mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
- Synchronized data.
This commit is contained in:
parent
83218c48f7
commit
aa9102d98a
62
2018/20xxx/CVE-2018-20800.json
Normal file
62
2018/20xxx/CVE-2018-20800.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2018-20800",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 5.0.31 and 6.0.13. Users updating to 6.0.13 (also patchlevel updates) or 5.0.31 (only major updates) will experience data loss in their agent preferences table."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://community.otrs.com/security-advisory-2018-10-security-update-for-otrs-framework",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://community.otrs.com/security-advisory-2018-10-security-update-for-otrs-framework"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
@ -38,7 +38,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value": "RSA Authentication Manager versions prior to 8.4 P1 contain an Insecure Credential Management Vulnerability. A \nmalicious Operations Console administrator may be able to obtain the value of a domain password that another Operations \nConsole administrator had set previously and use it for attacks."
|
"value" : "RSA Authentication Manager versions prior to 8.4 P1 contain an Insecure Credential Management Vulnerability. A malicious Operations Console administrator may be able to obtain the value of a domain password that another Operations Console administrator had set previously and use it for attacks."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -73,7 +73,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"name" : "20190228 DSA-2019-038: RSA Authentication Manager Insecure Credential Management Vulnerability",
|
||||||
|
"refsource" : "FULLDISC",
|
||||||
"url" : "https://seclists.org/fulldisclosure/2019/Mar/5"
|
"url" : "https://seclists.org/fulldisclosure/2019/Mar/5"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -72,7 +72,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"name" : "20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities",
|
||||||
|
"refsource" : "FULLDISC",
|
||||||
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
|
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -72,7 +72,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"name" : "20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities",
|
||||||
|
"refsource" : "FULLDISC",
|
||||||
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
|
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -1,7 +1,4 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
|
||||||
"data_format": "MITRE",
|
|
||||||
"data_version": "4.0",
|
|
||||||
"CVE_data_meta" : {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER" : "secure@dell.com",
|
"ASSIGNER" : "secure@dell.com",
|
||||||
"DATE_PUBLIC" : "2019-03-12T00:00:00.000Z",
|
"DATE_PUBLIC" : "2019-03-12T00:00:00.000Z",
|
||||||
@ -9,9 +6,6 @@
|
|||||||
"STATE" : "PUBLIC",
|
"STATE" : "PUBLIC",
|
||||||
"TITLE" : "Cloud Controller provides signed URL with write authorization to read only user"
|
"TITLE" : "Cloud Controller provides signed URL with write authorization to read only user"
|
||||||
},
|
},
|
||||||
"source": {
|
|
||||||
"discovery": "UNKNOWN"
|
|
||||||
},
|
|
||||||
"affects" : {
|
"affects" : {
|
||||||
"vendor" : {
|
"vendor" : {
|
||||||
"vendor_data" : [
|
"vendor_data" : [
|
||||||
@ -37,6 +31,9 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
"description" : {
|
"description" : {
|
||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
@ -45,6 +42,22 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"impact" : {
|
||||||
|
"cvss" : {
|
||||||
|
"attackComplexity" : "LOW",
|
||||||
|
"attackVector" : "NETWORK",
|
||||||
|
"availabilityImpact" : "HIGH",
|
||||||
|
"baseScore" : 6.5,
|
||||||
|
"baseSeverity" : "MEDIUM",
|
||||||
|
"confidentialityImpact" : "NONE",
|
||||||
|
"integrityImpact" : "HIGH",
|
||||||
|
"privilegesRequired" : "HIGH",
|
||||||
|
"scope" : "UNCHANGED",
|
||||||
|
"userInteraction" : "NONE",
|
||||||
|
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||||
|
"version" : "3.0"
|
||||||
|
}
|
||||||
|
},
|
||||||
"problemtype" : {
|
"problemtype" : {
|
||||||
"problemtype_data" : [
|
"problemtype_data" : [
|
||||||
{
|
{
|
||||||
@ -60,25 +73,13 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://www.cloudfoundry.org/blog/cve-2019-3785",
|
||||||
"refsource" : "CONFIRM",
|
"refsource" : "CONFIRM",
|
||||||
"url": "https://www.cloudfoundry.org/blog/cve-2019-3785",
|
"url" : "https://www.cloudfoundry.org/blog/cve-2019-3785"
|
||||||
"name": "https://www.cloudfoundry.org/blog/cve-2019-3785"
|
|
||||||
}
|
|
||||||
]},
|
|
||||||
"impact": {
|
|
||||||
"cvss": {
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 6.5,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"source" : {
|
||||||
|
"discovery" : "UNKNOWN"
|
||||||
}
|
}
|
||||||
}
|
}
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K97241515",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K97241515"
|
"url" : "https://support.f5.com/csp/article/K97241515"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -57,6 +57,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K29280193",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K29280193"
|
"url" : "https://support.f5.com/csp/article/K29280193"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -57,6 +57,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K44603900",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K44603900"
|
"url" : "https://support.f5.com/csp/article/K44603900"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -57,6 +57,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K46401178",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K46401178"
|
"url" : "https://support.f5.com/csp/article/K46401178"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K23734425",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K23734425"
|
"url" : "https://support.f5.com/csp/article/K23734425"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K25359902",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K25359902"
|
"url" : "https://support.f5.com/csp/article/K25359902"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
62
2019/9xxx/CVE-2019-9751.json
Normal file
62
2019/9xxx/CVE-2019-9751.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9751",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 6.x before 6.0.17 and 7.x before 7.0.5. An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS. This is related to Kernel/Output/Template/Document.pm."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://community.otrs.com/security-advisory-2019-02-security-update-for-otrs-framework",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://community.otrs.com/security-advisory-2019-02-security-update-for-otrs-framework"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
62
2019/9xxx/CVE-2019-9752.json
Normal file
62
2019/9xxx/CVE-2019-9752.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9752",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/9xxx/CVE-2019-9753.json
Normal file
18
2019/9xxx/CVE-2019-9753.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9753",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
62
2019/9xxx/CVE-2019-9754.json
Normal file
62
2019/9xxx/CVE-2019-9754.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9754",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 1 byte out of bounds write in the end_macro function in tccpp.c."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user