUBLIC" : "2020-11-06T00:00:00",
|
|
||||||
"ID" : "CVE-2020-4651",
|
|
||||||
"STATE" : "PUBLIC"
|
|
||||||
},
|
|
||||||
"references" : {
|
|
||||||
"reference_data" : [
|
|
||||||
{
|
|
||||||
"name" : "https://www.ibm.com/support/pages/node/6361767",
|
|
||||||
"title" : "IBM Security Bulletin 6361767 (Maximo Spatial Asset Management)",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ibm.com/support/pages/node/6361767"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name" : "ibm-maximo-cve20204651-csrf (186024)",
|
|
||||||
"title" : "X-Force Vulnerability Report",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/186024"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"data_version" : "4.0",
|
|
||||||
"affects" : {
|
|
||||||
"vendor" : {
|
|
||||||
"vendor_data" : [
|
|
||||||
{
|
{
|
||||||
"product" : {
|
"lang": "eng",
|
||||||
"product_data" : [
|
"value": "IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186024."
|
||||||
{
|
|
||||||
"product_name" : "Maximo Spatial Asset Management",
|
|
||||||
"version" : {
|
|
||||||
"version_data" : [
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.0.3"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.0.4"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.0.5"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"version_value" : "7.6.1.0"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name" : "IBM"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
},
|
"data_type": "CVE",
|
||||||
"impact" : {
|
"CVE_data_meta": {
|
||||||
"cvssv3" : {
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"TM" : {
|
"DATE_PUBLIC": "2020-11-06T00:00:00",
|
||||||
"E" : "U",
|
"ID": "CVE-2020-4651",
|
||||||
"RC" : "C",
|
"STATE": "PUBLIC"
|
||||||
"RL" : "O"
|
},
|
||||||
},
|
"references": {
|
||||||
"BM" : {
|
"reference_data": [
|
||||||
"I" : "H",
|
{
|
||||||
"UI" : "R",
|
"name": "https://www.ibm.com/support/pages/node/6361767",
|
||||||
"SCORE" : "4.800",
|
"title": "IBM Security Bulletin 6361767 (Maximo Spatial Asset Management)",
|
||||||
"AV" : "A",
|
"refsource": "CONFIRM",
|
||||||
"PR" : "N",
|
"url": "https://www.ibm.com/support/pages/node/6361767"
|
||||||
"S" : "U",
|
},
|
||||||
"A" : "N",
|
{
|
||||||
"AC" : "H",
|
"name": "ibm-maximo-cve20204651-csrf (186024)",
|
||||||
"C" : "N"
|
"title": "X-Force Vulnerability Report",
|
||||||
}
|
"refsource": "XF",
|
||||||
}
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/186024"
|
||||||
},
|
}
|
||||||
"problemtype" : {
|
]
|
||||||
"problemtype_data" : [
|
},
|
||||||
{
|
"data_version": "4.0",
|
||||||
"description" : [
|
"affects": {
|
||||||
{
|
"vendor": {
|
||||||
"value" : "Gain Access",
|
"vendor_data": [
|
||||||
"lang" : "eng"
|
{
|
||||||
}
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Maximo Spatial Asset Management",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "7.6.0.3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "7.6.0.4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "7.6.0.5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "7.6.1.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "IBM"
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
},
|
||||||
},
|
"impact": {
|
||||||
"data_format" : "MITRE"
|
"cvssv3": {
|
||||||
}
|
"TM": {
|
||||||
|
"E": "U",
|
||||||
|
"RC": "C",
|
||||||
|
"RL": "O"
|
||||||
|
},
|
||||||
|
"BM": {
|
||||||
|
"I": "H",
|
||||||
|
"UI": "R",
|
||||||
|
"SCORE": "4.800",
|
||||||
|
"AV": "A",
|
||||||
|
"PR": "N",
|
||||||
|
"S": "U",
|
||||||
|
"A": "N",
|
||||||
|
"AC": "H",
|
||||||
|
"C": "N"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "Gain Access",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"data_format": "MITRE"
|
||||||
|
}
|
@ -1,93 +1,93 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta" : {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER" : "psirt@us.ibm.com",
|
"ASSIGNER": "psirt@us.ibm.com",
|
||||||
"STATE" : "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
"ID" : "CVE-2020-4759",
|
"ID": "CVE-2020-4759",
|
||||||
"DATE_PUBLIC" : "2020-11-06T00:00:00"
|
"DATE_PUBLIC": "2020-11-06T00:00:00"
|
||||||
},
|
},
|
||||||
"data_type" : "CVE",
|
"data_type": "CVE",
|
||||||
"data_version" : "4.0",
|
"data_version": "4.0",
|
||||||
"references" : {
|
"references": {
|
||||||
"reference_data" : [
|
"reference_data": [
|
||||||
{
|
|
||||||
"title" : "IBM Security Bulletin 6336917 (FileNet Content Manager)",
|
|
||||||
"name" : "https://www.ibm.com/support/pages/node/6336917",
|
|
||||||
"refsource" : "CONFIRM",
|
|
||||||
"url" : "https://www.ibm.com/support/pages/node/6336917"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/188736",
|
|
||||||
"refsource" : "XF",
|
|
||||||
"name" : "ibm-filenet-cve20204759-csv-injection (188736)",
|
|
||||||
"title" : "X-Force Vulnerability Report"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"description" : {
|
|
||||||
"description_data" : [
|
|
||||||
{
|
|
||||||
"lang" : "eng",
|
|
||||||
"value" : "IBM FileNet Content Manager 5.5.4 and 5.5.5 is potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 188736."
