"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-02-10 16:01:15 +00:00
parent a03e1c50ce
commit c21b797d1b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
20 changed files with 500 additions and 38 deletions

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "hp-security-alert@hp.com",
"ID": "CVE-2012-1994",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "HP Systems Insight Manager",
"version": {
"version_data": [
{
"version_value": "before 7.0"
}
]
}
}
]
},
"vendor_name": "HP"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,38 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "HP Systems Insight Manager before 7.0 allows a remote user on adjacent network to access information"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.securityfocus.com/bid/53315",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/53315"
},
{
"url": "http://www.securitytracker.com/id?1026987",
"refsource": "MISC",
"name": "http://www.securitytracker.com/id?1026987"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75294",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75294"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2012-2204",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Guardium",
"version": {
"version_data": [
{
"version_value": "1.1"
}
]
}
}
]
},
"vendor_name": "InfoSphere"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,28 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "InfoSphere Guardium aix_ktap module: DoS"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76968",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76968"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-5828",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,43 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "BlackBerry PlayBook before 2.1 has an Information Disclosure Vulnerability via a Web browser component error"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://www.securityfocus.com/bid/56793",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/56793"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80555",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80555"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/cve/CVE-2012-5828",
"url": "https://packetstormsecurity.com/files/cve/CVE-2012-5828"
},
{
"refsource": "MISC",
"name": "https://www.securityfocus.com/archive/1/524893/30/9240/flat",
"url": "https://www.securityfocus.com/archive/1/524893/30/9240/flat"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/0d871e813a4f",
"refsource": "CONFIRM",
"url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/0d871e813a4f"
},
{
"refsource": "UBUNTU",
"name": "USN-4266-1",
"url": "https://usn.ubuntu.com/4266-1/"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/6dda3c33f35f",
"refsource": "CONFIRM",
"url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/6dda3c33f35f"
},
{
"refsource": "UBUNTU",
"name": "USN-4266-1",
"url": "https://usn.ubuntu.com/4266-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "[debian-lts-announce] 20180108 [SECURITY] [DLA 1231-1] graphicsmagick security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00005.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4266-1",
"url": "https://usn.ubuntu.com/4266-1/"
}
]
}

View File

@ -81,6 +81,11 @@
"name": "103055",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103055"
},
{
"refsource": "UBUNTU",
"name": "USN-4267-1",
"url": "https://usn.ubuntu.com/4267-1/"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-425a1aa7c9",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHIKB4TP6KBJWT2UIPWL5MWMG5QXKGEJ/"
},
{
"refsource": "UBUNTU",
"name": "USN-4266-1",
"url": "https://usn.ubuntu.com/4266-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4266-1",
"url": "https://usn.ubuntu.com/4266-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "https://sourceforge.net/p/graphicsmagick/bugs/473/",
"refsource": "CONFIRM",
"url": "https://sourceforge.net/p/graphicsmagick/bugs/473/"
},
{
"refsource": "UBUNTU",
"name": "USN-4266-1",
"url": "https://usn.ubuntu.com/4266-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "[debian-lts-announce] 20180803 [SECURITY] [DLA 1456-1] graphicsmagick security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00002.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4266-1",
"url": "https://usn.ubuntu.com/4266-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "GLSA-201804-19",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-19"
},
{
"refsource": "UBUNTU",
"name": "USN-4267-1",
"url": "https://usn.ubuntu.com/4267-1/"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "GLSA-201804-19",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-19"
},
{
"refsource": "UBUNTU",
"name": "USN-4267-1",
"url": "https://usn.ubuntu.com/4267-1/"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02",
"refsource": "CONFIRM",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4267-1",
"url": "https://usn.ubuntu.com/4267-1/"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02",
"refsource": "CONFIRM",
"url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02"
},
{
"refsource": "UBUNTU",
"name": "USN-4267-1",
"url": "https://usn.ubuntu.com/4267-1/"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19659",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-19659",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A CSRF vulnerability exists in the Web File Manager's Edit Accounts functionality of Rumpus FTP Server 8.2.9.1. By exploiting it, an attacker can take over a user account by changing the password, update users' details, and escalate privileges via RAPR/DefineUsersSet.html."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/harshit-shukla/CVE",
"url": "https://github.com/harshit-shukla/CVE"
},
{
"refsource": "MISC",
"name": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19659.md",
"url": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19659.md"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19660",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-19660",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A CSRF vulnerability exists in the Web File Manager's Network Setting functionality of Rumpus FTP Server 8.2.9.1. By exploiting it, an attacker can manipulate the SMTP setting and other network settings via RAPR/NetworkSettingsSet.html."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/harshit-shukla/CVE",
"url": "https://github.com/harshit-shukla/CVE"
},
{
"refsource": "MISC",
"name": "https://raw.githubusercontent.com/harshit-shukla/CVE/master/CVE-2019-19660.md",
"url": "https://raw.githubusercontent.com/harshit-shukla/CVE/master/CVE-2019-19660.md"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19663",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-19663",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A CSRF vulnerability exists in the Folder Sets Settings of Web File Manager in Rumpus FTP 8.2.9.1. This allows an attacker to Create/Delete Folders after exploiting it at RAPR/FolderSetsSet.html."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/harshit-shukla/CVE",
"url": "https://github.com/harshit-shukla/CVE"
},
{
"refsource": "MISC",
"name": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19663.md",
"url": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19663.md"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19665",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-19665",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A CSRF vulnerability exists in the FTP Settings of Web File Manager in Rumpus FTP 8.2.9.1. Exploitation of this vulnerability can result in manipulation of Server FTP settings at RAPR/FTPSettingsSet.html."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/harshit-shukla/CVE",
"url": "https://github.com/harshit-shukla/CVE"
},
{
"refsource": "MISC",
"name": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19665.md",
"url": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19665.md"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-8089",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-8089",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Piwigo 2.10.1 is affected by stored XSS via the Group Name Field to the group_list page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://piwigo.org/forum/viewforum.php?id=23",
"refsource": "MISC",
"name": "https://piwigo.org/forum/viewforum.php?id=23"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/Piwigo/Piwigo/issues/1150",
"url": "https://github.com/Piwigo/Piwigo/issues/1150"
}
]
}