"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-01-07 18:01:12 +00:00
parent 0e37b4311b
commit ac6105a0f5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
19 changed files with 162 additions and 29 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-8673",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,43 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Multiple SQL vulnerabilities exist in planning.php, user_list.php, projets.php, user_groupes.php, and groupe_list.php in Simple Online Planning (SOPPlanning)before 1.33."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
},
{
"url": "http://www.securityfocus.com/bid/75726",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/75726"
},
{
"url": "http://seclists.org/fulldisclosure/2015/Jul/44",
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2015/Jul/44"
},
{
"url": "https://www.exploit-db.com/exploits/37604/",
"refsource": "MISC",
"name": "https://www.exploit-db.com/exploits/37604/"
}
]
}

View File

@ -19,8 +19,7 @@
"version": {
"version_data": [
{
"version_value": "9.50",
"version_affected": "<"
"version_value": "before 9.50"
}
]
}
@ -61,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "It was found that in ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas."
"value": "In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas."
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14819",
"ASSIGNER": "msiddiqu@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -18,7 +19,7 @@
"version": {
"version_data": [
{
"version_value": "n/a"
"version_value": "3.x"
}
]
}
@ -76,4 +77,4 @@
]
]
}
}
}

View File

@ -71,6 +71,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -136,6 +136,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -161,6 +161,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -157,6 +157,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0006",
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0046",
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
}
]
}

View File

@ -9,6 +9,7 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "McAfee",
"product": {
"product_data": [
{
@ -16,15 +17,13 @@
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "4.8"
"version_value": "prior to 4.8"
}
]
}
}
]
},
"vendor_name": "McAfee"
}
}
]
}
@ -36,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.\nThis was originally published with a CVSS rating of High, further investigation has resulted in this being updated to Critical. The root password is common across all instances of ATD prior to 4.8. See the Security bulletin for further details"
"value": "Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system. This was originally published with a CVSS rating of High, further investigation has resulted in this being updated to Critical. The root password is common across all instances of ATD prior to 4.8. See the Security bulletin for further details"
}
]
},
@ -46,17 +45,17 @@
"impact": {
"cvss": {
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
}
},
"problemtype": {
@ -74,9 +73,9 @@
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304"
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304"
}
]
},
@ -84,4 +83,4 @@
"advisory": "SB10304",
"discovery": "EXTERNAL"
}
}
}

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853"
},
{
"refsource": "MISC",
"name": "https://github.com/opencv/opencv/issues/15857",
"url": "https://github.com/opencv/opencv/issues/15857"
}
]
},
@ -55,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability."
"value": "An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability."
}
]
}