"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-01-02 17:01:12 +00:00
parent 792116458d
commit ffd6da8f91
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 258 additions and 10 deletions

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-4752",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,98 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Symfony 2.0.X before 2.0.24, 2.1.X before 2.1.12, 2.2.X before 2.2.5, and 2.3.X before 2.3.3 have an issue in the HttpFoundation component. The Host header can be manipulated by an attacker when the framework is generating an absolute URL. A remote attacker could exploit this vulnerability to inject malicious content into the Web application page and conduct various attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://symfony.com/blog/security-releases-symfony-2-0-24-2-1-12-2-2-5-and-2-3-3-released",
"url": "http://symfony.com/blog/security-releases-symfony-2-0-24-2-1-12-2-2-5-and-2-3-3-released"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4752",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4752"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86367",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86367"
},
{
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114450.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114450.html"
},
{
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114461.html",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114461.html"
},
{
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/61715",
"url": "http://www.securityfocus.com/bid/61715"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86365",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86365"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86366",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86366"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86368",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86368"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86369",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86369"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86370",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86370"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86371",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86371"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86372",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86372"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86373",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86373"
},
{
"refsource": "MISC",
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86374",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86374"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0048",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "docker.io",
"product": {
"product_data": [
{
"product_name": "docker.io",
"version": {
"version_data": [
{
"version_value": "before 1.6.0"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,58 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was found in Docker before 1.6.0. Some programs and scripts in Docker are downloaded via HTTP and then executed or used in unsafe ways."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2014-0048",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2014-0048"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0048",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0048"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0048",
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0048"
},
{
"url": "https://access.redhat.com/security/cve/cve-2014-0048",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2014-0048"
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/03/24/23",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/03/24/23"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/03/24/18",
"url": "http://www.openwall.com/lists/oss-security/2015/03/24/18"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/03/24/22",
"url": "http://www.openwall.com/lists/oss-security/2015/03/24/22"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0104",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "fence-agents",
"product": {
"product_data": [
{
"product_name": "fence-agents",
"version": {
"version_data": [
{
"version_value": "before 4.0.17"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,43 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In fence-agents before 4.0.17 does not verify remote SSL certificates in the fence_cisco_ucs.py script which can potentially allow for man-in-the-middle attackers to spoof SSL servers via arbitrary SSL certificates."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "no verification of remote SSL certificates"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2014-0104",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2014-0104"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0104",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0104"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0104",
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0104"
},
{
"url": "https://access.redhat.com/security/cve/cve-2014-0104",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/cve-2014-0104"
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10205",
"ASSIGNER": "msiddiqu@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -68,4 +69,4 @@
]
]
}
}
}