"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-29 15:00:49 +00:00
parent 7391c06964
commit d7aaa57379
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
14 changed files with 828 additions and 432 deletions

View File

@ -63,7 +63,9 @@
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/CWD-5072"
"url": "https://jira.atlassian.com/browse/CWD-5072",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/CWD-5072"
}
]
}

View File

@ -55,7 +55,9 @@
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/CWD-5061"
"url": "https://jira.atlassian.com/browse/CWD-5061",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/CWD-5061"
}
]
}

View File

@ -55,7 +55,9 @@
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/CWD-5062"
"url": "https://jira.atlassian.com/browse/CWD-5062",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/CWD-5062"
}
]
}

View File

@ -63,7 +63,9 @@
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/CWD-5071"
"url": "https://jira.atlassian.com/browse/CWD-5071",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/CWD-5071"
}
]
}

View File

@ -63,7 +63,9 @@
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/CWD-5070"
"url": "https://jira.atlassian.com/browse/CWD-5070",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/CWD-5070"
}
]
}

View File

@ -71,7 +71,9 @@
"references": {
"reference_data": [
{
"url": "https://ecosystem.atlassian.net/browse/APL-1338"
"url": "https://ecosystem.atlassian.net/browse/APL-1338",
"refsource": "MISC",
"name": "https://ecosystem.atlassian.net/browse/APL-1338"
}
]
}

View File

@ -61,6 +61,21 @@
"refsource": "EXPLOIT-DB",
"name": "46093",
"url": "https://www.exploit-db.com/exploits/46093/"
},
{
"refsource": "MISC",
"name": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-002.md",
"url": "https://github.com/active-labs/Advisories/blob/master/ACTIVE-2019-002.md"
},
{
"refsource": "CONFIRM",
"name": "https://m.kioware.com/news/kioware-press-releases/kioware_server_security_patch_update",
"url": "https://m.kioware.com/news/kioware-press-releases/kioware_server_security_patch_update"
},
{
"refsource": "CONFIRM",
"name": "https://www.kioware.com/patch.aspx",
"url": "https://www.kioware.com/patch.aspx"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20378",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The L2CAP signaling channel implementation and SDP server implementation in OpenSynergy Blue SDK 3.2 through 6.0 allow remote, unauthenticated attackers to execute arbitrary code or cause a denial of service via malicious L2CAP configuration requests, in conjunction with crafted SDP communication over maliciously configured L2CAP channels. The attacker must have connectivity over the Bluetooth physical layer, and must be able to send raw L2CAP frames. This is related to L2Cap_HandleConfigReq in core/stack/l2cap/l2cap_sm.c and SdpServHandleServiceSearchAttribReq in core/stack/sdp/sdpserv.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.cymotive.com/wp-content/uploads/2019/03/Hell2CAP-0day.pdf",
"refsource": "MISC",
"name": "https://www.cymotive.com/wp-content/uploads/2019/03/Hell2CAP-0day.pdf"
},
{
"refsource": "CONFIRM",
"name": "https://www.opensynergy.com/news/security/bluesdk-advisory2018003/",
"url": "https://www.opensynergy.com/news/security/bluesdk-advisory2018003/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "DEBIAN",
"name": "DSA-4418",
"url": "https://www.debian.org/security/2019/dsa-4418"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190329 [SECURITY] [DLA 1736-1] dovecot security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00038.html"
}
]
},

View File

@ -1,18 +1,81 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9918",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-9918",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. Input does not get validated and queries are not written in a way to prevent SQL injection. Therefore arbitrary SQL-Statements can be executed in the database."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://extensions.joomla.org/extension/je-messenger/",
"refsource": "MISC",
"name": "https://extensions.joomla.org/extension/je-messenger/"
},
{
"url": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9918.md",
"refsource": "MISC",
"name": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9918.md"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:L/PR:L/S:C/UI:N",
"version": "3.0"
}
}
}

View File

@ -1,18 +1,81 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9919",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-9919",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. It is possible to craft messages in a way that JavaScript gets executed on the side of the receiving user when the message is opened, aka XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://extensions.joomla.org/extension/je-messenger/",
"refsource": "MISC",
"name": "https://extensions.joomla.org/extension/je-messenger/"
},
{
"url": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9919.md",
"refsource": "MISC",
"name": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9919.md"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:L/I:L/PR:L/S:C/UI:R",
"version": "3.0"
}
}
}

View File

@ -1,18 +1,81 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9920",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-9920",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. It is possible to perform an action within the context of the account of another user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://extensions.joomla.org/extension/je-messenger/",
"refsource": "MISC",
"name": "https://extensions.joomla.org/extension/je-messenger/"
},
{
"url": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9920.md",
"refsource": "MISC",
"name": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9920.md"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:N/I:H/PR:L/S:C/UI:N",
"version": "3.0"
}
}
}

View File

@ -1,18 +1,81 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9921",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-9921",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. It is possible to read information that should only be accessible by a different user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://extensions.joomla.org/extension/je-messenger/",
"refsource": "MISC",
"name": "https://extensions.joomla.org/extension/je-messenger/"
},
{
"url": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9921.md",
"refsource": "MISC",
"name": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9921.md"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:N/PR:L/S:C/UI:N",
"version": "3.0"
}
}
}

View File

@ -1,18 +1,81 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-9922",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-9922",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. Directory Traversal allows read access to arbitrary files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://extensions.joomla.org/extension/je-messenger/",
"refsource": "MISC",
"name": "https://extensions.joomla.org/extension/je-messenger/"
},
{
"url": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9922.md",
"refsource": "MISC",
"name": "https://github.com/azd-cert/CVE/blob/master/CVEs/CVE-2019-9922.md"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:L/I:N/PR:N/S:C/UI:N",
"version": "3.0"
}
}
}