- Synchronized data.

This commit is contained in:
CVE Team 2019-03-13 18:04:42 -04:00
parent 83218c48f7
commit aa9102d98a
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
15 changed files with 546 additions and 264 deletions

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-20800",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 5.0.31 and 6.0.13. Users updating to 6.0.13 (also patchlevel updates) or 5.0.31 (only major updates) will experience data loss in their agent preferences table."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://community.otrs.com/security-advisory-2018-10-security-update-for-otrs-framework",
"refsource" : "MISC",
"url" : "https://community.otrs.com/security-advisory-2018-10-security-update-for-otrs-framework"
}
]
}
}

View File

@ -1,84 +1,85 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "secure@dell.com", "ASSIGNER" : "secure@dell.com",
"DATE_PUBLIC": "2019-02-28T05:00:00.000Z", "DATE_PUBLIC" : "2019-02-28T05:00:00.000Z",
"ID": "CVE-2019-3711", "ID" : "CVE-2019-3711",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "DSA-2019-038: RSA® Authentication Manager Insecure Credential Management Vulnerability" "TITLE" : "DSA-2019-038: RSA® Authentication Manager Insecure Credential Management Vulnerability"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "RSA Authentication Manager", "product_name" : "RSA Authentication Manager",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"affected": "<", "affected" : "<",
"version_name": "8.4", "version_name" : "8.4",
"version_value": "P1" "version_value" : "P1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Dell" "vendor_name" : "Dell"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "RSA Authentication Manager versions prior to 8.4 P1 contain an Insecure Credential Management Vulnerability. A \nmalicious Operations Console administrator may be able to obtain the value of a domain password that another Operations \nConsole administrator had set previously and use it for attacks." "value" : "RSA Authentication Manager versions prior to 8.4 P1 contain an Insecure Credential Management Vulnerability. A malicious Operations Console administrator may be able to obtain the value of a domain password that another Operations Console administrator had set previously and use it for attacks."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "HIGH", "attackComplexity" : "HIGH",
"attackVector": "NETWORK", "attackVector" : "NETWORK",
"availabilityImpact": "NONE", "availabilityImpact" : "NONE",
"baseScore": 5.8, "baseScore" : 5.8,
"baseSeverity": "MEDIUM", "baseSeverity" : "MEDIUM",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "NONE", "integrityImpact" : "NONE",
"privilegesRequired": "HIGH", "privilegesRequired" : "HIGH",
"scope": "CHANGED", "scope" : "CHANGED",
"userInteraction": "NONE", "userInteraction" : "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "vectorString" : "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "insecure credential management" "value" : "insecure credential management"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"refsource": "CONFIRM", "name" : "20190228 DSA-2019-038: RSA Authentication Manager Insecure Credential Management Vulnerability",
"url": "https://seclists.org/fulldisclosure/2019/Mar/5" "refsource" : "FULLDISC",
} "url" : "https://seclists.org/fulldisclosure/2019/Mar/5"
] }
}, ]
"source": { },
"discovery": "UNKNOWN" "source" : {
} "discovery" : "UNKNOWN"
} }
}

View File

@ -1,83 +1,84 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "secure@dell.com", "ASSIGNER" : "secure@dell.com",
"DATE_PUBLIC": "2019-03-09T05:00:00.000Z", "DATE_PUBLIC" : "2019-03-09T05:00:00.000Z",
"ID": "CVE-2019-3715", "ID" : "CVE-2019-3715",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Information Exposure Vulnerability" "TITLE" : "Information Exposure Vulnerability"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "RSA Archer", "product_name" : "RSA Archer",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"affected": "<", "affected" : "<",
"version_value": "6.5 P1" "version_value" : "6.5 P1"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Dell" "vendor_name" : "Dell"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. Users' session information is logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks." "value" : "RSA Archer versions, prior to 6.5 SP1, contain an information exposure vulnerability. Users' session information is logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "LOW", "attackComplexity" : "LOW",
"attackVector": "LOCAL", "attackVector" : "LOCAL",
"availabilityImpact": "HIGH", "availabilityImpact" : "HIGH",
"baseScore": 7.8, "baseScore" : 7.8,
"baseSeverity": "HIGH", "baseSeverity" : "HIGH",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "HIGH", "integrityImpact" : "HIGH",
"privilegesRequired": "LOW", "privilegesRequired" : "LOW",
"scope": "UNCHANGED", "scope" : "UNCHANGED",
"userInteraction": "NONE", "userInteraction" : "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Information Exposure Vulnerability" "value" : "Information Exposure Vulnerability"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"refsource": "CONFIRM", "name" : "20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities",
"url": "https://seclists.org/fulldisclosure/2019/Mar/19" "refsource" : "FULLDISC",
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
} }
] ]
}, },
"source": { "source" : {
"discovery": "UNKNOWN" "discovery" : "UNKNOWN"
} }
} }

