"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-05-30 18:00:48 +00:00
parent 62837285be
commit ac095b39e2
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
9 changed files with 207 additions and 10 deletions

View File

@ -66,6 +66,11 @@
"name": "96797",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96797"
},
{
"refsource": "BID",
"name": "94943",
"url": "http://www.securityfocus.com/bid/94943"
}
]
}

View File

@ -136,6 +136,16 @@
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1297",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1296",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
]
}

View File

@ -199,6 +199,16 @@
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1297",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1296",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10948",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Synacor Zimbra Admin UI in Zimbra Collaboration Suite before 8.8.0 beta 2 has Persistent XSS via mail addrs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.zimbra.com/show_bug.cgi?id=107948",
"refsource": "MISC",
"name": "https://bugzilla.zimbra.com/show_bug.cgi?id=107948"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-14425",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "There is a Persistent XSS vulnerability in the briefcase component of Synacor Zimbra Collaboration Suite (ZCS) Zimbra Web Client (ZWC) 8.8.8 before 8.8.8 Patch 7 and 8.8.9 before 8.8.9 Patch 1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"refsource": "MISC",
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
},
{
"url": "https://bugzilla.zimbra.com/show_bug.cgi?id=108970",
"refsource": "MISC",
"name": "https://bugzilla.zimbra.com/show_bug.cgi?id=108970"
}
]
}

View File

@ -188,6 +188,16 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-a4ed7400f4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1297",
"url": "https://access.redhat.com/errata/RHSA-2019:1297"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1296",
"url": "https://access.redhat.com/errata/RHSA-2019:1296"
}
]
},

View File

@ -44,15 +44,35 @@
},
"references": {
"reference_data": [
{
"refsource": "REDHAT",
"name": "RHSA-2019:0971",
"url": "https://access.redhat.com/errata/RHSA-2019:0971"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3839",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3839",
"refsource": "CONFIRM"
},
{
"refsource": "CONFIRM",
"name": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=db24f253409d5d085c2760c814c3e1d3fa2dac59",
"url": "http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=db24f253409d5d085c2760c814c3e1d3fa2dac59"
"refsource": "REDHAT",
"name": "RHSA-2019:1017",
"url": "https://access.redhat.com/errata/RHSA-2019:1017"
},
{
"refsource": "UBUNTU",
"name": "USN-3970-1",
"url": "https://usn.ubuntu.com/3970-1/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4442",
"url": "https://www.debian.org/security/2019/dsa-4442"
},
{
"refsource": "BUGTRAQ",
"name": "20190512 [SECURITY] [DSA 4442-1] ghostscript security update",
"url": "https://seclists.org/bugtraq/2019/May/23"
},
{
"refsource": "CONFIRM",
@ -70,7 +90,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.28 are vulnerable."
"value": "It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable."
}
]
},

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-9723",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "LogicalDOC Community Edition 8.x before 8.2.1 has a path traversal vulnerability that allows reading arbitrary files and the creation of directories, in the class PluginRegistry."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://blog.ripstech.com/2019/logicaldoc-path-traversal/",
"url": "https://blog.ripstech.com/2019/logicaldoc-path-traversal/"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-d05bc7e3df",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOOVCEPQM7TZA6VEZEEB7QZABXNHQEHH/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1300",
"url": "https://access.redhat.com/errata/RHSA-2019:1300"
}
]
}