id stringlengths 13 16 | sourceIdentifier stringclasses 367
values | published stringlengths 23 23 | lastModified stringlengths 23 23 | vulnStatus stringclasses 6
values | cveTags listlengths 0 1 | descriptions listlengths 1 2 | metrics dict | weaknesses listlengths 1 3 ⌀ | configurations listlengths 1 2.88k ⌀ | references listlengths 0 281 | cisaExploitAdd stringclasses 263
values | cisaActionDue stringclasses 282
values | cisaRequiredAction stringclasses 31
values | cisaVulnerabilityName stringclasses 724
values | vendorComments listlengths 1 1 ⌀ | evaluatorComment stringclasses 13
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-3494 | cve@mitre.org | 2019-01-01T15:29:00.240 | 2024-11-21T04:42:08.157 | Modified | [] | [
{
"lang": "en",
"value": "Simply-Blog through 2019-01-01 has SQL Injection via the admin/deleteCategories.php delete parameter."
},
{
"lang": "es",
"value": "Simply-Blog tiene una inyección SQL hasta el 1/1/2019 mediante el parámetro delete en admin/deleteCategories.php."
}
] | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:simply-blog_project:simply-blog:*:*:*:*:*:*:*:*",
"matchCriteriaId": "257FE15E-5891-4363-A84A-ED68191BAEBD",
"versionEndExcluding": null,
"versionEndIncluding": "2019-01-01",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Paroxyste/Simply-Blog/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | null | null | null | null | null | null |
CVE-2018-20650 | cve@mitre.org | 2019-01-01T16:29:00.233 | 2024-11-21T04:01:56.097 | Modified | [] | [
{
"lang": "en",
"value": "A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach."
},
{
"lang": "es",
"value": "Una aser... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F021BE1-4D2A-4D00-9491-714CD38A7B2E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106459"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2022"
},
{
... | null | null | null | null | null | null |
CVE-2018-20651 | cve@mitre.org | 2019-01-01T16:29:00.343 | 2024-11-21T04:01:56.270 | Modified | [] | [
{
"lang": "en",
"value": "A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remot... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html"
},
{
"source": "cve@mit... | null | null | null | null | null | null |
CVE-2018-20652 | cve@mitre.org | 2019-01-01T16:29:00.403 | 2024-11-21T04:01:56.420 | Modified | [] | [
{
"lang": "en",
"value": "An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception."
},
{
... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6839BA33-4B4D-413F-8E81-0C4F9784EBBB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/syoyo/tinyexr/issues/104"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.co... | null | null | null | null | null | null |
CVE-2019-3500 | cve@mitre.org | 2019-01-02T07:29:00.197 | 2024-11-21T04:42:08.880 | Modified | [] | [
{
"lang": "en",
"value": "aria2c in aria2 1.33.1, when --log is used, can store an HTTP Basic Authentication username and password in a file, which might allow local users to obtain sensitive information by reading this file."
},
{
"lang": "es",
"value": "aria2c en la versión 1.33.1 de aria2, cu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aria2_project:aria2:1.33.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96C8BA0F-F5C0-4768-A381-B61A776211B2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aria2/aria2/issues/1329"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | null | null | null | null | null | null |
CVE-2019-3501 | cve@mitre.org | 2019-01-02T13:29:00.283 | 2024-11-21T04:42:09.037 | Modified | [] | [
{
"lang": "en",
"value": "The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile."
},
{
"lang": "es",
"value": "El plugin OUGC Awards en versiones anteriores a la 1.8.19 para MyBB permite Cross-Site Scripting... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ougc_awards_project:ougc_awards:*:*:*:*:*:mybb:*:*",
"matchCriteriaId": "5B7E7E8E-4508-44F9-861D-A5D9FEE232E7",
"versionEndExcluding": "1.8.19",
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUGC-Awards/issues/29"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Sama34/OUG... | null | null | null | null | null | null |
CVE-2018-15760 | security_alert@emc.com | 2019-01-02T14:15:09.007 | 2023-11-07T02:53:19.973 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-15799 | security_alert@emc.com | 2019-01-02T14:15:09.020 | 2023-11-07T02:53:23.870 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-15802 | security_alert@emc.com | 2019-01-02T14:15:09.053 | 2023-11-07T02:53:24.100 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-15803 | security_alert@emc.com | 2019-01-02T14:15:09.067 | 2023-11-07T02:53:24.320 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-17188 | security@apache.org | 2019-01-02T14:29:00.267 | 2024-11-21T03:54:03.020 | Modified | [] | [
{
"lang": "en",
"value": "Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB74D165-EAB4-486E-9E0B-9DE1333B4EC9",
"versionEndExcluding": "2.3.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
{
"source": "security@apache.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://blog.couchdb.org/2018/12/17/cve-2018-17188/"
},
{
"source": "security@apache.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.... | null | null | null | null | null | null |
CVE-2018-20657 | cve@mitre.org | 2019-01-02T14:29:00.313 | 2024-11-21T04:01:56.693 | Modified | [] | [
{
"lang": "en",
"value": "The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698."
},
{
"lang": "... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A2A091-F7E8-438C-8DE8-788A1DD5D11D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106444"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2019:3352"
},
{
"source": "cve@mitre.org",
... | null | null | null | null | null | null |
CVE-2018-5197 | vuln@krcert.or.kr | 2019-01-02T14:29:00.360 | 2024-11-21T04:08:18.907 | Modified | [] | [
{
"lang": "en",
"value": "A vulnerability in the ExtCommon.dll user extension module version 9.2, 9.2.1, 9.2.2 of Xplatform ActiveX could allow attacker to perform a command injection attack. The vulnerability is due to insufficient input validation of command parameters. An crafted malicious parameters cou... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tobesoft:xplatform:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "32A3070D-31CF-4085-AD51-929E1DAE70DA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
{
"source": "vuln@krcert.or.kr",
"tags": [
"Vendor Advisory"
],
"url": "http://support.tobesoft.co.kr/Support/index.html"
},
{
"source": "vuln@krcert.or.kr",
"tags": [
"Third Party Advisory"
],
"url": "https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_se... | null | null | null | null | null | null |
CVE-2018-20658 | cve@mitre.org | 2019-01-02T15:29:00.250 | 2024-11-21T04:01:56.843 | Modified | [] | [
{
"lang": "en",
"value": "The server in Core FTP 2.0 build 653 on 32-bit platforms allows remote attackers to cause a denial of service (daemon crash) via a crafted XRMD command."
