"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-01 19:00:46 +00:00
parent ca84b5ae1a
commit d412702eac
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
6 changed files with 182 additions and 17 deletions

View File

@ -126,6 +126,11 @@
"name": "USN-3871-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3871-3/"
},
{
"refsource": "BID",
"name": "104904",
"url": "http://www.securityfocus.com/bid/104904"
}
]
}

View File

@ -116,6 +116,11 @@
"name": "USN-3871-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3871-3/"
},
{
"refsource": "BID",
"name": "104878",
"url": "http://www.securityfocus.com/bid/104878"
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-4050",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-4050",
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Talos",
"product": {
"product_data": [
{
"product_name": "GOG Galaxy",
"version": {
"version_data": [
{
"version_value": "Gog Galaxy 1.2.47 (macOS)"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "local privilege escalation"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0724",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0724"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An exploitable local privilege escalation vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can globally adjust folder permissions leading to execution of arbitrary code with elevated privileges."
}
]
}

View File

@ -98,6 +98,11 @@
"refsource": "MISC",
"url": "https://github.com/kubernetes/kubernetes/pull/75037",
"name": "https://github.com/kubernetes/kubernetes/pull/75037"
},
{
"refsource": "BID",
"name": "107652",
"url": "http://www.securityfocus.com/bid/107652"
}
]
},

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-1572",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
"ASSIGNER": "psirt@paloaltonetworks.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Palo Alto Networks",
"product": {
"product_data": [
{
"product_name": "PAN-OS",
"version": {
"version_data": [
{
"version_value": "PAN-OS 9.0.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/145",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/145"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-1571. Reason: This candidate is a reservation duplicate of CVE-2019-1571. Notes: All CVE users should reference CVE-2019-1571 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
"value": "PAN-OS 9.0.0 may allow an unauthenticated remote user to access php files."
}
]
}

View File

@ -1,17 +1,79 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-8956",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-8956",
"ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "UNKNOWN",
"product": {
"product_data": [
{
"product_name": "Linux Kernel",
"version": {
"version_data": [
{
"version_value": "4.20.x prior to 4.20.8"
},
{
"version_value": "4.19.x prior to 4.19.21"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Privilege escalation"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21",
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21"
},
{
"refsource": "MISC",
"name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8",
"url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8"
},
{
"refsource": "MISC",
"name": "https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/",
"url": "https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/"
},
{
"refsource": "MISC",
"name": "https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=ba59fb0273076637f0add4311faa990a5eec27c0",
"url": "https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=ba59fb0273076637f0add4311faa990a5eec27c0"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the \"sctp_sendmsg()\" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory."
}
]
}