mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
0e37b4311b
commit
ac6105a0f5
@ -2,7 +2,30 @@
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2014-8673",
|
||||
"STATE": "RESERVED"
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
@ -11,7 +34,43 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Multiple SQL vulnerabilities exist in planning.php, user_list.php, projets.php, user_groupes.php, and groupe_list.php in Simple Online Planning (SOPPlanning)before 1.33."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSS-SQL-Injection-Traversal.html"
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/75726",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.securityfocus.com/bid/75726"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2015/Jul/44",
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2015/Jul/44"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/37604/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.exploit-db.com/exploits/37604/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -19,8 +19,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "9.50",
|
||||
"version_affected": "<"
|
||||
"version_value": "before 9.50"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -61,7 +60,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "It was found that in ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas."
|
||||
"value": "In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-14819",
|
||||
"ASSIGNER": "msiddiqu@redhat.com"
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -18,7 +19,7 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
"version_value": "3.x"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -76,4 +77,4 @@
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -71,6 +71,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -136,6 +136,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -157,6 +157,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0006",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0006"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0046",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0046"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -9,6 +9,7 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "McAfee",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
@ -16,15 +17,13 @@
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_value": "4.8"
|
||||
"version_value": "prior to 4.8"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "McAfee"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -36,7 +35,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.\nThis was originally published with a CVSS rating of High, further investigation has resulted in this being updated to Critical. The root password is common across all instances of ATD prior to 4.8. See the Security bulletin for further details"
|
||||
"value": "Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system. This was originally published with a CVSS rating of High, further investigation has resulted in this being updated to Critical. The root password is common across all instances of ATD prior to 4.8. See the Security bulletin for further details"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -46,17 +45,17 @@
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"version": "3.1",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
@ -74,9 +73,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304"
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10304"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -84,4 +83,4 @@
|
||||
"advisory": "SB10304",
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
}
|
@ -48,6 +48,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853",
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/opencv/opencv/issues/15857",
|
||||
"url": "https://github.com/opencv/opencv/issues/15857"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,7 +60,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability."
|
||||
"value": "An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user