},
{
"lang": "es",
"value": "El servidor en Core FTP 2.0 build 653 en plataformas de 32 bits permite a los atacantes... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:coreftp:core_ftp:2.0:*:*:*:*:*:x86:*",
"matchCriteriaId": "1B0FE693-04EE-4751-BCBA-333E4AA2318E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://coreftp.com/forums/viewtopic.php?f=15&t=4022509"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/... | null | null | null | null | null | null |
CVE-2019-3572 | cve@mitre.org | 2019-01-02T15:29:00.330 | 2024-11-21T04:42:11.410 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in libming 0.4.8. There is a heap-based buffer over-read in the function writePNG in the file util/dbl2png.c of the dbl2png command-line program. Because this is associated with an erroneous call to png_write_row in libpng, an out-of-bounds write might occur... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | null | null | null | null | null | null |
CVE-2019-3573 | cve@mitre.org | 2019-01-02T15:29:00.360 | 2024-11-21T04:42:11.550 | Modified | [] | [
{
"lang": "en",
"value": "In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png."
},
{
"lang": "es",
"value": "En la versión v1.8.2 de libsixel, hay un bucle infinito en la función sixel_decode_raw_impl() en el... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-835"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/... | null | null | null | null | null | null |
CVE-2019-3574 | cve@mitre.org | 2019-01-02T15:29:00.423 | 2024-11-21T04:42:11.697 | Modified | [] | [
{
"lang": "en",
"value": "In libsixel v1.8.2, there is a heap-based buffer over-read in the function load_jpeg() in the file loader.c, as demonstrated by img2sixel."
},
{
"lang": "es",
"value": "En la versión v1.8.2 de libsixel, hay una sobrelectura de búfer basada en memoria dinámica (heap) en ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/libsixel"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/... | null | null | null | null | null | null |
CVE-2018-7900 | psirt@huawei.com | 2019-01-02T16:29:00.217 | 2024-11-21T04:12:56.553 | Modified | [] | [
{
"lang": "en",
"value": "There is an information leak vulnerability in some Huawei HG products. An attacker may obtain information about the HG device by exploiting this vulnerability."
},
{
"lang": "es",
"value": "Hay una vulnerabilidad de fuga de información en algunos productos Huawei HG. Un... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:hg8010h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A136EB1-9A7C-42C9-A20C-B6B75B237D4E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-notices/huawei-sn-20181219-01-hg-en"
},
{
"source": "psirt@huawei.com",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.newskysecurity.com/informati... | null | null | null | null | null | null |
CVE-2018-20659 | cve@mitre.org | 2019-01-02T17:29:00.220 | 2024-11-21T04:01:56.993 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls."
},
{
"lang": "es",
"v... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https:... | null | null | null | null | null | null |
CVE-2019-3576 | cve@mitre.org | 2019-01-02T17:29:00.267 | 2024-11-21T04:42:11.970 | Modified | [] | [
{
"lang": "en",
"value": "inxedu through 2018-12-24 has a SQL Injection vulnerability that can lead to information disclosure via the deleteFaveorite/ PATH_INFO. The vulnerable code location is com.inxedu.os.edu.controller.user.UserController#deleteFavorite (aka deleteFavorite in com/inxedu/os/edu/controlle... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:inxedu_project:inxedu:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A51341-29F4-473B-996D-38F203D60696",
"versionEndExcluding": null,
"versionEndIncluding": "2018-12-24",
"versionS... | [
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "https://gitee.com/inxeduopen/inxedu/issues/IQIIV"
},
{
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabi... | null | null | null | null | null | null |
CVE-2019-3577 | cve@mitre.org | 2019-01-02T17:29:00.300 | 2024-11-21T04:42:12.143 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/ProductAction.class.php allows blind SQL Injection via the id[0] parameter to the /product URI."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en Waimai Super Cms 20150505. web/Lib/Action/... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*",
"matchCriteriaId": "8945479A-0C5E-4FC7-9D88-BC42E8EA0C3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/caokang/waimai/issues/9"
}
] | null | null | null | null | null | null |
CVE-2018-13045 | cve@mitre.org | 2019-01-02T18:29:00.247 | 2024-11-21T03:46:18.293 | Modified | [] | [
{
"lang": "en",
"value": "SQL injection vulnerability in the \"Bazar\" page in Yeswiki Cercopitheque 2018-06-19-1 and earlier allows attackers to execute arbitrary SQL commands via the \"id\" parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyección SQL en la página \"Bazar\" en Y... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yeswiki:cercopitheque:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3D2095-1E9F-48BF-BEA1-218F4F2F49E8",
"versionEndExcluding": null,
"versionEndIncluding": "2018-06-19-1",
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150848/Yeswiki-Cercopitheque-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entr... | null | null | null | null | null | null |
CVE-2018-14718 | cve@mitre.org | 2019-01-02T18:29:00.310 | 2024-11-21T03:49:39.707 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML jackson-databind anterior... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106601"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | null | null | null | null | null | null |
CVE-2018-14719 | cve@mitre.org | 2019-01-02T18:29:00.387 | 2024-11-21T03:49:40.010 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML ja... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source"... | null | null | null | null | null | null |
CVE-2018-14720 | cve@mitre.org | 2019-01-02T18:29:00.467 | 2024-11-21T03:49:40.270 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML jackson-d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
},
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F",
"versionEndExcluding": "2.6.7.2",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source"... | null | null | null | null | null | null |
CVE-2018-14721 | cve@mitre.org | 2019-01-02T18:29:00.543 | 2024-11-21T03:49:40.523 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de Faste... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1BA8F04-46A7-4804-A997-59080034013F",
"versionEndExcluding": "2.6.7.2",
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source"... | null | null | null | null | null | null |
CVE-2018-15490 | cve@mitre.org | 2019-01-02T18:29:00.653 | 2024-11-21T03:50:55.377 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP i... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.6,
"confidentialityImpact": "COMPLETE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:expressvpn:expressvpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98F7AD93-3730-4D97-983B-1CD3F1580A40",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://medium.com/%40Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-local-privilege-escalation-d22c86fecc47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://medium.com/%40Wflki/https-medium-c... | null | null | null | null | null | null |
CVE-2018-19360 | cve@mitre.org | 2019-01-02T18:29:00.717 | 2024-11-21T03:57:48.200 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML jackson-databind ante... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.7.2",
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107985"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | null | null | null | null | null | null |
CVE-2018-19361 | cve@mitre.org | 2019-01-02T18:29:00.827 | 2024-11-21T03:57:48.437 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML jackson-databind anteriores a la ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.7.2",
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107985"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | null | null | null | null | null | null |
CVE-2018-19362 | cve@mitre.org | 2019-01-02T18:29:00.933 | 2024-11-21T03:57:48.657 | Modified | [] | [
{
"lang": "en",
"value": "FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization."
