mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 10:18:17 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
68fa9bbcc3
commit
e39c74c1c3
@ -66,6 +66,11 @@
|
||||
"name": "20060429 Image file crashes Finder, Safari and other apps",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/432587/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/openexr/openexr/issues/564",
|
||||
"url": "https://github.com/openexr/openexr/issues/564"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,16 @@
|
||||
"name": "TA09-218A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SR:2009:014",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010",
|
||||
"url": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,11 @@
|
||||
"name": "TA09-218A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SR:2009:014",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -121,6 +121,11 @@
|
||||
"name": "TA09-218A",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010",
|
||||
"url": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c. This may be related to two NULL pointers passed as arguments at libavcodec/frame_thread_encoder.c."
|
||||
"value": "In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -52,31 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://trac.ffmpeg.org/ticket/7981",
|
||||
"refsource": "MISC",
|
||||
"name": "https://trac.ffmpeg.org/ticket/7981"
|
||||
},
|
||||
{
|
||||
"url": "https://trac.ffmpeg.org/ticket/7979",
|
||||
"refsource": "MISC",
|
||||
"name": "https://trac.ffmpeg.org/ticket/7979"
|
||||
},
|
||||
{
|
||||
"url": "https://trac.ffmpeg.org/ticket/7983",
|
||||
"refsource": "MISC",
|
||||
"name": "https://trac.ffmpeg.org/ticket/7983"
|
||||
},
|
||||
{
|
||||
"url": "https://trac.ffmpeg.org/ticket/7985",
|
||||
"refsource": "MISC",
|
||||
"name": "https://trac.ffmpeg.org/ticket/7985"
|
||||
},
|
||||
{
|
||||
"url": "https://trac.ffmpeg.org/ticket/7982",
|
||||
"refsource": "MISC",
|
||||
"name": "https://trac.ffmpeg.org/ticket/7982"
|
||||
},
|
||||
{
|
||||
"refsource": "BID",
|
||||
"name": "109090",
|
||||
|
67
2019/15xxx/CVE-2019-15635.json
Normal file
67
2019/15xxx/CVE-2019-15635.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-15635",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in Grafana 5.4.0. Passwords for data sources used by Grafana (e.g., MySQL) are not encrypted. An admin user can reveal passwords for any data source by pressing the \"Save and test\" button within a data source's settings menu. When watching the transaction with Burp Proxy, the password for the data source is revealed and sent to the server. From a browser, a prompt to save the credentials is generated, and the password can be revealed by simply checking the \"Show password\" box."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/167244",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/167244"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** DISPUTED ** The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS. NOTE: the vendor's position is that no file content becomes accessible to other applications on the device."
|
||||
"value": "** DISPUTED ** The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to the opening of arbitrary URLs, which can inject deceptive content into the UI. (When in physical possession of the device, opening local files is also possible.) NOTE: as of 2019-09-23. the vendor has not agreed that this should be considered a vulnerability."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user