mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 05:58:08 +00:00
- Synchronized data.
This commit is contained in:
parent
83218c48f7
commit
aa9102d98a
62
2018/20xxx/CVE-2018-20800.json
Normal file
62
2018/20xxx/CVE-2018-20800.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2018-20800",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 5.0.31 and 6.0.13. Users updating to 6.0.13 (also patchlevel updates) or 5.0.31 (only major updates) will experience data loss in their agent preferences table."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://community.otrs.com/security-advisory-2018-10-security-update-for-otrs-framework",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://community.otrs.com/security-advisory-2018-10-security-update-for-otrs-framework"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
@ -1,84 +1,85 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER": "secure@dell.com",
|
"ASSIGNER" : "secure@dell.com",
|
||||||
"DATE_PUBLIC": "2019-02-28T05:00:00.000Z",
|
"DATE_PUBLIC" : "2019-02-28T05:00:00.000Z",
|
||||||
"ID": "CVE-2019-3711",
|
"ID" : "CVE-2019-3711",
|
||||||
"STATE": "PUBLIC",
|
"STATE" : "PUBLIC",
|
||||||
"TITLE": "DSA-2019-038: RSA® Authentication Manager Insecure Credential Management Vulnerability"
|
"TITLE" : "DSA-2019-038: RSA® Authentication Manager Insecure Credential Management Vulnerability"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects" : {
|
||||||
"vendor": {
|
"vendor" : {
|
||||||
"vendor_data": [
|
"vendor_data" : [
|
||||||
{
|
{
|
||||||
"product": {
|
"product" : {
|
||||||
"product_data": [
|
"product_data" : [
|
||||||
{
|
{
|
||||||
"product_name": "RSA Authentication Manager",
|
"product_name" : "RSA Authentication Manager",
|
||||||
"version": {
|
"version" : {
|
||||||
"version_data": [
|
"version_data" : [
|
||||||
{
|
{
|
||||||
"affected": "<",
|
"affected" : "<",
|
||||||
"version_name": "8.4",
|
"version_name" : "8.4",
|
||||||
"version_value": "P1"
|
"version_value" : "P1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name": "Dell"
|
"vendor_name" : "Dell"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type" : "CVE",
|
||||||
"data_version": "4.0",
|
"data_version" : "4.0",
|
||||||
"description": {
|
"description" : {
|
||||||
"description_data": [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "RSA Authentication Manager versions prior to 8.4 P1 contain an Insecure Credential Management Vulnerability. A \nmalicious Operations Console administrator may be able to obtain the value of a domain password that another Operations \nConsole administrator had set previously and use it for attacks."
|
"value" : "RSA Authentication Manager versions prior to 8.4 P1 contain an Insecure Credential Management Vulnerability. A malicious Operations Console administrator may be able to obtain the value of a domain password that another Operations Console administrator had set previously and use it for attacks."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
"impact" : {
|
||||||
"cvss": {
|
"cvss" : {
|
||||||
"attackComplexity": "HIGH",
|
"attackComplexity" : "HIGH",
|
||||||
"attackVector": "NETWORK",
|
"attackVector" : "NETWORK",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact" : "NONE",
|
||||||
"baseScore": 5.8,
|
"baseScore" : 5.8,
|
||||||
"baseSeverity": "MEDIUM",
|
"baseSeverity" : "MEDIUM",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact" : "HIGH",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact" : "NONE",
|
||||||
"privilegesRequired": "HIGH",
|
"privilegesRequired" : "HIGH",
|
||||||
"scope": "CHANGED",
|
"scope" : "CHANGED",
|
||||||
"userInteraction": "NONE",
|
"userInteraction" : "NONE",
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||||
"version": "3.0"
|
"version" : "3.0"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
"problemtype" : {
|
||||||
"problemtype_data": [
|
"problemtype_data" : [
|
||||||
{
|
{
|
||||||
"description": [
|
"description" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "insecure credential management"
|
"value" : "insecure credential management"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": {
|
"references" : {
|
||||||
"reference_data": [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"name" : "20190228 DSA-2019-038: RSA Authentication Manager Insecure Credential Management Vulnerability",
|
||||||
"url": "https://seclists.org/fulldisclosure/2019/Mar/5"
|
"refsource" : "FULLDISC",
|
||||||
}
|
"url" : "https://seclists.org/fulldisclosure/2019/Mar/5"
|
||||||
]
|
}
|
||||||
},
|
]
|
||||||
"source": {
|
},
|
||||||
"discovery": "UNKNOWN"
|
"source" : {
|
||||||
}
|
"discovery" : "UNKNOWN"