},
{
"lang": "es",
"value": "Las versiones 2.x de FasterXML jackson-databind anteri... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.7.2",
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107985"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:0959"
},
{
... | null | null | null | null | null | null |
CVE-2018-19371 | cve@mitre.org | 2019-01-02T18:29:01.060 | 2024-11-21T03:57:49.520 | Modified | [] | [
{
"lang": "en",
"value": "The SaveUserSettings service in Content Manager in SDL Web 8.5.0 has an XXE Vulnerability that allows reading sensitive files from the system."
},
{
"lang": "es",
"value": "El servicio SaveUserSettings en Content Manager en la versión 8.5.0 de SDL Web tiene una vulnerab... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sdl:web_content_manager:8.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D56D5D4-06FF-4769-BA06-D64444CCF39D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150826/SDL-Web-Content-Manager-8.5.0-XML-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party A... | null | null | null | null | null | null |
CVE-2018-19478 | cve@mitre.org | 2019-01-02T18:29:01.123 | 2024-11-21T03:57:59.870 | Modified | [] | [
{
"lang": "en",
"value": "In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file."
},
{
"lang": "es",
"value": "En las versiones anteriores de la 9.26 de Artifex Ghostscript, un archivo PDF especialmente manipulado... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A224A817-11B3-45FF-B210-3DF1C83AE63D",
"versionEndExcluding": "9.26",
"versionEndIncluding": null,
"versionStartExcl... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com... | null | null | null | null | null | null |
CVE-2018-20100 | cve@mitre.org | 2019-01-02T18:29:01.230 | 2024-11-21T04:00:52.620 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered on August Connect devices. Insecure data transfer between the August app and August Connect during configuration allows attackers to discover home Wi-Fi credentials. This data transfer uses an unencrypted access point for these credentials, and passes them i... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-311"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:august:august_connect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A596E54-0B34-4D90-8554-575B7091758A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/august-connect/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://dojo.bullguard.com/do... | null | null | null | null | null | null |
CVE-2018-20114 | cve@mitre.org | 2019-01-02T18:29:01.277 | 2024-11-21T04:00:53.623 | Modified | [] | [
{
"lang": "en",
"value": "On D-Link DIR-818LW Rev.A 2.05.B03 and DIR-860L Rev.B 2.03.B03 devices, unauthenticated remote OS command execution can occur in the soap.cgi service of the cgibin binary via an \"&&\" substring in the service parameter. NOTE: this issue exists because of an incomplete fix for CVE... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dlink:dir-818lw_firmware:2.05.b03:*:*:*:*:*:*:*",
"matchCriteriaId": "4349ECC4-5F0F-496C-92E9-39932A40FE8A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-20114"
... | null | null | null | null | null | null |
CVE-2018-20166 | cve@mitre.org | 2019-01-02T18:29:01.310 | 2024-11-21T04:00:59.557 | Modified | [] | [
{
"lang": "en",
"value": "A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in \".ph... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rukovoditel:rukovoditel:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "548ADBFF-AC51-443A-916C-8CBE47A247A4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-Authenticated-Remote-Code-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party... | null | null | null | null | null | null |
CVE-2018-20211 | cve@mitre.org | 2019-01-02T18:29:01.373 | 2024-11-21T04:01:05.517 | Modified | [] | [
{
"lang": "en",
"value": "ExifTool 8.32 allows local users to gain privileges by creating a %TEMP%\\par-%username%\\cache-exiftool-8.32 folder with a victim's username, and then copying a Trojan horse ws32_32.dll file into this new folder, aka DLL Hijacking. NOTE: 8.32 is an obsolete version from 2010 (9.x... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiftool_project:exiftool:8.32:*:*:*:*:*:*:*",
"matchCriteriaId": "65CA6F69-B3BB-461D-9261-51EBE63ACC08",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Thir... | null | null | null | null | null | null |
CVE-2018-20326 | cve@mitre.org | 2019-01-02T18:29:01.433 | 2024-11-21T04:01:14.227 | Modified | [] | [
{
"lang": "en",
"value": "ChinaMobile PLC Wireless Router GPN2.4P21-C-CN devices with firmware W2001EN-00 have XSS via the cgi-bin/webproc?getpage=html/index.html var:subpage parameter."
