"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-26 21:00:55 +00:00
parent 3418353b32
commit e83cc4aeb5
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
7 changed files with 151 additions and 2 deletions

View File

@ -101,6 +101,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41582535",
"url": "https://support.f5.com/csp/article/K41582535"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Poppler before 0.76.0 has an integer overflow in Parser::makeStream in Parser.cc."
"value": "Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc."
}
]
},

View File

@ -99,6 +99,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-41c7fa478a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K69511801",
"url": "https://support.f5.com/csp/article/K69511801"
}
]
},

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "pubRsaDecryptSignedElementExt in MatrixSSL, as used in Inside Secure TLS Toolkit, through 4.0.2 Open has a stack-based buffer overflow during X.509 certificate verification because of missing validation in psRsaDecryptPubExt in crypto/pubkey/rsa_pub.c."
"value": "pubRsaDecryptSignedElementExt in MatrixSSL 4.0.1 Open, as used in Inside Secure TLS Toolkit, has a stack-based buffer overflow during X.509 certificate verification because of missing validation in psRsaDecryptPubExt in crypto/pubkey/rsa_pub.c."
}
]
},
@ -66,6 +66,11 @@
"url": "https://github.com/matrixssl/matrixssl/issues/26",
"refsource": "MISC",
"name": "https://github.com/matrixssl/matrixssl/issues/26"
},
{
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/02/15/1",
"url": "https://www.openwall.com/lists/oss-security/2019/02/15/1"
}
]
}

View File

@ -71,6 +71,16 @@
"refsource": "MISC",
"name": "https://www.suse.com/security/cve/CVE-2019-15058/",
"url": "https://www.suse.com/security/cve/CVE-2019-15058/"
},
{
"refsource": "MISC",
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934973",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934973"
},
{
"refsource": "MISC",
"name": "https://www.cvedetails.com/cve/CVE-2019-15058/",
"url": "https://www.cvedetails.com/cve/CVE-2019-15058/"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15862",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in CKFinder through 2.6.2.1. Improper checks of file names allows remote attackers to upload files without any extension (even if the application was configured to accept files only with a defined set of extensions). This affects CKFinder for ASP, CKFinder for ASP.NET, CKFinder for ColdFusion, and CKFinder for PHP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://ckeditor.com/blog/CKFinder-3.5.1-and-CKFinder-2.6.3-released/",
"url": "https://ckeditor.com/blog/CKFinder-3.5.1-and-CKFinder-2.6.3-released/"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15891",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in CKFinder through 2.6.2.1 and 3.x through 3.5.0. The documentation has misleading information that could lead to a conclusion that the application has a built-in bulletproof content sniffing protection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://ckeditor.com/blog/CKFinder-3.5.1-and-CKFinder-2.6.3-released/",
"url": "https://ckeditor.com/blog/CKFinder-3.5.1-and-CKFinder-2.6.3-released/"
}
]
}
}