mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5bc6109051
commit
c5a4022d07
@ -66,6 +66,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75",
|
"name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75",
|
||||||
"url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75"
|
"url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2019:2233",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -66,6 +66,11 @@
|
|||||||
"refsource": "MISC",
|
"refsource": "MISC",
|
||||||
"name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75",
|
"name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75",
|
||||||
"url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75"
|
"url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2019:2233",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,63 +1,67 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_version": "4.0",
|
"data_version": "4.0",
|
||||||
"CVE_data_meta": {
|
"CVE_data_meta": {
|
||||||
"ASSIGNER": "bressers@elastic.co",
|
"ASSIGNER": "security@elastic.co",
|
||||||
"ID": "CVE-2019-7618",
|
"ID": "CVE-2019-7618",
|
||||||
"STATE": "PUBLIC"
|
"STATE": "PUBLIC"
|
||||||
},
|
},
|
||||||
"affects": {
|
"affects": {
|
||||||
"vendor": {
|
"vendor": {
|
||||||
"vendor_data": [
|
"vendor_data": [
|
||||||
{
|
{
|
||||||
"vendor_name": "Elastic",
|
"vendor_name": "Elastic",
|
||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Elastic Code",
|
"product_name": "Elastic Code",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "7.3.0, 7.3.1, and 7.3.2"
|
"version_value": "7.3.0, 7.3.1, and 7.3.2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
]
|
]
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
},
|
||||||
}
|
"problemtype": {
|
||||||
},
|
"problemtype_data": [
|
||||||
"problemtype": {
|
{
|
||||||
"problemtype_data": [
|
"description": [
|
||||||
{
|
{
|
||||||
"description": [
|
"lang": "eng",
|
||||||
{
|
"value": "CWE-538: File and Directory Information Exposure"
|
||||||
"lang": "eng",
|
}
|
||||||
"value": "CWE-538: File and Directory Information Exposure"
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
]
|
"references": {
|
||||||
},
|
"reference_data": [
|
||||||
"references": {
|
{
|
||||||
"reference_data": [
|
"url": "https://staging-website.elastic.co/community/security",
|
||||||
{
|
"refsource": "MISC",
|
||||||
"url": "https://staging-website.elastic.co/community/security"
|
"name": "https://staging-website.elastic.co/community/security"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831"
|
"url": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831",
|
||||||
}
|
"refsource": "MISC",
|
||||||
]
|
"name": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831"
|
||||||
},
|
}
|
||||||
"description": {
|
]
|
||||||
"description_data": [
|
},
|
||||||
{
|
"description": {
|
||||||
"lang": "eng",
|
"description_data": [
|
||||||
"value": "A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user."
|
{
|
||||||
}
|
"lang": "eng",
|
||||||
]
|
"value": "A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user."
|
||||||
}
|
}
|
||||||
}
|
]
|
||||||
|
}
|
||||||
|
}
|
@ -223,6 +223,11 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"name": "RHSA-2019:2949",
|
"name": "RHSA-2019:2949",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2949"
|
"url": "https://access.redhat.com/errata/RHSA-2019:2949"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2019:2232",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -223,6 +223,11 @@
|
|||||||
"refsource": "REDHAT",
|
"refsource": "REDHAT",
|
||||||
"name": "RHSA-2019:2949",
|
"name": "RHSA-2019:2949",
|
||||||
"url": "https://access.redhat.com/errata/RHSA-2019:2949"
|
"url": "https://access.redhat.com/errata/RHSA-2019:2949"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "SUSE",
|
||||||
|
"name": "openSUSE-SU-2019:2232",
|
||||||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user