},
{
"lang": "es",
"value": "Los dispositivos ChinaMobile PLC Wireless Router GPN2.4P21-C-CN con un firmware ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:chinamobile:gpn2.4p21-c-cn_firmware:w2001en-00:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA6F6DD-1AAD-4122-BB8C-720D27E3CD7D",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150918/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"T... | null | null | null | null | null | null |
CVE-2017-14808 | security@opentext.com | 2019-01-02T19:15:08.583 | 2023-11-07T02:39:13.920 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14809 | security@opentext.com | 2019-01-02T19:15:08.600 | 2023-11-07T02:39:14.160 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14810 | security@opentext.com | 2019-01-02T19:15:08.617 | 2023-11-07T02:39:14.420 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14811 | security@opentext.com | 2019-01-02T19:15:08.630 | 2023-11-07T02:39:14.667 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14812 | security@opentext.com | 2019-01-02T19:15:08.647 | 2023-11-07T02:39:14.903 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14813 | security@opentext.com | 2019-01-02T19:15:08.647 | 2023-11-07T02:39:15.153 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14814 | security@opentext.com | 2019-01-02T19:15:08.663 | 2023-11-07T02:39:15.390 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14815 | security@opentext.com | 2019-01-02T19:15:08.677 | 2023-11-07T02:39:15.637 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14816 | security@opentext.com | 2019-01-02T19:15:08.693 | 2023-11-07T02:39:15.870 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2017-14817 | security@opentext.com | 2019-01-02T19:15:08.707 | 2023-11-07T02:39:16.103 | Rejected | [] | [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none"
}
] | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": null,
"cvssMetricV40": null
} | null | null | [] | null | null | null | null | null | null |
CVE-2018-18264 | cve@mitre.org | 2019-01-03T01:29:00.270 | 2024-11-21T03:55:37.590 | Modified | [] | [
{
"lang": "en",
"value": "Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster."
},
{
"lang": "es",
"value": "Las versiones de Kubernetes Dashboard anteriores a la 1.10.1 permitían a los atacantes ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:dashboard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29E409E4-81D2-42F9-AF24-499A399D060A",
"versionEndExcluding": "1.10.1",
"versionEndIncluding": null,
"versionStartE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106493"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/dashboard/pull... | null | null | null | null | null | null |
CVE-2018-18893 | cve@mitre.org | 2019-01-03T01:29:00.380 | 2024-11-21T03:56:50.273 | Modified | [] | [
{
"lang": "en",
"value": "Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java."
},
{
"lang": "es",
"value": "En las versiones anteriores a la 2.4.6, Jinjava no bloquea el método getClass relacionado con com/hubspot/jinjava/el/... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hubspot:jinjava:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73BF4536-14D1-4C8E-AEAF-41E2886D0DCF",
"versionEndExcluding": "2.4.6",
"versionEndIncluding": null,
"versionStartExcludi... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/HubSpot/jinjava/blob/master/CHANGES.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Hub... | null | null | null | null | null | null |
CVE-2018-20131 | cve@mitre.org | 2019-01-03T01:29:00.443 | 2024-11-21T04:00:55.130 | Modified | [] | [
{
"lang": "en",
"value": "The Code42 app before 6.8.4, as used in Code42 for Enterprise, on Linux installs with overly permissive permissions on the /usr/local/crashplan/log directory. This allows a user to manipulate symbolic links to escalate privileges, or show the contents of sensitive files that a regu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:code42:code42:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "7584B102-7D10-4B64-939B-6D0C4C405585",
"versionEndExcluding": "6.8.4",
"versionEndIncluding": null,
"versionStart... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106452"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://code42.com/r/support/CVE-2018-20131"
},
{
"source": "af854a3a-2127-422b-91a... | null | null | null | null | null | null |
CVE-2019-3580 | cve@mitre.org | 2019-01-03T01:29:00.490 | 2024-11-21T04:42:12.580 | Modified | [] | [
{
"lang": "en",
"value": "OpenRefine through 3.1 allows arbitrary file write because Directory Traversal can occur during the import of a crafted project file."
},
{
"lang": "es",
"value": "OpenRefine hasta la versión 3.1 permite la escritura de archivos arbitrarios debido a que pueden ocurrir s... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A371C8E5-A486-40DE-8750-DAFA4D592354",
"versionEndExcluding": null,
"versionEndIncluding": "3.1",
"versionStartExc... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OpenRefine/OpenRefine/issues/1927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | null | null | null | null | null | null |
CVE-2018-17172 | cve@mitre.org | 2019-01-03T03:29:00.213 | 2024-11-21T03:54:00.250 | Modified | [] | [
{
"lang": "en",
"value": "The web application on Xerox AltaLink B80xx before 100.008.028.05200, C8030/C8035 before 100.001.028.05200, C8045/C8055 before 100.002.028.05200, and C8070 before 100.003.028.05200 allows unauthenticated command injection."