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"data_format" : "MITRE",
|
|
||||||
"impact" : {
|
|
||||||
"cvssv3" : {
|
|
||||||
"BM" : {
|
|
||||||
"C" : "H",
|
|
||||||
"AC" : "H",
|
|
||||||
"A" : "H",
|
|
||||||
"S" : "U",
|
|
||||||
"PR" : "N",
|
|
||||||
"AV" : "L",
|
|
||||||
"SCORE" : "7.000",
|
|
||||||
"UI" : "R",
|
|
||||||
"I" : "H"
|
|
||||||
},
|
|
||||||
"TM" : {
|
|
||||||
"RC" : "C",
|
|
||||||
"E" : "U",
|
|
||||||
"RL" : "O"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"affects" : {
|
|
||||||
"vendor" : {
|
|
||||||
"vendor_data" : [
|
|
||||||
{
|
{
|
||||||
"product" : {
|
"title": "IBM Security Bulletin 6336917 (FileNet Content Manager)",
|
||||||
"product_data" : [
|
"name": "https://www.ibm.com/support/pages/node/6336917",
|
||||||
{
|
"refsource": "CONFIRM",
|
||||||
"version" : {
|
"url": "https://www.ibm.com/support/pages/node/6336917"
|
||||||
"version_data" : [
|
},
|
||||||
{
|
{
|
||||||
"version_value" : "5.5.4"
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/188736",
|
||||||
},
|
"refsource": "XF",
|
||||||
{
|
"name": "ibm-filenet-cve20204759-csv-injection (188736)",
|
||||||
"version_value" : "5.5.5"
|
"title": "X-Force Vulnerability Report"
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"product_name" : "FileNet Content Manager"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name" : "IBM"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
},
|
"description": {
|
||||||
"problemtype" : {
|
"description_data": [
|
||||||
"problemtype_data" : [
|
{
|
||||||
{
|
"lang": "eng",
|
||||||
"description" : [
|
"value": "IBM FileNet Content Manager 5.5.4 and 5.5.5 is potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 188736."
|
||||||
{
|
}
|
||||||
"value" : "Gain Access",
|
]
|
||||||
"lang" : "eng"
|
},
|
||||||
}
|
"data_format": "MITRE",
|
||||||
|
"impact": {
|
||||||
|
"cvssv3": {
|
||||||
|
"BM": {
|
||||||
|
"C": "H",
|
||||||
|
"AC": "H",
|
||||||
|
"A": "H",
|
||||||
|
"S": "U",
|
||||||
|
"PR": "N",
|
||||||
|
"AV": "L",
|
||||||
|
"SCORE": "7.000",
|
||||||
|
"UI": "R",
|
||||||
|
"I": "H"
|
||||||
|
},
|
||||||
|
"TM": {
|
||||||
|
"RC": "C",
|
||||||
|
"E": "U",
|
||||||
|
"RL": "O"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"affects": {
|
||||||
|
"vendor": {
|
||||||
|
"vendor_data": [
|
||||||
|
{
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_value": "5.5.4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_value": "5.5.5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"product_name": "FileNet Content Manager"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "IBM"
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
},
|
||||||
}
|
"problemtype": {
|
||||||
}
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "Gain Access",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user