- Synchronized data.

This commit is contained in:
CVE Team 2017-12-20 12:06:20 -05:00
parent c84b392200
commit dc9d5daa29
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
10 changed files with 127 additions and 4 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2017-16818",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,32 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging \"full\" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1515872"
},
{
"url" : "https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a"
},
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6VJA32U7HKGDRJQDJVM7JBYWD4T7BJL/"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2017-17476",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,35 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "Open Ticket Request System (OTRS) 4.0.x before 4.0.28, 5.0.x before 5.0.26, and 6.0.x before 6.0.3, when cookie support is disabled, might allow remote attackers to hijack web sessions and consequently gain privileges via a crafted email."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://github.com/OTRS/otrs/commit/26707eaaa791648e6c7ad6aeaa27efd70e7c66eb"
},
{
"url" : "https://github.com/OTRS/otrs/commit/36e3be99cfe8a9e09afa1b75fdc39f3e28f561fc"
},
{
"url" : "https://github.com/OTRS/otrs/commit/720c73fbf53e476ca7dfdf2ae1d4d3d2aad2b953"
},
{
"url" : "https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/"
}
]
}

View File

@ -62,6 +62,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101917"
},

View File

@ -65,6 +65,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101906"
},

View File

@ -62,6 +62,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101919"
}

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101921"
},

View File

@ -62,6 +62,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101906"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101922"
}

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101918"
},

View File

@ -59,6 +59,9 @@
{
"url" : "https://security.netapp.com/advisory/ntap-20171120-0001/"
},
{
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
},
{
"url" : "http://www.securityfocus.com/bid/101920"
},