},
{
"lang": "es",
"value": "La aplicación web... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E65972A0-1138-496C-851B-1624F22D390D",
"versionEndExcluding": "100.001.028.05200",
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2018/12/cert_Security_Mini_Bulletin_XRX18AL_for_ALB80xx-C80xx_v1.1.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advi... | null | null | null | null | null | null |
CVE-2018-20662 | cve@mitre.org | 2019-01-03T13:29:00.237 | 2024-11-21T04:01:57.143 | Modified | [] | [
{
"lang": "en",
"value": "In Poppler 0.72.0, PDFDoc::setup in PDFDoc.cc allows attackers to cause a denial-of-service (application crash caused by Object.h SIGABRT, because of a wrong return value from PDFDoc::setup) by crafting a PDF file in which an xref data structure is mishandled during extractPDFSubty... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freedesktop:poppler:0.72.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F021BE1-4D2A-4D00-9491-714CD38A7B2E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2022"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2713"
},
{
"source"... | null | null | null | null | null | null |
CVE-2018-16879 | secalert@redhat.com | 2019-01-03T14:29:00.197 | 2024-11-21T03:53:30.993 | Modified | [] | [
{
"lang": "en",
"value": "Ansible Tower before version 3.3.3 does not set a secure channel as it is using the default insecure configuration channel settings for messaging celery workers from RabbitMQ. This could lead in data leak of sensitive information such as passwords as well as denial of service attac... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-311"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-311"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB1BD7D-CCB1-4536-9111-91D6DEF88848",
"versionEndExcluding": "3.3.3",
"versionEndIncluding": null,
"versionStartEx... | [
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106310"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https:/... | null | null | null | null | null | null |
CVE-2017-11004 | product-security@qualcomm.com | 2019-01-03T15:29:00.270 | 2024-11-21T03:06:56.057 | Modified | [] | [
{
"lang": "en",
"value": "A non-secure user may be able to access certain registers in snapdragon automobile, snapdragon mobile and snapdragon wear in versions IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18141 | product-security@qualcomm.com | 2019-01-03T15:29:00.333 | 2024-11-21T03:19:26.580 | Modified | [] | [
{
"lang": "en",
"value": "When a 3rd party TEE has been loaded it is possible for the non-secure world to create a secure monitor call which will give it access to privileged functions meant to only be accessible from the TEE in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions IPQ807... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18319 | product-security@qualcomm.com | 2019-01-03T15:29:00.413 | 2024-11-21T03:19:50.847 | Modified | [] | [
{
"lang": "en",
"value": "Information leak in UIM API debug messages in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 6... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-320"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18320 | product-security@qualcomm.com | 2019-01-03T15:29:00.583 | 2024-11-21T03:19:51.000 | Modified | [] | [
{
"lang": "en",
"value": "QSEE unload attempt on a 3rd party TEE without previously loading results in a data abort in snapdragon automobile and snapdragon mobile in versions MSM8996AU, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, S... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18321 | product-security@qualcomm.com | 2019-01-03T15:29:00.833 | 2024-11-21T03:19:51.157 | Modified | [] | [
{
"lang": "en",
"value": "Security keys used by the terminal and NW for a session could be leaked in snapdragon mobile in versions MDM9650, MDM9655, SD 835, SDA660."
},
{
"lang": "es",
"value": "Las claves de seguridad utilizadas por el terminal y NW para una sesión podrían filtrarse en snapdrag... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18322 | product-security@qualcomm.com | 2019-01-03T15:29:00.867 | 2024-11-21T03:19:51.280 | Modified | [] | [
{
"lang": "en",
"value": "Cryptographic key material leaked in WCDMA debug messages in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18323 | product-security@qualcomm.com | 2019-01-03T15:29:00.897 | 2024-11-21T03:19:51.420 | Modified | [] | [
{
"lang": "en",
"value": "Cryptographic key material leaked in TDSCDMA RRC debug messages in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430,... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-320"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18324 | product-security@qualcomm.com | 2019-01-03T15:29:00.927 | 2024-11-21T03:19:51.670 | Modified | [] | [
{
"lang": "en",
"value": "Cryptographic key material leaked in debug messages - GERAN in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18326 | product-security@qualcomm.com | 2019-01-03T15:29:00.960 | 2024-11-21T03:19:51.857 | Modified | [] | [
{
"lang": "en",
"value": "Cryptographic keys are printed in modem debug messages in snapdragon mobile and snapdragon wear in versions MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18327 | product-security@qualcomm.com | 2019-01-03T15:29:00.990 | 2024-11-21T03:19:52.010 | Modified | [] | [
{
"lang": "en",
"value": "Security keys are logged when any WCDMA call is configured or reconfigured in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, S... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18328 | product-security@qualcomm.com | 2019-01-03T15:29:01.020 | 2024-11-21T03:19:52.170 | Modified | [] | [
{
"lang": "en",
"value": "Use after free in QSH client rule processing in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 820, SD 835, SDA660, SDM630, ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18329 | product-security@qualcomm.com | 2019-01-03T15:29:01.067 | 2024-11-21T03:19:52.310 | Modified | [] | [
{
"lang": "en",
"value": "Possible Buffer overflow when transmitting an RTP packet in snapdragon automobile and snapdragon wear in versions MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71E28EA6-0683-4755-8ABB-7F37DA810E4F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2017-18330 | product-security@qualcomm.com | 2019-01-03T15:29:01.117 | 2024-11-21T03:19:52.467 | Modified | [] | [
{
"lang": "en",
"value": "Buffer overflow in AES-CCM and AES-GCM encryption via initialization vector in snapdragon automobile, snapdragon mobile and snapdragon wear in versions IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 4... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
{
"source": "product-security@qualcomm.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106128"
},
{
"source": "product-security@qualcomm.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.qualcomm.com/company... | null | null | null | null | null | null |
CVE-2018-16876 | secalert@redhat.com | 2019-01-03T15:29:01.163 | 2024-11-21T03:53:30.457 | Modified | [] | [
{
"lang": "en",
"value": "ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data."
},
{
"lang": "es",
"value": "ansible en versiones anteriores a las 2.5.14, 2.6.11 y 2.7.5 es vulnerable a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL"... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC90599B-B3DE-4F3C-809E-2AC639AB1C9D",
"versionEndExcluding": "2.5.14",
"versionEndIncluding": null,
"versionStartExcludi... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opens... | null | null | null | null | null | null |
CVE-2018-16870 | secalert@redhat.com | 2019-01-03T16:29:00.227 | 2024-11-21T03:53:29.530 | Modified | [] | [
{
"lang": "en",
"value": "It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data."