View File

@ -1,83 +1,84 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "secure@dell.com", "ASSIGNER" : "secure@dell.com",
"DATE_PUBLIC": "2019-03-09T05:00:00.000Z", "DATE_PUBLIC" : "2019-03-09T05:00:00.000Z",
"ID": "CVE-2019-3716", "ID" : "CVE-2019-3716",
"STATE": "PUBLIC", "STATE" : "PUBLIC",
"TITLE": "Information Exposure Vulnerability" "TITLE" : "Information Exposure Vulnerability"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "RSA Archer", "product_name" : "RSA Archer",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"affected": "<", "affected" : "<",
"version_value": "6.5 P2" "version_value" : "6.5 P2"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Dell" "vendor_name" : "Dell"
} }
] ]
} }
}, },
"data_format": "MITRE", "data_format" : "MITRE",
"data_type": "CVE", "data_type" : "CVE",
"data_version": "4.0", "data_version" : "4.0",
"description": { "description" : {
"description_data": [ "description_data" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks." "value" : "RSA Archer versions, prior to 6.5 SP2, contain an information exposure vulnerability. The database connection password may get logged in plain text in the RSA Archer log files. An authenticated malicious local user with access to the log files may obtain the exposed password to use it in further attacks."
} }
] ]
}, },
"impact": { "impact" : {
"cvss": { "cvss" : {
"attackComplexity": "LOW", "attackComplexity" : "LOW",
"attackVector": "LOCAL", "attackVector" : "LOCAL",
"availabilityImpact": "HIGH", "availabilityImpact" : "HIGH",
"baseScore": 7.8, "baseScore" : 7.8,
"baseSeverity": "HIGH", "baseSeverity" : "HIGH",
"confidentialityImpact": "HIGH", "confidentialityImpact" : "HIGH",
"integrityImpact": "HIGH", "integrityImpact" : "HIGH",
"privilegesRequired": "LOW", "privilegesRequired" : "LOW",
"scope": "UNCHANGED", "scope" : "UNCHANGED",
"userInteraction": "NONE", "userInteraction" : "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0" "version" : "3.0"
} }
}, },
"problemtype": { "problemtype" : {
"problemtype_data": [ "problemtype_data" : [
{ {
"description": [ "description" : [
{ {
"lang": "eng", "lang" : "eng",
"value": "Information Exposure Vulnerability" "value" : "Information Exposure Vulnerability"
} }
] ]
} }
] ]
}, },
"references": { "references" : {
"reference_data": [ "reference_data" : [
{ {
"refsource": "CONFIRM", "name" : "20190306 DSA-2019-025: RSA Archer GRC Platform Multiple Vulnerabilities",
"url": "https://seclists.org/fulldisclosure/2019/Mar/19" "refsource" : "FULLDISC",
"url" : "https://seclists.org/fulldisclosure/2019/Mar/19"
} }
] ]
}, },
"source": { "source" : {
"discovery": "UNKNOWN" "discovery" : "UNKNOWN"
} }
} }

