"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-12-05 15:01:10 +00:00
parent a508661301
commit df46ee9324
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 154 additions and 6 deletions

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0163",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "OpenShift haproxy cartridge",
"version": {
"version_data": [
{
"version_value": "through 2013-01-08"
}
]
}
}
]
},
"vendor_name": "OpenShift haproxy cartridge"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook which could facilitate DoS"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "predictable /tmp in set-proxy connection hook"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0163",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-0163"
},
{
"url": "https://access.redhat.com/security/cve/cve-2013-0163",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2013-0163"
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14910",
"ASSIGNER": "darunesh@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -84,4 +85,4 @@
]
]
}
}
}

View File

@ -69,7 +69,7 @@
"description_data": [
{
"lang": "eng",
"value": "An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser.\nThis issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5.\nPAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue.\n"
"value": "An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser. This issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5. PAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue."
}
]
},
@ -108,6 +108,7 @@
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/159",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/159"
}
]

View File

@ -0,0 +1,97 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_PUBLIC": "2019-11-15T00:00:00.000Z",
"ID": "CVE-2019-18180",
"STATE": "PUBLIC",
"TITLE": "Denial of service"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Check for filenames with overly long extensions in PostMaster (sending in email) or uploading files (e.g. attaching files to mails) of ((OTRS)) Community Edition and OTRS allows an remote attacker to cause an endless loop. This issue affects: OTRS AG: ((OTRS)) Community Edition 5.0.x version 5.0.38 and prior versions; 6.0.x version 6.0.23 and prior versions. OTRS AG: OTRS 7.0.x version 7.0.12 and prior versions."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://community.otrs.com/security-advisory-2019-15-security-update-for-otrs-framework/",
"refsource": "CONFIRM",
"url": "https://community.otrs.com/security-advisory-2019-15-security-update-for-otrs-framework/"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Upgrade to OTRS 7.0.13 or OTRS 6.0.24 or OTRS 5.0.39 "
},
{
"lang": "eng",
"value": "Patch for ((OTRS)) Community Edition 6.0: https://github.com/OTRS/otrs/commit/799616eb43f7fb53cae4e04c81e2156baaf02e2b \nPatch for ((OTRS)) Community Edition 5.0: https://github.com/OTRS/otrs/commit/76b301f4e3f45cb23bb6a3d6907028c733d11145"
}
],
"source": {
"advisory": "OSA-2019-15 ",
"discovery": "USER"
}
}