},
{
"lang": "es",
"value": "Se ha detectado que wolfssl, en versiones anteriores a ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F4CF5D-69C9-4F89-A85F-99C7564DC9B8",
"versionEndExcluding": "3.15.7",
"versionEndIncluding": null,
"versionStartExclud... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://cat.eyalro.net/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wolfSSL/wolfssl/pull/1950"
},
{
"source":... | null | null | null | null | null | null |
CVE-2018-16882 | secalert@redhat.com | 2019-01-03T16:29:00.303 | 2024-11-21T03:53:31.467 | Modified | [] | [
{
"lang": "en",
"value": "A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without res... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52E774F9-E7BA-4145-954A-46F52D403BDF",
"versionEndExcluding": "4.14.91",
"versionEndIncluding": null,
"versionStartEx... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106254"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://... | null | null | null | null | null | null |
CVE-2018-16885 | secalert@redhat.com | 2019-01-03T16:29:00.477 | 2024-11-21T03:53:31.970 | Modified | [] | [
{
"lang": "en",
"value": "A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "secalert@redhat.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E830885-46C1-4A5F-AF6B-320ADFC7B788",
"versionEndExcluding": null,
"versionEndIncluding": "3.10.90",
"versionStartEx... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106296"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://access.redhat.com/errata/RHSA-2019:2029"
},
{
"source": "secale... | null | null | null | null | null | null |
CVE-2019-3701 | cve@mitre.org | 2019-01-03T16:29:00.553 | 2024-11-21T04:42:21.783 | Modified | [] | [
{
"lang": "en",
"value": "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame mod... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE279FFB-2E93-4DB8-B46B-C16E88F9941D",
"versionEndExcluding": null,
"versionEndIncluding": "4.19.13",
"versionStartEx... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106443"
},
{
"s... | null | null | null | null | null | null |
CVE-2018-17161 | secteam@freebsd.org | 2019-01-03T17:29:00.190 | 2024-11-21T03:53:59.480 | Modified | [] | [
{
"lang": "en",
"value": "In FreeBSD before 11.2-STABLE(r348229), 11.2-RELEASE-p7, 12.0-STABLE(r342228), and 12.0-RELEASE-p1, insufficient validation of network-provided data in bootpd may make it possible for a malicious attacker to craft a bootp packet which could cause a stack buffer overflow. It is poss... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*",
"matchCriteriaId": "3ACD1D8D-B3BC-4E99-B846-90A4071DB87B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
{
"source": "secteam@freebsd.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106292"
},
{
"source": "secteam@freebsd.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://security.freebsd.org/adv... | null | null | null | null | null | null |
CVE-2018-14481 | cve@mitre.org | 2019-01-03T19:29:00.430 | 2024-11-21T03:49:10.263 | Modified | [] | [
{
"lang": "en",
"value": "Osclass 3.7.4 has XSS via the query string to index.php, a different vulnerability than CVE-2014-6280."
},
{
"lang": "es",
"value": "La versión 3.7.4 de Osclass tiene Cross-Site Scripting (XSS) mediante la cadena de consulta en index.php. Esta vulnerabilidad es diferent... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:osclass:osclass:3.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F59049-31FD-47B3-AE55-79672A9DAB59",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150643/OSclass-3.7.4-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
... | null | null | null | null | null | null |
CVE-2018-19414 | cve@mitre.org | 2019-01-03T19:29:00.523 | 2024-11-21T03:57:52.690 | Modified | [] | [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Plikli CMS 4.0.0 allow remote attackers to inject arbitrary web script or HTML via the (1) keyword parameter to groups.php; (2) username parameter to login.php; or (3) date parameter to search.php."
},
{
"lang": "es",
... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:plikli:plikli_cms:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "692E724F-713A-4244-86D0-11EB6769537F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150657/Plikli-4.0.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"T... | null | null | null | null | null | null |
CVE-2018-19415 | cve@mitre.org | 2019-01-03T19:29:00.600 | 2024-11-21T03:57:52.840 | Modified | [] | [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in Plikli CMS 4.0.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to join_group.php or (2) comment_id parameter to story.php."
},
{
"lang": "es",
"value": "Múltiples vulnerabilidades de inyección... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:plikli:plikli_cms:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "692E724F-713A-4244-86D0-11EB6769537F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2018/Dec/8"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.netsparker.com/web-ap... | null | null | null | null | null | null |
CVE-2018-19505 | cve@mitre.org | 2019-01-03T19:29:00.663 | 2024-11-21T03:58:02.883 | Modified | [] | [
{
"lang": "en",
"value": "Remedy AR System Server in BMC Remedy 7.1 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user, because userdata.js in the WOI:WorkOrderConsole component allows a username substitution invol... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bmc:remedy_action_request_system_server:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B76F9D9-AB96-4753-856A-4AB22DFFE261",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150492/BMC-Remedy-7.1-User-Impersonation.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"u... | null | null | null | null | null | null |
CVE-2018-19523 | cve@mitre.org | 2019-01-03T19:29:00.757 | 2024-11-21T03:58:05.687 | Modified | [] | [
{
"lang": "en",
"value": "DriverAgent 2.2015.7.14, which includes DrvAgent64.sys 1.0.0.1, allows a user to send an IOCTL (0x80002068) with a user defined buffer size. If the size of the buffer is less than 512 bytes, then the driver will overwrite the next pool header if there is one next to the user buffer... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:driveagent:driveagent:2.2015.7.14:*:*:*:*:*:*:*",
"matchCriteriaId": "3CB63593-2233-456F-B388-73E74CE649CF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86ahttps://downwithup.github.io/CVEPosts.html"
},
{
"source": "nvd@nist.gov",
"tags": [
"Third Party Advisory"
],
"ur... | null | null | null | null | null | null |
CVE-2018-19861 | cve@mitre.org | 2019-01-03T19:29:00.803 | 2024-11-21T03:58:42.430 | Modified | [] | [
{
"lang": "en",
"value": "Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP HEAD request. NOTE: this product is discontinued."
},
{
"lang": "es",
"value": "MiniShare en la versión 1.4.1 y sus anteriores versiones permite a los ataca... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:minishare_project:minishare:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D3534A6-1C2F-4134-996B-74E417DBF5B4",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"version... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
... | null | null | null | null | null | null |
CVE-2018-19862 | cve@mitre.org | 2019-01-03T19:29:00.897 | 2024-11-21T03:58:42.577 | Modified | [] | [
{
"lang": "en",
"value": "Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP POST request. NOTE: this product is discontinued."
},
{
"lang": "es",
"value": "MiniShare, en la versión 1.4.1 y anteriores, tiene un desbordamiento de búfe... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:minishare_project:minishare:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D3534A6-1C2F-4134-996B-74E417DBF5B4",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.1",
"version... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/150689/MiniShare-1.4.1-HEAD-POST-Buffer-Overflow.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
... | null | null | null | null | null | null |
CVE-2018-19992 | cve@mitre.org | 2019-01-03T19:29:00.977 | 2024-11-21T03:58:57.537 | Modified | [] | [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the \"address\" (POST) or \"town\" (POST) parameter to adherents/type.php."