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
@ -1,83 +1,84 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER": "secure@dell.com",
|
"ASSIGNER" : "secure@dell.com",
|
||||||
"DATE_PUBLIC": "2019-03-09T05:00:00.000Z",
|
"DATE_PUBLIC" : "2019-03-09T05:00:00.000Z",
|
||||||
"ID": "CVE-2019-3715",
|
"ID" : "CVE-2019-3715",
|
||||||
"STATE": "PUBLIC",
|
"STATE" : "PUBLIC",
|
||||||
"TITLE": "Information Exposure Vulnerability"
|
"TITLE" : "Information Exposure Vulnerability"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects" : {
|
||||||
"vendor": {
|
"vendor" : {
|
||||||
"vendor_data": [
|
"vendor_data" : [
|
||||||
{
|
{
|
||||||
"product": {
|
"product" : {
|
||||||
"product_data": [
|
"product_data" : [
|
||||||
{
|
{
|
||||||
"product_name": "RSA Archer",
|
"product_name" : "RSA Archer",
|
||||||
"version": {
|
"version" : {
|
||||||
"version_data": [
|
"version_data" : [
|
||||||
{
|
{
|
||||||
"affected": "<",
|
"affected" : "<",
|
||||||
"version_value": "6.5 P1"
|
"version_value" : "6.5 P1"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name": "Dell"
|
"vendor_name" : "Dell"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type" : "CVE",
|
||||||
"data_version": "4.0",
|
"data_version" : "4.0",
|
||||||
"description": {
|
"description" : {
|
||||||
"description_data": [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. Users' session information is logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks."
|
"value" : "RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. Users' session information is logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
"impact" : {
|
||||||
"cvss": {
|
"cvss" : {
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity" : "LOW",
|
||||||
"attackVector": "LOCAL",
|
"attackVector" : "LOCAL",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact" : "HIGH",
|
||||||
"baseScore": 7.8,
|
"baseScore" : 7.8,
|
||||||
"baseSeverity": "HIGH",
|
"baseSeverity" : "HIGH",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact" : "HIGH",
|
||||||
"integrityImpact": "HIGH",
|
"integrityImpact" : "HIGH",
|
||||||
"privilegesRequired": "LOW",
|
"privilegesRequired" : "LOW",
|
||||||
"scope": "UNCHANGED",
|
"scope" : "UNCHANGED",
|
||||||
"userInteraction": "NONE",
|
"userInteraction" : "NONE",
|
||||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
"vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
"version": "3.0"
|
"version" : "3.0"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
"problemtype" : {
|
||||||
"problemtype_data": [
|
"problemtype_data" : [
|
||||||
{
|
{
|
||||||
"description": [
|
"description" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "Information Exposure Vulnerability"
|
"value" : "Information Exposure Vulnerability"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": {
|
"references" : {
|
||||||
"reference_data": [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"name" : "20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities",
|
||||||
"url": "https://seclists.org/fulldisclosure/2019/Mar/19"
|
"refsource" : "FULLDISC",
|
||||||
|
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"source": {
|
"source" : {
|
||||||
"discovery": "UNKNOWN"
|
"discovery" : "UNKNOWN"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,83 +1,84 @@
|
|||||||
{
|
{
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER": "secure@dell.com",
|
"ASSIGNER" : "secure@dell.com",
|
||||||
"DATE_PUBLIC": "2019-03-09T05:00:00.000Z",
|
"DATE_PUBLIC" : "2019-03-09T05:00:00.000Z",
|
||||||
"ID": "CVE-2019-3716",
|
"ID" : "CVE-2019-3716",
|
||||||
"STATE": "PUBLIC",
|
"STATE" : "PUBLIC",
|
||||||
"TITLE": "Information Exposure Vulnerability"
|
"TITLE" : "Information Exposure Vulnerability"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects" : {
|
||||||
"vendor": {
|
"vendor" : {
|
||||||
"vendor_data": [
|
"vendor_data" : [
|
||||||
{
|
{
|
||||||
"product": {
|
"product" : {
|
||||||
"product_data": [
|
"product_data" : [
|
||||||
{
|
{
|
||||||
"product_name": "RSA Archer",
|
"product_name" : "RSA Archer",
|
||||||
"version": {
|
"version" : {
|
||||||
"version_data": [
|
"version_data" : [
|
||||||
{
|
{
|
||||||
"affected": "<",
|
"affected" : "<",
|
||||||
"version_value": "6.5 P2"
|
"version_value" : "6.5 P2"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"vendor_name": "Dell"
|
"vendor_name" : "Dell"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type" : "CVE",
|
||||||
"data_version": "4.0",
|
"data_version" : "4.0",
|
||||||
"description": {
|
"description" : {
|
||||||
"description_data": [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks."
