"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-23 17:00:54 +00:00
parent 68fa9bbcc3
commit e39c74c1c3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
7 changed files with 94 additions and 22 deletions

View File

@ -66,6 +66,11 @@
"name": "20060429 Image file crashes Finder, Safari and other apps",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/432587/100/0/threaded"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/openexr/openexr/issues/564",
"url": "https://github.com/openexr/openexr/issues/564"
}
]
}

View File

@ -156,6 +156,16 @@
"name": "TA09-218A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SR:2009:014",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010",
"url": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010"
}
]
}

View File

@ -156,6 +156,11 @@
"name": "TA09-218A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SR:2009:014",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html"
}
]
}

View File

@ -121,6 +121,11 @@
"name": "TA09-218A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010",
"url": "https://github.com/openexr/openexr/blob/master/CHANGES.md#version-170-july-23-2010"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c. This may be related to two NULL pointers passed as arguments at libavcodec/frame_thread_encoder.c."
"value": "In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c."
}
]
},
@ -52,31 +52,11 @@
},
"references": {
"reference_data": [
{
"url": "https://trac.ffmpeg.org/ticket/7981",
"refsource": "MISC",
"name": "https://trac.ffmpeg.org/ticket/7981"
},
{
"url": "https://trac.ffmpeg.org/ticket/7979",
"refsource": "MISC",
"name": "https://trac.ffmpeg.org/ticket/7979"
},
{
"url": "https://trac.ffmpeg.org/ticket/7983",
"refsource": "MISC",
"name": "https://trac.ffmpeg.org/ticket/7983"
},
{
"url": "https://trac.ffmpeg.org/ticket/7985",
"refsource": "MISC",
"name": "https://trac.ffmpeg.org/ticket/7985"
},
{
"url": "https://trac.ffmpeg.org/ticket/7982",
"refsource": "MISC",
"name": "https://trac.ffmpeg.org/ticket/7982"
},
{
"refsource": "BID",
"name": "109090",

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15635",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Grafana 5.4.0. Passwords for data sources used by Grafana (e.g., MySQL) are not encrypted. An admin user can reveal passwords for any data source by pressing the \"Save and test\" button within a data source's settings menu. When watching the transaction with Burp Proxy, the password for the data source is revealed and sent to the server. From a browser, a prompt to save the credentials is generated, and the password can be revealed by simply checking the \"Show password\" box."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/",
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/167244",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/167244"
}
]
}
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS. NOTE: the vendor's position is that no file content becomes accessible to other applications on the device."
"value": "** DISPUTED ** The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to the opening of arbitrary URLs, which can inject deceptive content into the UI. (When in physical possession of the device, opening local files is also possible.) NOTE: as of 2019-09-23. the vendor has not agreed that this should be considered a vulnerability."
}
]
},