},
{
"lang": "es",
"value": "Una vulnerabilidad d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Dolibarr/dolibarr/commit/0f06e39d23636bd1e4039ac61a743c79725c798b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"... | null | null | null | null | null | null |
CVE-2018-19993 | cve@mitre.org | 2019-01-03T19:29:01.007 | 2024-11-21T03:58:57.687 | Modified | [] | [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote attackers to inject arbitrary web script or HTML via the transphrase parameter to public/notice.php."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) refle... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Dolibarr/dolibarr/commit/fc3fcc5455d9a610b85723e89e8be43a41ad1378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"... | null | null | null | null | null | null |
CVE-2018-19994 | cve@mitre.org | 2019-01-03T19:29:01.053 | 2024-11-21T03:58:57.827 | Modified | [] | [
{
"lang": "en",
"value": "An error-based SQL injection vulnerability in product/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the desiredstock parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyección SQL basada en error... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Dolibarr/dolibarr/commit/850b939ffd2c7a4443649331b923d5e0da2d6446"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"... | null | null | null | null | null | null |
CVE-2018-19995 | cve@mitre.org | 2019-01-03T19:29:01.087 | 2024-11-21T03:58:57.960 | Modified | [] | [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the \"address\" (POST) or \"town\" (POST) parameter to user/card.php."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cro... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Dolibarr/dolibarr/commit/4b8be6ed64763327018ac1c076f81ddffa87855e"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "htt... | null | null | null | null | null | null |
CVE-2018-19998 | cve@mitre.org | 2019-01-03T19:29:01.350 | 2024-11-21T03:58:58.097 | Modified | [] | [
{
"lang": "en",
"value": "SQL injection vulnerability in user/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the employee parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyección SQL basada en errores en la versión 8.0.2... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30608213-F99C-4D9E-B848-794532E85267",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Dolibarr/dolibarr/commit/2b088a73c121a52e006c0d76ea4da7ffeb7b4f4a"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "htt... | null | null | null | null | null | null |
CVE-2018-20512 | cve@mitre.org | 2019-01-03T19:29:01.600 | 2024-11-21T04:01:38.670 | Modified | [] | [
{
"lang": "en",
"value": "EPON CPE-WiFi devices 2.0.4-X000 are vulnerable to escalation of privileges by sending cooLogin=1, cooUser=admin, and timestamp=-1 cookies."
},
{
"lang": "es",
"value": "Los dispositivos EPON CPE-WiFi 2.0.4-X000 son vulnerables a un escalado de privilegios enviando cook... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"description": [
{
"lang": "en",
"value": "CWE-565"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cdatatec:epon_cpe-wifi_devices_firmware:2.0.4-x000:*:*:*:*:*:*:*",
"matchCriteriaId": "9B09F37C-DD48-4521-80AC-5CC6C4E0592A",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.reddit.com/r/networking/comments/abu4kq/vulnerability_in_cdata_technologies_epon_cpewifi/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"... | null | null | null | null | null | null |
CVE-2018-20663 | cve@mitre.org | 2019-01-03T19:29:01.633 | 2024-11-21T04:01:57.350 | Modified | [] | [
{
"lang": "en",
"value": "The Reporting Addon (aka Reports Addon) through 2019-01-02 for CUBA Platform through 6.10.x has Persistent XSS via the \"Reports > Reports\" name field."
},
{
"lang": "es",
"value": "Reporting Addon (también conocido como Reports Addon) hasta el 02/01/2019 para CUBA Pla... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B5878-0971-4E5A-A121-439A3E3F0DEA",
"versionEndExcluding": null,
"versionEndIncluding": "6.10.7",
"versionStar... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cuba-platform/reports/issues/140"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | null | null | null | null | null | null |
CVE-2018-20664 | cve@mitre.org | 2019-01-03T19:29:01.680 | 2024-11-21T04:01:57.493 | Modified | [] | [
{
"lang": "en",
"value": "Zoho ManageEngine ADSelfService Plus 5.x before build 5701 has XXE via an uploaded product license."
},
{
"lang": "es",
"value": "Zoho ManageEngine ADSelfService Plus, en sus versiones 5.x antes del build 5701, tiene XEE (XML External Entity) mediante una licencia de pr... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-611"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:4500:*:*:*:*:*:*",
"matchCriteriaId": "796A4512-DC6E-42A1-9A57-D4F446A9BC34",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20664/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.manageengine.com/pr... | null | null | null | null | null | null |
CVE-2019-3575 | cve@mitre.org | 2019-01-03T19:29:01.727 | 2024-11-21T04:42:11.833 | Modified | [] | [
{
"lang": "en",
"value": "Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load."
},
{
"lang": "es",
"value": "La versión 0.9.1 de Sqla_yaml_fixtures permite a los usuarios locales ejecutar código arbitrario de pytho... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sqla_yaml_fixtures_project:sqla_yaml_fixtures:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED3C927-3CA7-415E-9574-6D108DC91EA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schettino72/sqla_yaml_fixtures/issues/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | null | null | null | null | null | null |
CVE-2019-3905 | cve@mitre.org | 2019-01-03T19:29:01.757 | 2024-11-21T04:42:50.110 | Modified | [] | [
{
"lang": "en",
"value": "Zoho ManageEngine ADSelfService Plus 5.x before build 5703 has SSRF."
},
{
"lang": "es",
"value": "Zoho ManageEngine ADSelfService Plus, en sus versiones 5.x antes del build 5703, tiene Server-Side Request Forgery (SSRF)."
}
] | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5000:*:*:*:*:*:*",
"matchCriteriaId": "9B826420-BD33-4C0F-A0C8-E614AFA0AE5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.excellium-services.com/cert-xlm-advisory/cve-2019-3905/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://www.manageengine.com/pro... | null | null | null | null | null | null |
CVE-2018-18004 | cve@mitre.org | 2019-01-03T20:29:00.267 | 2024-11-21T03:55:21.190 | Modified | [] | [
{
"lang": "en",
"value": "Incorrect Access Control in mod_inetd.cgi in VIVOTEK Network Camera Series products with firmware before XXXXXX-VVTK-0X09a allows remote attackers to enable arbitrary system services via a URL parameter."
