"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-06-02 14:01:33 +00:00
parent ee41eff90c
commit c846f6818b
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
11 changed files with 785 additions and 471 deletions

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-10959",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-10959",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "resources/src/mediawiki.page.ready/ready.js in MediaWiki before 1.35 allows remote attackers to force a logout and external redirection via HTML content in a MediaWiki page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://phabricator.wikimedia.org/T232932",
"refsource": "MISC",
"name": "https://phabricator.wikimedia.org/T232932"
},
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/core/+/536725",
"refsource": "MISC",
"name": "https://gerrit.wikimedia.org/r/c/mediawiki/core/+/536725"
},
{
"refsource": "MISC",
"name": "https://phabricator.wikimedia.org/T240393",
"url": "https://phabricator.wikimedia.org/T240393"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13227",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-13227",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Sysax Multi Server 6.90. An attacker can determine the username (under which the web server is running) by triggering an invalid path permission error. This bypasses the fakepath protection mechanism."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/wrongsid3",
"refsource": "MISC",
"name": "https://github.com/wrongsid3"
},
{
"url": "https://pasteboard.co/J9eF12G.png",
"refsource": "MISC",
"name": "https://pasteboard.co/J9eF12G.png"
},
{
"refsource": "MISC",
"name": "https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md",
"url": "https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13228",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-13228",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Sysax Multi Server 6.90. There is reflected XSS via the /scgi sid parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/wrongsid3",
"refsource": "MISC",
"name": "https://github.com/wrongsid3"
},
{
"url": "https://pasteboard.co/J9eE2GQ.png",
"refsource": "MISC",
"name": "https://pasteboard.co/J9eE2GQ.png"
},
{
"refsource": "MISC",
"name": "https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md",
"url": "https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13229",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-13229",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Sysax Multi Server 6.90. A session can be hijacked if one observes the sid value in any /scgi URI, because it is an authentication token."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/wrongsid3",
"refsource": "MISC",
"name": "https://github.com/wrongsid3"
},
{
"refsource": "MISC",
"name": "https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md",
"url": "https://github.com/wrongsid3/Sysax-MultiServer-6.90-Multiple-Vulnerabilities/blob/master/README.md"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13401",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-13401",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.docker.com/engine/release-notes/",
"refsource": "MISC",
"name": "https://docs.docker.com/engine/release-notes/"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2020/06/01/5",
"url": "http://www.openwall.com/lists/oss-security/2020/06/01/5"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/docker/docker-ce/releases/tag/v19.03.11",
"url": "https://github.com/docker/docker-ce/releases/tag/v19.03.11"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-13754",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2020-13754",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.openwall.com/lists/oss-security/2020/06/01/6",
"url": "http://www.openwall.com/lists/oss-security/2020/06/01/6"
}
]
}

View File

@ -1,90 +1,90 @@
{
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross-Site Scripting"
}
]
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
"problemtype": {
"problemtype_data": [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "Planning Analytics Local",
"version" : {
"version_data" : [
{
"version_value" : "2.0"
}
]
}
}
]
}
"description": [
{
"lang": "eng",
"value": "Cross-Site Scripting"
}
]
}
]
}
},
"CVE_data_meta" : {
"ID" : "CVE-2020-4360",
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2020-06-01T00:00:00"
},
"impact" : {
"cvssv3" : {
"BM" : {
"C" : "L",
"AC" : "L",
"PR" : "L",
"S" : "C",
"AV" : "N",
"SCORE" : "5.400",
"UI" : "R",
"A" : "N",
"I" : "L"
},
"TM" : {
"RL" : "O",
"E" : "H",
"RC" : "C"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 178765.",
"lang" : "eng"
}
]
},
"data_format" : "MITRE",
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"url" : "https://www.ibm.com/support/pages/node/6214472",
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6214472"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/178765",
"refsource" : "XF",
"name" : "ibm-planning-cve20204360-xss (178765)",
"title" : "X-Force Vulnerability Report"
}
]
},
"data_type" : "CVE"
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Planning Analytics Local",
"version": {
"version_data": [
{
"version_value": "2.0"
}
]
}
}
]
}
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-4360",
"STATE": "PUBLIC",
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2020-06-01T00:00:00"
},
"impact": {
"cvssv3": {
"BM": {
"C": "L",
"AC": "L",
"PR": "L",
"S": "C",
"AV": "N",
"SCORE": "5.400",
"UI": "R",
"A": "N",
"I": "L"
},
"TM": {
"RL": "O",
"E": "H",
"RC": "C"
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"value": "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 178765.",
"lang": "eng"
}
]
},
"data_format": "MITRE",
"references": {
"reference_data": [
{
"title": "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"url": "https://www.ibm.com/support/pages/node/6214472",
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6214472"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/178765",
"refsource": "XF",
"name": "ibm-planning-cve20204360-xss (178765)",
"title": "X-Force Vulnerability Report"
}
]
},
"data_type": "CVE"
}

