mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 03:02:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
d4af9b37b3
commit
fae2159d38
@ -108,6 +108,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
|
||||
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[shiro-dev] 20191023 [jira] [Assigned] (SHIRO-723) Provide Minor Shiro Release that includes CVE-2019-10086 Fix",
|
||||
"url": "https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1628",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1628",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1546",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1546",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1477",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1477",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(1)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(1)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(2)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(2)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-822",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-822",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1003",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1003",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(2)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(2)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(2)",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(2)",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1073",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1073",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1490",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1490",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1621",
|
||||
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1621",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fusionpbx/fusionpbx/commit/2f9e591a4034c3aea70185dcab837946096449bf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=8834a501-3a18-429a-aa84-192dc01e66c7",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=8834a501-3a18-429a-aa84-192dc01e66c7"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-sofia-api-command-injection-1/",
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fusionpbx/fusionpbx/commit/6baad9af1bc55c80b793af3bd1ac35b39c20b173"
|
||||
},
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=14811194-6897-4e22-9110-b5767d46a536",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=14811194-6897-4e22-9110-b5767d46a536"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-sofia-api-command-injection-2/",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=5f72cb0b-54d7-487d-a8b9-8b30b7a02376",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=5f72cb0b-54d7-487d-a8b9-8b30b7a02376"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/02378c54722d89f875c66ddb00ff06468dabbc6d",
|
||||
"refsource": "MISC",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=408a8556-5ba5-44bb-a341-7cd96c76cad7",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=408a8556-5ba5-44bb-a341-7cd96c76cad7"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/d3679bbeface57a21f6623cbc193b04a7fc0a885",
|
||||
"refsource": "MISC",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=dc5f192e-c6e0-4526-bb66-687a88d435ec",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=dc5f192e-c6e0-4526-bb66-687a88d435ec"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/a55f1cd5d8edd655058152e9acf212680d5b75f3",
|
||||
"refsource": "MISC",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=bc250780-76ba-48c1-adc0-de421cbd61fd",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=bc250780-76ba-48c1-adc0-de421cbd61fd"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/c48a160af53352ad1a43518b7d0faab16b8dfbcc",
|
||||
"refsource": "MISC",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=f0f687f2-63c6-4740-b90b-d3ba3a3bd043",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=f0f687f2-63c6-4740-b90b-d3ba3a3bd043"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/913ad234cf145a55e5f2faaab08d776d83c1699b",
|
||||
"refsource": "MISC",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=e4f9dc60-6a4b-4e4f-9abf-975614822d43",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=e4f9dc60-6a4b-4e4f-9abf-975614822d43"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/bcc75d63aa5b721f699a2b416425943ad7707825",
|
||||
"refsource": "MISC",
|
||||
|
67
2019/16xxx/CVE-2019-16976.json
Normal file
67
2019/16xxx/CVE-2019-16976.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16976",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In FusionPBX up to 4.5.7, the file app\\destinations\\destination_imports.php uses an unsanitized \"query_string\" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/d6ea02d896b2c57dec491ee3b36ec102639270be",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fusionpbx/fusionpbx/commit/d6ea02d896b2c57dec491ee3b36ec102639270be"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-9/",
|
||||
"url": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-9/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a8614e66-95b7-490f-9aa8-10de5f3f9b7d",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a8614e66-95b7-490f-9aa8-10de5f3f9b7d"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/83622c4ee1d9dd1913e9fb01ce8f060b46a5768a",
|
||||
"refsource": "MISC",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=15d02f7a-3dc0-441a-ac70-e09f95817004",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=15d02f7a-3dc0-441a-ac70-e09f95817004"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/7fec1014ff0d08e36be6a3f7664edb3a9df7b4ac",
|
||||
"refsource": "MISC",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=84d7fa60-99d5-41a2-a392-0b0a727e5987",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=84d7fa60-99d5-41a2-a392-0b0a727e5987"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/cd4632b46c62855f7e1c1c93d20ffd64edcb476e",
|
||||
"refsource": "MISC",
|
||||
|
72
2019/18xxx/CVE-2019-18281.json
Normal file
72
2019/18xxx/CVE-2019-18281.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-18281",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows attackers to cause a denial of service by crashing an application via a text file containing many directional characters."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugreports.qt.io/browse/QTBUG-77819",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugreports.qt.io/browse/QTBUG-77819"
|
||||
},
|
||||
{
|
||||
"url": "https://codereview.qt-project.org/c/qt/qtbase/+/271889",
|
||||
"refsource": "MISC",
|
||||
"name": "https://codereview.qt-project.org/c/qt/qtbase/+/271889"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1848784",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1848784"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/18xxx/CVE-2019-18344.json
Normal file
62
2019/18xxx/CVE-2019-18344.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-18344",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Sourcecodester Online Grading System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the student, instructor, department, room, class, or user page (id or classid parameter)."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user