},
{
"lang": "es",
"value": "Control de acceso incorrecto en mod_... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C70F3D07-A12A-48F8-B5B9-FD25F19701F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.secur... | null | null | null | null | null | null |
CVE-2018-18005 | cve@mitre.org | 2019-01-03T20:29:00.327 | 2024-11-21T03:55:21.337 | Modified | [] | [
{
"lang": "en",
"value": "Cross-site scripting in event_script.js in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript via a URL query string parameter."
},
{
"lang": "es",
"value": "Cross-Site Scripting (XSS) en event_scr... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C70F3D07-A12A-48F8-B5B9-FD25F19701F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.secur... | null | null | null | null | null | null |
CVE-2018-18244 | cve@mitre.org | 2019-01-03T20:29:00.373 | 2024-11-21T03:55:34.567 | Modified | [] | [
{
"lang": "en",
"value": "Cross-site scripting in syslog.html in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript code via an HTTP Referer Header."
},
{
"lang": "es",
"value": "Cross-Site Scripting (XSS) en syslog.html en... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C70F3D07-A12A-48F8-B5B9-FD25F19701F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://download.vivotek.com/downloadfile/support/cyber-security/vvtk-sa-2018-006-v1.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://blog.secur... | null | null | null | null | null | null |
CVE-2018-19600 | cve@mitre.org | 2019-01-03T20:29:00.437 | 2024-11-21T03:58:16.093 | Modified | [] | [
{
"lang": "en",
"value": "Rhymix CMS 1.9.8.1 allows XSS via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload."
},
{
"lang": "es",
"value": "La versión 1.9.8.1 de Rhymix permite Cross-Site Scripting (XSS) mediante una subida SVG en index.php?module=adminact=dispModuleAdminFileBox."... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rhymix/rhymix/issues/1088"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | null | null | null | null | null | null |
CVE-2018-19601 | cve@mitre.org | 2019-01-03T20:29:00.500 | 2024-11-21T03:58:16.237 | Modified | [] | [
{
"lang": "en",
"value": "Rhymix CMS 1.9.8.1 allows SSRF via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload."
},
{
"lang": "es",
"value": "La versión 1.9.8.1 de Rhymix permite Server-Side Request Forgery (SSRF) mediante una subida SVG en index.php?module=adminact=dispModuleAdmin... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rhymix:rhymix:1.9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833B50-FE4E-40C7-AB0B-3572D5C8A103",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rhymix/rhymix/issues/1089"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | null | null | null | null | null | null |
CVE-2018-15780 | security_alert@emc.com | 2019-01-03T21:29:00.200 | 2024-11-21T03:51:27.217 | Modified | [] | [
{
"lang": "en",
"value": "RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read access to restricted user information."
},
{
"lang": "es",
"value": "... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rsa:archer_grc_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C51A5DA-5A0C-4051-A4B7-C0C5B5A3B61A",
"versionEndExcluding": "6.5.0.1",
"versionEndIncluding": null,
"versionSt... | [
{
"source": "security_alert@emc.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106396"
},
{
"source": "security_alert@emc.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.or... | null | null | null | null | null | null |
CVE-2018-18995 | ics-cert@hq.dhs.gov | 2019-01-03T22:29:00.247 | 2024-11-21T03:57:00.443 | Modified | [] | [
{
"lang": "en",
"value": "Pluto Safety PLC Gateway Ethernet devices ABB GATE-E1 and GATE-E2 all versions do not allow authentication to be configured on administrative telnet or web interfaces, which could enable various effects vectors, including conducting device resets, reading or modifying registers, an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:abb:gate-e1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D27F9314-660C-46AC-91A6-14DD2AFB3518",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106247"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"ur... | null | null | null | null | null | null |
CVE-2018-18997 | ics-cert@hq.dhs.gov | 2019-01-03T22:29:00.293 | 2024-11-21T03:57:00.680 | Modified | [] | [
{
"lang": "en",
"value": "Pluto Safety PLC Gateway Ethernet devices in ABB GATE-E1 and GATE-E2 all versions allows an unauthenticated attacker using the administrative web interface to insert an HTML/Javascript payload into any of the device properties, which may allow an attacker to display/execute the pay... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:abb:gate-e1_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D27F9314-660C-46AC-91A6-14DD2AFB3518",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106247"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
],
"ur... | null | null | null | null | null | null |
CVE-2018-19249 | cve@mitre.org | 2019-01-03T22:29:00.323 | 2024-11-21T03:57:38.607 | Modified | [] | [
{
"lang": "en",
"value": "The Stripe API v1 allows remote attackers to bypass intended access restrictions by replaying api.stripe.com /v1/tokens XMLHttpRequest data, parsing the response under the object card{}, and reading the cvc_check information if the creation is successful without charging the actual... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stripe:stripe_api:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1EE77B7B-8714-46E9-86E5-10A0E102A213",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://fredmooredamian.blogspot.com/2019/01/improper-authentication-on-stripe-api-v1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http... | null | null | null | null | null | null |
CVE-2018-3986 | talos-cna@cisco.com | 2019-01-03T22:29:00.370 | 2024-11-21T04:06:26.403 | Modified | [] | [
{
"lang": "en",
"value": "An exploitable information disclosure vulnerability exists in the \"Secret Chats\" functionality of the Telegram Android messaging application version 4.9.0. The \"Secret Chats\" functionality allows a user to delete all traces of a chat, either by using a time trigger or by direct... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:telegram:telegram:4.9.0:*:*:*:*:android:*:*",
"matchCriteriaId": "D8F8E255-2E37-43E2-B42E-133D6EB33985",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
{
"source": "talos-cna@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106295"
},
{
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://w... | null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.