View File

@ -1,90 +1,90 @@
{
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Cross-Site Scripting",
"lang" : "eng"
}
]
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
"problemtype": {
"problemtype_data": [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "Planning Analytics Local",
"version" : {
"version_data" : [
{
"version_value" : "2.0"
}
]
}
}
]
}
"description": [
{
"value": "Cross-Site Scripting",
"lang": "eng"
}
]
}
]
}
},
"CVE_data_meta" : {
"ID" : "CVE-2020-4366",
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2020-06-01T00:00:00"
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 178965."
}
]
},
"data_version" : "4.0",
"impact" : {
"cvssv3" : {
"TM" : {
"RL" : "O",
"E" : "H",
"RC" : "C"
},
"BM" : {
"AC" : "L",
"C" : "L",
"S" : "C",
"PR" : "N",
"A" : "N",
"I" : "L",
"UI" : "R",
"AV" : "N",
"SCORE" : "6.100"
}
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"url" : "https://www.ibm.com/support/pages/node/6214472",
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6214472"
},
{
"refsource" : "XF",
"name" : "ibm-planning-cve20204366-xss (178965)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/178965",
"title" : "X-Force Vulnerability Report"
}
]
}
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Planning Analytics Local",
"version": {
"version_data": [
{
"version_value": "2.0"
}
]
}
}
]
}
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2020-4366",
"STATE": "PUBLIC",
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2020-06-01T00:00:00"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 178965."
}
]
},
"data_version": "4.0",
"impact": {
"cvssv3": {
"TM": {
"RL": "O",
"E": "H",
"RC": "C"
},
"BM": {
"AC": "L",
"C": "L",
"S": "C",
"PR": "N",
"A": "N",
"I": "L",
"UI": "R",
"AV": "N",
"SCORE": "6.100"
}
}
},
"data_format": "MITRE",
"data_type": "CVE",
"references": {
"reference_data": [
{
"title": "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"url": "https://www.ibm.com/support/pages/node/6214472",
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6214472"
},
{
"refsource": "XF",
"name": "ibm-planning-cve20204366-xss (178965)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/178965",
"title": "X-Force Vulnerability Report"
}
]
}
}

View File

@ -1,90 +1,90 @@
{
"impact" : {
"cvssv3" : {
"BM" : {
"AC" : "H",
"C" : "H",
"S" : "U",
"PR" : "N",
"I" : "N",
"A" : "N",
"UI" : "N",
"SCORE" : "5.900",
"AV" : "N"
},
"TM" : {
"RL" : "O",
"RC" : "C",
"E" : "U"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM Planning Analytics Local 2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 179001.",
"lang" : "eng"
}
]
},
"data_type" : "CVE",
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"name" : "https://www.ibm.com/support/pages/node/6214472",
"refsource" : "CONFIRM",
"url" : "https://www.ibm.com/support/pages/node/6214472"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/179001",
"name" : "ibm-planning-cve20204367-info-disc (179001)",
"refsource" : "XF",
"title" : "X-Force Vulnerability Report"
}
]
},
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Planning Analytics Local",
"version" : {
"version_data" : [
{
"version_value" : "2.0"
}
]
}
}
]
},
"vendor_name" : "IBM"
"impact": {
"cvssv3": {
"BM": {
"AC": "H",
"C": "H",
"S": "U",
"PR": "N",
"I": "N",
"A": "N",
"UI": "N",
"SCORE": "5.900",
"AV": "N"
},
"TM": {
"RL": "O",
"RC": "C",
"E": "U"
}
]
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"value": "IBM Planning Analytics Local 2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 179001.",
"lang": "eng"
}
]
},
"data_type": "CVE",
"references": {
"reference_data": [
{
"title": "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"name": "https://www.ibm.com/support/pages/node/6214472",
"refsource": "CONFIRM",
"url": "https://www.ibm.com/support/pages/node/6214472"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/179001",
"name": "ibm-planning-cve20204367-info-disc (179001)",
"refsource": "XF",
"title": "X-Force Vulnerability Report"
}
]
},
"data_format": "MITRE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Planning Analytics Local",
"version": {
"version_data": [
{
"version_value": "2.0"
}
]
}
}
]
},
"vendor_name": "IBM"
}
]
}
]
},
"CVE_data_meta" : {
"ID" : "CVE-2020-4367",
"STATE" : "PUBLIC",
"DATE_PUBLIC" : "2020-06-01T00:00:00",
"ASSIGNER" : "psirt@us.ibm.com"
}
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
},
"CVE_data_meta": {
"ID": "CVE-2020-4367",
"STATE": "PUBLIC",
"DATE_PUBLIC": "2020-06-01T00:00:00",
"ASSIGNER": "psirt@us.ibm.com"
}
}