|
"value" : "RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"impact": {
|
"impact" : {
|
||||||
"cvss": {
|
"cvss" : {
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity" : "LOW",
|
||||||
"attackVector": "LOCAL",
|
"attackVector" : "LOCAL",
|
||||||
"availabilityImpact": "HIGH",
|
"availabilityImpact" : "HIGH",
|
||||||
"baseScore": 7.8,
|
"baseScore" : 7.8,
|
||||||
"baseSeverity": "HIGH",
|
"baseSeverity" : "HIGH",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact" : "HIGH",
|
||||||
"integrityImpact": "HIGH",
|
"integrityImpact" : "HIGH",
|
||||||
"privilegesRequired": "LOW",
|
"privilegesRequired" : "LOW",
|
||||||
"scope": "UNCHANGED",
|
"scope" : "UNCHANGED",
|
||||||
"userInteraction": "NONE",
|
"userInteraction" : "NONE",
|
||||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
"vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
"version": "3.0"
|
"version" : "3.0"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
"problemtype" : {
|
||||||
"problemtype_data": [
|
"problemtype_data" : [
|
||||||
{
|
{
|
||||||
"description": [
|
"description" : [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang" : "eng",
|
||||||
"value": "Information Exposure Vulnerability"
|
"value" : "Information Exposure Vulnerability"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": {
|
"references" : {
|
||||||
"reference_data": [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
"refsource": "CONFIRM",
|
"name" : "20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities",
|
||||||
"url": "https://seclists.org/fulldisclosure/2019/Mar/19"
|
"refsource" : "FULLDISC",
|
||||||
|
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"source": {
|
"source" : {
|
||||||
"discovery": "UNKNOWN"
|
"discovery" : "UNKNOWN"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -1,84 +1,85 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta" : {
|
||||||
"data_format": "MITRE",
|
"ASSIGNER" : "secure@dell.com",
|
||||||
"data_version": "4.0",
|
"DATE_PUBLIC" : "2019-03-12T00:00:00.000Z",
|
||||||
"CVE_data_meta": {
|
"ID" : "CVE-2019-3785",
|
||||||
"ASSIGNER": "secure@dell.com",
|
"STATE" : "PUBLIC",
|
||||||
"DATE_PUBLIC": "2019-03-12T00:00:00.000Z",
|
"TITLE" : "Cloud Controller provides signed URL with write authorization to read only user"
|
||||||
"ID": "CVE-2019-3785",
|
},
|
||||||
"STATE": "PUBLIC",
|
"affects" : {
|
||||||
"TITLE": "Cloud Controller provides signed URL with write authorization to read only user"
|
"vendor" : {
|
||||||
},
|
"vendor_data" : [
|
||||||
"source": {
|
{
|
||||||
"discovery": "UNKNOWN"
|
"product" : {
|
||||||
},
|
"product_data" : [
|
||||||
"affects": {
|
{
|
||||||
"vendor": {
|
"product_name" : "CAPI",
|
||||||
"vendor_data": [
|
"version" : {
|
||||||
{
|
"version_data" : [
|
||||||
"product": {
|
{
|
||||||
"product_data": [
|
"affected" : "<",
|
||||||
{
|
"version_name" : "All",
|
||||||
"product_name": "CAPI",
|
"version_value" : "1.78.0"
|
||||||
"version": {
|
}
|
||||||
"version_data": [
|
]
|
||||||
{
|
}
|
||||||
"affected": "<",
|
}
|
||||||
"version_name": "All",
|
|
||||||
"version_value": "1.78.0"
|
|
||||||
}
|
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
}
|
"vendor_name" : "Cloud Foundry"
|
||||||
]
|
}
|
||||||
},
|
]
|
||||||
"vendor_name": "Cloud Foundry"
|
}
|
||||||
}
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "Cloud Foundry Cloud Controller, versions prior to 1.78.0, contain an endpoint with improper authorization. A remote authenticated malicious user with read permissions can request package information and receive a signed bit-service url that grants the user write permissions to the bit-service."
|
||||||
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
},
|
"impact" : {
|
||||||
"description": {
|
"cvss" : {
|
||||||
"description_data": [
|
"attackComplexity" : "LOW",
|
||||||
{
|
"attackVector" : "NETWORK",
|
||||||
"lang": "eng",
|
"availabilityImpact" : "HIGH",
|
||||||
"value": "Cloud Foundry Cloud Controller, versions prior to 1.78.0, contain an endpoint with improper authorization. A remote authenticated malicious user with read permissions can request package information and receive a signed bit-service url that grants the user write permissions to the bit-service."
