mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 05:58:08 +00:00
- Synchronized data.
This commit is contained in:
parent
547467057b
commit
f4320b7cfe
@ -1,13 +1,9 @@
|
||||
{
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
|
||||
}
|
||||
]
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "psirt@adobe.com",
|
||||
"ID" : "CVE-2018-19724",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_type": "CVE",
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
@ -15,14 +11,14 @@
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Adobe Experience Manager Forms",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4"
|
||||
}
|
||||
]
|
||||
},
|
||||
"product_name": "Adobe Experience Manager Forms"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -32,6 +28,16 @@
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
@ -44,19 +50,13 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"data_version": "4.0",
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html",
|
||||
"name" : "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"name": "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html"
|
||||
"url" : "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"STATE": "PUBLIC",
|
||||
"ID": "CVE-2018-19724",
|
||||
"ASSIGNER": "psirt@adobe.com"
|
||||
}
|
||||
}
|
||||
|
@ -1,13 +1,9 @@
|
||||
{
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
|
||||
}
|
||||
]
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "psirt@adobe.com",
|
||||
"ID" : "CVE-2018-19726",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_type": "CVE",
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
@ -15,14 +11,14 @@
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Adobe Experience Manager",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "6.4, 6.3, 6.2, 6.1, and 6.0 versions"
|
||||
}
|
||||
]
|
||||
},
|
||||
"product_name": "Adobe Experience Manager"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -32,6 +28,16 @@
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
@ -44,19 +50,13 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"data_version": "4.0",
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
|
||||
"name" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
|
||||
"url" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"STATE": "PUBLIC",
|
||||
"ID": "CVE-2018-19726",
|
||||
"ASSIGNER": "psirt@adobe.com"
|
||||
}
|
||||
}
|
||||
|
@ -1,13 +1,9 @@
|
||||
{
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
|
||||
}
|
||||
]
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "psirt@adobe.com",
|
||||
"ID" : "CVE-2018-19727",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_type": "CVE",
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
@ -15,14 +11,14 @@
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Adobe Experience Manager",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "6.4, 6.3, 6.2, 6.1, and 6.0 versions"
|
||||
}
|
||||
]
|
||||
},
|
||||
"product_name": "Adobe Experience Manager"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -32,6 +28,16 @@
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
@ -44,19 +50,13 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"data_version": "4.0",
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
|
||||
"name" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
|
||||
"url" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"STATE": "PUBLIC",
|
||||
"ID": "CVE-2018-19727",
|
||||
"ASSIGNER": "psirt@adobe.com"
|
||||
}
|
||||
}
|
@ -1,13 +1,9 @@
|
||||
{
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
|
||||
}
|
||||
]
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "psirt@adobe.com",
|
||||
"ID" : "CVE-2018-19728",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_type": "CVE",
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
@ -15,14 +11,14 @@
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Adobe Acrobat and Reader",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_value" : "2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier versions"
|
||||
}
|
||||
]
|
||||
},
|
||||
"product_name": "Adobe Acrobat and Reader"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -32,6 +28,16 @@
|
||||
}
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
@ -44,19 +50,13 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"data_version": "4.0",
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"STATE": "PUBLIC",
|
||||
"ID": "CVE-2018-19728",
|
||||
"ASSIGNER": "psirt@adobe.com"
|
||||
}
|
||||
}
|
@ -1,25 +1,16 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ID": "CVE-2019-3593",
|
||||
"AKA" : "",
|
||||
"ASSIGNER" : "psirt@mcafee.com",
|
||||
"DATE_PUBLIC" : "",
|
||||
"TITLE": "Exploitation of Privilege/Trust vulnerability",
|
||||
"AKA": "",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"source": {
|
||||
"defect": [],
|
||||
"advisory": "",
|
||||
"discovery": "EXTERNAL"
|
||||
"ID" : "CVE-2019-3593",
|
||||
"STATE" : "PUBLIC",
|
||||
"TITLE" : "Exploitation of Privilege/Trust vulnerability"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"vendor_name": "Mcafee, LLC",
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
@ -27,20 +18,26 @@
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{
|
||||
"version_name": "",
|
||||
"affected" : "<",
|
||||
"version_value": "16.0.R18",
|
||||
"platform": ""
|
||||
"platform" : "",
|
||||
"version_name" : "",
|
||||
"version_value" : "16.0.R18"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"vendor_name" : "Mcafee, LLC"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"configuration" : [],
|
||||
"credit" : [],
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
@ -49,6 +46,23 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"exploit" : [],
|
||||
"impact" : {
|
||||
"cvss" : {
|
||||
"attackComplexity" : "HIGH",
|
||||
"attackVector" : "LOCAL",
|
||||
"availabilityImpact" : "HIGH",
|
||||
"baseScore" : 7.5,
|
||||
"baseSeverity" : "HIGH",
|
||||
"confidentialityImpact" : "NONE",
|
||||
"integrityImpact" : "HIGH",
|
||||
"privilegesRequired" : "LOW",
|
||||
"scope" : "CHANGED",
|
||||
"userInteraction" : "NONE",
|
||||
"vectorString" : "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H",
|
||||
"version" : "3.0"
|
||||
}
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
@ -64,31 +78,17 @@
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888",
|
||||
"refsource" : "CONFIRM",
|
||||
"url": "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888",
|
||||
"name": "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888"
|
||||
"url" : "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888"
|
||||
}
|
||||
]
|
||||
},
|
||||
"configuration": [],
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"version": "3.0",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
}
|
||||
},
|
||||
"exploit": [],
|
||||
"work_around": [],
|
||||
"solution" : [],
|
||||
"credit": []
|
||||
"source" : {
|
||||
"advisory" : "",
|
||||
"defect" : [],
|
||||
"discovery" : "EXTERNAL"
|
||||
},
|
||||
"work_around" : []
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user