View File

@ -1,90 +1,90 @@
{
"impact" : {
"cvssv3" : {
"BM" : {
"AC" : "L",
"C" : "L",
"S" : "C",
"PR" : "L",
"A" : "N",
"UI" : "R",
"I" : "L",
"AV" : "N",
"SCORE" : "5.400"
},
"TM" : {
"E" : "H",
"RC" : "C",
"RL" : "O"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 180761."
}
]
},
"data_format" : "MITRE",
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6214472",
"url" : "https://www.ibm.com/support/pages/node/6214472",
"title" : "IBM Security Bulletin 6214472 (Planning Analytics Local)"
},
{
"title" : "X-Force Vulnerability Report",
"refsource" : "XF",
"name" : "ibm-planning-cve20204431-xss (180761)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/180761"
}
]
},
"data_type" : "CVE",
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Cross-Site Scripting",
"lang" : "eng"
}
]
}
]
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "2.0"
}
]
},
"product_name" : "Planning Analytics Local"
}
]
},
"vendor_name" : "IBM"
"impact": {
"cvssv3": {
"BM": {
"AC": "L",
"C": "L",
"S": "C",
"PR": "L",
"A": "N",
"UI": "R",
"I": "L",
"AV": "N",
"SCORE": "5.400"
},
"TM": {
"E": "H",
"RC": "C",
"RL": "O"
}
]
}
},
"CVE_data_meta" : {
"STATE" : "PUBLIC",
"ID" : "CVE-2020-4431",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2020-06-01T00:00:00"
}
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 180761."
}
]
},
"data_format": "MITRE",
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6214472",
"url": "https://www.ibm.com/support/pages/node/6214472",
"title": "IBM Security Bulletin 6214472 (Planning Analytics Local)"
},
{
"title": "X-Force Vulnerability Report",
"refsource": "XF",
"name": "ibm-planning-cve20204431-xss (180761)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/180761"
}
]
},
"data_type": "CVE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Cross-Site Scripting",
"lang": "eng"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "2.0"
}
]
},
"product_name": "Planning Analytics Local"
}
]
},
"vendor_name": "IBM"
}
]
}
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2020-4431",
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2020-06-01T00:00:00"
}
}

View File

@ -1,90 +1,90 @@
{
"references" : {
"reference_data" : [
{
"title" : "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"url" : "https://www.ibm.com/support/pages/node/6214472",
"refsource" : "CONFIRM",
"name" : "https://www.ibm.com/support/pages/node/6214472"
},
{
"refsource" : "XF",
"name" : "ibm-planning-cve20204503-xss (182283)",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/182283",
"title" : "X-Force Vulnerability Report"
}
]
},
"data_type" : "CVE",
"data_format" : "MITRE",
"impact" : {
"cvssv3" : {
"TM" : {
"RC" : "C",
"E" : "H",
"RL" : "O"
},
"BM" : {
"C" : "L",
"AC" : "L",
"PR" : "N",
"S" : "C",
"AV" : "N",
"SCORE" : "6.100",
"A" : "N",
"UI" : "R",
"I" : "L"
}
}
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 182283.",
"lang" : "eng"
}
]
},
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2020-06-01T00:00:00",
"STATE" : "PUBLIC",
"ID" : "CVE-2020-4503"
},
"affects" : {
"vendor" : {
"vendor_data" : [
"references": {
"reference_data": [
{
"product" : {
"product_data" : [
{
"version" : {
"version_data" : [
{
"version_value" : "2.0"
}
]
},
"product_name" : "Planning Analytics Local"
}
]
},
"vendor_name" : "IBM"
"title": "IBM Security Bulletin 6214472 (Planning Analytics Local)",
"url": "https://www.ibm.com/support/pages/node/6214472",
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6214472"
},
{
"refsource": "XF",
"name": "ibm-planning-cve20204503-xss (182283)",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/182283",
"title": "X-Force Vulnerability Report"
}
]
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross-Site Scripting"
}
]
},
"data_type": "CVE",
"data_format": "MITRE",
"impact": {
"cvssv3": {
"TM": {
"RC": "C",
"E": "H",
"RL": "O"
},
"BM": {
"C": "L",
"AC": "L",
"PR": "N",
"S": "C",
"AV": "N",
"SCORE": "6.100",
"A": "N",
"UI": "R",
"I": "L"
}
}
},
"data_version": "4.0",
"description": {
"description_data": [
{
"value": "IBM Planning Analytics Local 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 182283.",
"lang": "eng"
}
]
},
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2020-06-01T00:00:00",
"STATE": "PUBLIC",
"ID": "CVE-2020-4503"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "2.0"
}
]
},
"product_name": "Planning Analytics Local"
}
]
},
"vendor_name": "IBM"
}
]
}
]
}
}
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-Site Scripting"
}
]
}
]
}
}