|
"baseScore" : 6.5,
|
||||||
|
"baseSeverity" : "MEDIUM",
|
||||||
|
"confidentialityImpact" : "NONE",
|
||||||
|
"integrityImpact" : "HIGH",
|
||||||
|
"privilegesRequired" : "HIGH",
|
||||||
|
"scope" : "UNCHANGED",
|
||||||
|
"userInteraction" : "NONE",
|
||||||
|
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||||
|
"version" : "3.0"
|
||||||
}
|
}
|
||||||
]
|
},
|
||||||
},
|
"problemtype" : {
|
||||||
"problemtype": {
|
"problemtype_data" : [
|
||||||
"problemtype_data": [
|
{
|
||||||
{
|
"description" : [
|
||||||
"description": [
|
{
|
||||||
{
|
"lang" : "eng",
|
||||||
"lang": "eng",
|
"value" : "CWE-285: Improper Authorization"
|
||||||
"value": "CWE-285: Improper Authorization"
|
}
|
||||||
}
|
]
|
||||||
]
|
}
|
||||||
}
|
]
|
||||||
]
|
},
|
||||||
},
|
"references" : {
|
||||||
"references": {
|
"reference_data" : [
|
||||||
"reference_data": [
|
{
|
||||||
{
|
"name" : "https://www.cloudfoundry.org/blog/cve-2019-3785",
|
||||||
"refsource": "CONFIRM",
|
"refsource" : "CONFIRM",
|
||||||
"url": "https://www.cloudfoundry.org/blog/cve-2019-3785",
|
"url" : "https://www.cloudfoundry.org/blog/cve-2019-3785"
|
||||||
"name": "https://www.cloudfoundry.org/blog/cve-2019-3785"
|
}
|
||||||
}
|
]
|
||||||
]},
|
},
|
||||||
"impact": {
|
"source" : {
|
||||||
"cvss": {
|
"discovery" : "UNKNOWN"
|
||||||
"attackComplexity": "LOW",
|
}
|
||||||
"attackVector": "NETWORK",
|
}
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 6.5,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
|
||||||
"version": "3.0"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K97241515",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K97241515"
|
"url" : "https://support.f5.com/csp/article/K97241515"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -57,6 +57,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K29280193",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K29280193"
|
"url" : "https://support.f5.com/csp/article/K29280193"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -57,6 +57,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K44603900",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K44603900"
|
"url" : "https://support.f5.com/csp/article/K44603900"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -57,6 +57,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K46401178",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K46401178"
|
"url" : "https://support.f5.com/csp/article/K46401178"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K23734425",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K23734425"
|
"url" : "https://support.f5.com/csp/article/K23734425"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://support.f5.com/csp/article/K25359902",
|
||||||
|
"refsource" : "CONFIRM",
|
||||||
"url" : "https://support.f5.com/csp/article/K25359902"
|
"url" : "https://support.f5.com/csp/article/K25359902"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
62
2019/9xxx/CVE-2019-9751.json
Normal file
62
2019/9xxx/CVE-2019-9751.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9751",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 6.x before 6.0.17 and 7.x before 7.0.5. An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS. This is related to Kernel/Output/Template/Document.pm."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://community.otrs.com/security-advisory-2019-02-security-update-for-otrs-framework",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://community.otrs.com/security-advisory-2019-02-security-update-for-otrs-framework"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
62
2019/9xxx/CVE-2019-9752.json
Normal file
62
2019/9xxx/CVE-2019-9752.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9752",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
18
2019/9xxx/CVE-2019-9753.json
Normal file
18
2019/9xxx/CVE-2019-9753.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9753",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
62
2019/9xxx/CVE-2019-9754.json
Normal file
62
2019/9xxx/CVE-2019-9754.json
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9754",
|
||||||
|
"STATE" : "PUBLIC"
|
||||||
|
},
|
||||||
|
"affects" : {
|
||||||
|
"vendor" : {
|
||||||
|
"vendor_data" : [
|
||||||
|
{
|
||||||
|
"product" : {
|
||||||
|
"product_data" : [
|
||||||
|
{
|
||||||
|
"product_name" : "n/a",
|
||||||
|
"version" : {
|
||||||
|
"version_data" : [
|
||||||
|
{
|
||||||
|
"version_value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 1 byte out of bounds write in the end_macro function in tccpp.c."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype" : {
|
||||||
|
"problemtype_data" : [
|
||||||
|
{
|
||||||
|
"description" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "n/a"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references" : {
|
||||||
|
"reference_data" : [
|
||||||
|
{
|
||||||
|
"name" : "https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user