- Synchronized data.

This commit is contained in:
CVE Team 2019-01-28 13:10:48 -05:00
parent 547467057b
commit f4320b7cfe
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
5 changed files with 319 additions and 319 deletions

View File

@ -1,62 +1,62 @@
{
"description": {
"description_data": [
"CVE_data_meta" : {
"ASSIGNER" : "psirt@adobe.com",
"ID" : "CVE-2018-19724",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
"product" : {
"product_data" : [
{
"product_name" : "Adobe Experience Manager Forms",
"version" : {
"version_data" : [
{
"version_value" : "Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4"
}
]
}
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4"
}
]
},
"product_name": "Adobe Experience Manager Forms"
}
]
},
"vendor_name": "Adobe"
"vendor_name" : "Adobe"
}
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"description": [
"lang" : "eng",
"value" : "Adobe Experience Manager Forms versions 6.2, 6.3 and 6.4 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"lang": "eng",
"value": "Stored Cross-site Scripting"
"description" : [
{
"lang" : "eng",
"value" : "Stored Cross-site Scripting"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html"
"name" : "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/aem-forms/apsb19-03.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2018-19724",
"ASSIGNER": "psirt@adobe.com"
}
}

View File

@ -1,62 +1,62 @@
{
"description": {
"description_data": [
"CVE_data_meta" : {
"ASSIGNER" : "psirt@adobe.com",
"ID" : "CVE-2018-19726",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
"product" : {
"product_data" : [
{
"product_name" : "Adobe Experience Manager",
"version" : {
"version_data" : [
{
"version_value" : "6.4, 6.3, 6.2, 6.1, and 6.0 versions"
}
]
}
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "6.4, 6.3, 6.2, 6.1, and 6.0 versions"
}
]
},
"product_name": "Adobe Experience Manager"
}
]
},
"vendor_name": "Adobe"
"vendor_name" : "Adobe"
}
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"description": [
"lang" : "eng",
"value" : "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"lang": "eng",
"value": "Stored Cross-site Scripting"
"description" : [
{
"lang" : "eng",
"value" : "Stored Cross-site Scripting"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
"name" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2018-19726",
"ASSIGNER": "psirt@adobe.com"
}
}

View File

@ -1,62 +1,62 @@
{
"description": {
"description_data": [
"CVE_data_meta" : {
"ASSIGNER" : "psirt@adobe.com",
"ID" : "CVE-2018-19727",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
"product" : {
"product_data" : [
{
"product_name" : "Adobe Experience Manager",
"version" : {
"version_data" : [
{
"version_value" : "6.4, 6.3, 6.2, 6.1, and 6.0 versions"
}
]
}
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "6.4, 6.3, 6.2, 6.1, and 6.0 versions"
}
]
},
"product_name": "Adobe Experience Manager"
}
]
},
"vendor_name": "Adobe"
"vendor_name" : "Adobe"
}
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"description": [
"lang" : "eng",
"value" : "Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"lang": "eng",
"value": "Reflected Cross-site Scripting"
"description" : [
{
"lang" : "eng",
"value" : "Reflected Cross-site Scripting"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
"name" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/experience-manager/apsb19-09.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2018-19727",
"ASSIGNER": "psirt@adobe.com"
}
}

View File

@ -1,62 +1,62 @@
{
"description": {
"description_data": [
"CVE_data_meta" : {
"ASSIGNER" : "psirt@adobe.com",
"ID" : "CVE-2018-19728",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"product" : {
"product_data" : [
{
"product_name" : "Adobe Acrobat and Reader",
"version" : {
"version_data" : [
{
"version_value" : "2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier versions"
}
]
}
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
]
},
"vendor_name": "Adobe"
"vendor_name" : "Adobe"
}
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"description": [
"lang" : "eng",
"value" : "Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"lang": "eng",
"value": "Out-of-bounds read"
"description" : [
{
"lang" : "eng",
"value" : "Out-of-bounds read"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html",
"refsource" : "CONFIRM",
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb18-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2018-19728",
"ASSIGNER": "psirt@adobe.com"
}
}

View File

@ -1,94 +1,94 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-3593",
"ASSIGNER": "psirt@mcafee.com",
"DATE_PUBLIC": "",
"TITLE": "Exploitation of Privilege/Trust vulnerability",
"AKA": "",
"STATE": "PUBLIC"
"CVE_data_meta" : {
"AKA" : "",
"ASSIGNER" : "psirt@mcafee.com",
"DATE_PUBLIC" : "",
"ID" : "CVE-2019-3593",
"STATE" : "PUBLIC",
"TITLE" : "Exploitation of Privilege/Trust vulnerability"
},
"source": {
"defect": [],
"advisory": "",
"discovery": "EXTERNAL"
},
"affects": {
"vendor": {
"vendor_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name": "Mcafee, LLC",
"product": {
"product_data": [
"product" : {
"product_data" : [
{
"product_name": "Total Protection (MTP)",
"version": {
"version_data": [
"product_name" : "Total Protection (MTP)",
"version" : {
"version_data" : [
{
"version_name": "",
"affected": "<",
"version_value": "16.0.R18",
"platform": ""
"affected" : "<",
"platform" : "",
"version_name" : "",
"version_value" : "16.0.R18"
}
]
}
}
]
}
},
"vendor_name" : "Mcafee, LLC"
}
]
}
},
"description": {
"description_data": [
"configuration" : [],
"credit" : [],
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang": "eng",
"value": "Exploitation of Privilege/Trust vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.R18 allows local users to bypass product self-protection, tamper with policies and product files, and uninstall McAfee software without permission via specially crafted malware."
"lang" : "eng",
"value" : "Exploitation of Privilege/Trust vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.R18 allows local users to bypass product self-protection, tamper with policies and product files, and uninstall McAfee software without permission via specially crafted malware."
}
]
},
"problemtype": {
"problemtype_data": [
"exploit" : [],
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH",
"attackVector" : "LOCAL",
"availabilityImpact" : "HIGH",
"baseScore" : 7.5,
"baseSeverity" : "HIGH",
"confidentialityImpact" : "NONE",
"integrityImpact" : "HIGH",
"privilegesRequired" : "LOW",
"scope" : "CHANGED",
"userInteraction" : "NONE",
"vectorString" : "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H",
"version" : "3.0"
}
},
"problemtype" : {
"problemtype_data" : [
{
"description": [
"description" : [
{
"lang": "eng",
"value": "Exploitation of Privilege/Trust vulnerability\n"
"lang" : "eng",
"value" : "Exploitation of Privilege/Trust vulnerability\n"
}
]
}
]
},
"references": {
"reference_data": [
"references" : {
"reference_data" : [
{
"refsource": "CONFIRM",
"url": "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888",
"name": "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888"
"name" : "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888",
"refsource" : "CONFIRM",
"url" : "http://service.mcafee.com/FAQDocument.aspx?&id=TS102888"
}
]
},
"configuration": [],
"impact": {
"cvss": {
"version": "3.0",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH"
}
"solution" : [],
"source" : {
"advisory" : "",
"defect" : [],
"discovery" : "EXTERNAL"
},
"exploit": [],
"work_around": [],
"solution": [],
"credit": []
"work_around" : []
}