View File

@ -1,84 +1,85 @@
{ {
"data_type": "CVE", "CVE_data_meta" : {
"data_format": "MITRE", "ASSIGNER" : "secure@dell.com",
"data_version": "4.0", "DATE_PUBLIC" : "2019-03-12T00:00:00.000Z",
"CVE_data_meta": { "ID" : "CVE-2019-3785",
"ASSIGNER": "secure@dell.com", "STATE" : "PUBLIC",
"DATE_PUBLIC": "2019-03-12T00:00:00.000Z", "TITLE" : "Cloud Controller provides signed URL with write authorization to read only user"
"ID": "CVE-2019-3785", },
"STATE": "PUBLIC", "affects" : {
"TITLE": "Cloud Controller provides signed URL with write authorization to read only user" "vendor" : {
}, "vendor_data" : [
"source": { {
"discovery": "UNKNOWN" "product" : {
}, "product_data" : [
"affects": { {
"vendor": { "product_name" : "CAPI",
"vendor_data": [ "version" : {
{ "version_data" : [
"product": { {
"product_data": [ "affected" : "<",
{ "version_name" : "All",
"product_name": "CAPI", "version_value" : "1.78.0"
"version": { }
"version_data": [ ]
{ }
"affected": "<", }
"version_name": "All",
"version_value": "1.78.0"
}
] ]
} },
} "vendor_name" : "Cloud Foundry"
] }
}, ]
"vendor_name": "Cloud Foundry" }
} },
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Cloud Foundry Cloud Controller, versions prior to 1.78.0, contain an endpoint with improper authorization. A remote authenticated malicious user with read permissions can request package information and receive a signed bit-service url that grants the user write permissions to the bit-service."
}
] ]
} },
}, "impact" : {
"description": { "cvss" : {
"description_data": [ "attackComplexity" : "LOW",
{ "attackVector" : "NETWORK",
"lang": "eng", "availabilityImpact" : "HIGH",
"value": "Cloud Foundry Cloud Controller, versions prior to 1.78.0, contain an endpoint with improper authorization. A remote authenticated malicious user with read permissions can request package information and receive a signed bit-service url that grants the user write permissions to the bit-service." "baseScore" : 6.5,
"baseSeverity" : "MEDIUM",
"confidentialityImpact" : "NONE",
"integrityImpact" : "HIGH",
"privilegesRequired" : "HIGH",
"scope" : "UNCHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version" : "3.0"
} }
] },
}, "problemtype" : {
"problemtype": { "problemtype_data" : [
"problemtype_data": [ {
{ "description" : [
"description": [ {
{ "lang" : "eng",
"lang": "eng", "value" : "CWE-285: Improper Authorization"
"value": "CWE-285: Improper Authorization" }
} ]
] }
} ]
] },
}, "references" : {
"references": { "reference_data" : [
"reference_data": [ {
{ "name" : "https://www.cloudfoundry.org/blog/cve-2019-3785",
"refsource": "CONFIRM", "refsource" : "CONFIRM",
"url": "https://www.cloudfoundry.org/blog/cve-2019-3785", "url" : "https://www.cloudfoundry.org/blog/cve-2019-3785"
"name": "https://www.cloudfoundry.org/blog/cve-2019-3785" }
} ]
]}, },
"impact": { "source" : {
"cvss": { "discovery" : "UNKNOWN"
"attackComplexity": "LOW", }
"attackVector": "NETWORK", }
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
}
}
}

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://support.f5.com/csp/article/K97241515",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K97241515" "url" : "https://support.f5.com/csp/article/K97241515"
} }
] ]

View File

@ -57,6 +57,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://support.f5.com/csp/article/K29280193",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K29280193" "url" : "https://support.f5.com/csp/article/K29280193"
} }
] ]

View File

@ -57,6 +57,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://support.f5.com/csp/article/K44603900",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K44603900" "url" : "https://support.f5.com/csp/article/K44603900"
} }
] ]

View File

@ -57,6 +57,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://support.f5.com/csp/article/K46401178",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K46401178" "url" : "https://support.f5.com/csp/article/K46401178"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://support.f5.com/csp/article/K23734425",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K23734425" "url" : "https://support.f5.com/csp/article/K23734425"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://support.f5.com/csp/article/K25359902",
"refsource" : "CONFIRM",
"url" : "https://support.f5.com/csp/article/K25359902" "url" : "https://support.f5.com/csp/article/K25359902"
} }
] ]

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-9751",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 6.x before 6.0.17 and 7.x before 7.0.5. An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS. This is related to Kernel/Output/Template/Document.pm."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://community.otrs.com/security-advisory-2019-02-security-update-for-otrs-framework",
"refsource" : "MISC",
"url" : "https://community.otrs.com/security-advisory-2019-02-security-update-for-otrs-framework"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-9752",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework",
"refsource" : "MISC",
"url" : "https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-9753",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-9754",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 1 byte out of bounds write in the end_macro function in tccpp.c."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html",
"refsource" : "MISC",
"url" : "https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html"
}
]
}
}