"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-01-16 19:01:17 +00:00
parent f929793da1
commit d6654f5409
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
19 changed files with 187 additions and 6 deletions

View File

@ -98,6 +98,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0008",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -4,14 +4,61 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11997",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security-alert@hpe.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "HPE",
"product": {
"product_data": [
{
"product_name": "HPE enhanced Internet Usage Manager (eIUM)",
"version": {
"version_data": [
{
"version_value": "8.3"
},
{
"version_value": "9.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "remote cross-site scripting (xss)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03975en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03975en_us"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A potential security vulnerability has been identified in HPE enhanced Internet Usage Manager (eIUM) versions 8.3 and 9.0. The vulnerability could be used for unauthorized access to information via cross site scripting. HPE has made the following software updates to resolve the vulnerability in eIUM. The eIUM 8.3 FP01 customers are advised to install eIUM83FP01Patch_QXCR1001711284.20190806-1244 patch. The eIUM 9.0 customers are advised to upgrade to eIUM 9.0 FP02 PI5 or later versions. For other versions, please, contact the product support."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-11998",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security-alert@hpe.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "HPE",
"product": {
"product_data": [
{
"product_name": "HPE Superdome Flex Server",
"version": {
"version_data": [
{
"version_value": "Prior to v3.20.186"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "local multiple vulnerabilities"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03978en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03978en_us"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "HPE Superdome Flex Server is vulnerable to multiple remote vulnerabilities via improper input validation of administrator commands. This vulnerability could allow an Administrator to bypass security restrictions and access multiple remote vulnerabilities including information disclosure, or denial of service. HPE has provided firmware updates that address the above vulnerabilities for the HPE Superdome Flex Server starting with firmware version v3.20.186 (not available online) and v3.20.206 (available online). Apply v3.20.206 (4 December 2019) or a newer version to resolve this issue. Please visit HPE Support Center https://support.hpe.com/hpesc/public/home to obtain the updated firmware for your product."
}
]
}

View File

@ -48,6 +48,11 @@
"refsource": "CONFIRM",
"name": "http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2",
"url": "http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2"
},
{
"refsource": "MLIST",
"name": "[announce] 20200116 [CVE-2019-12423] - Apache CXF OpenId Connect JWK Keys service returns private/secret credentials if configured with a jwk keystore",
"url": "https://lists.apache.org/thread.html/rd588ff96f18563aeb5f87ac8c6bce7aae86cb1a4d4be483f96e7208c@%3Cannounce.apache.org%3E"
}
]
},

View File

@ -93,6 +93,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0002",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -93,6 +93,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0002",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -93,6 +93,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0002",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -93,6 +93,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0002",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -93,6 +93,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0002",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -133,6 +133,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0127",
"url": "https://access.redhat.com/errata/RHSA-2020:0127"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -133,6 +133,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0127",
"url": "https://access.redhat.com/errata/RHSA-2020:0127"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -133,6 +133,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0127",
"url": "https://access.redhat.com/errata/RHSA-2020:0127"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -133,6 +133,11 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0127",
"url": "https://access.redhat.com/errata/RHSA-2020:0127"
},
{
"refsource": "UBUNTU",
"name": "USN-4241-1",
"url": "https://usn.ubuntu.com/4241-1/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "CONFIRM",
"name": "http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2",
"url": "http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2"
},
{
"refsource": "MLIST",
"name": "[announce] 20200116 [CVE-2019-17573] Apache CXF Reflected XSS in the services listing page",
"url": "https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E"
}
]
},

View File

@ -96,6 +96,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html",
"url": "http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155710/Tautulli-2.1.9-Cross-Site-Request-Forgery.html",
"url": "http://packetstormsecurity.com/files/155710/Tautulli-2.1.9-Cross-Site-Request-Forgery.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155974/Tautulli-2.1.9-Denial-Of-Service.html",
"url": "http://packetstormsecurity.com/files/155974/Tautulli-2.1.9-Denial-Of-Service.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/10002",
"url": "https://wpvulndb.com/vulnerabilities/10002"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155973/WordPress-Postie-1.9.40-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/155973/WordPress-Postie-1.9.40-Cross-Site-Scripting.html"
}
]
}

View File

@ -61,6 +61,16 @@
"name": "https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1683",
"url": "https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1683",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20200115 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2020/01/15/1"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/155967/Jenkins-Gitlab-Hook-1.4.2-Cross-Site-Scripting.html"
}
]
}

View File

@ -57,6 +57,11 @@
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155963/SunOS-5.10-Generic_147148-26-Local-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/155963/SunOS-5.10-Generic_147148-26-Local-Privilege-Escalation.html"
}
]
}