Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-8780 (GCVE-0-2018-8780)
Vulnerability from cvelistv5 – Published: 2018-04-03 22:00 – Updated: 2024-08-05 07:02- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:02:26.043Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
},
{
"name": "RHSA-2018:3729",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"name": "USN-3626-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3626-1/"
},
{
"name": "1042004",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:3730",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"name": "RHSA-2018:3731",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"name": "103739",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103739"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
},
{
"name": "DSA-4259",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"name": "openSUSE-SU-2019:1771",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"name": "RHSA-2019:2028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"name": "RHSA-2020:0542",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"name": "RHSA-2020:0591",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"name": "RHSA-2020:0663",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-03-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-03T18:06:19.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
},
{
"name": "RHSA-2018:3729",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"name": "USN-3626-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3626-1/"
},
{
"name": "1042004",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:3730",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"name": "RHSA-2018:3731",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"name": "103739",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103739"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
},
{
"name": "DSA-4259",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"name": "openSUSE-SU-2019:1771",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"name": "RHSA-2019:2028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"name": "RHSA-2020:0542",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"name": "RHSA-2020:0591",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"name": "RHSA-2020:0663",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-8780",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
},
{
"name": "RHSA-2018:3729",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"name": "USN-3626-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3626-1/"
},
{
"name": "1042004",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:3730",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"name": "RHSA-2018:3731",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"name": "103739",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103739"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
},
{
"name": "DSA-4259",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"name": "openSUSE-SU-2019:1771",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"name": "RHSA-2019:2028",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"name": "RHSA-2020:0542",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"name": "RHSA-2020:0591",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"name": "RHSA-2020:0663",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-8780",
"datePublished": "2018-04-03T22:00:00.000Z",
"dateReserved": "2018-03-19T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:02:26.043Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2018-8780",
"date": "2026-05-20",
"epss": "0.01344",
"percentile": "0.80256"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.2.10\", \"matchCriteriaId\": \"FDA970A9-AD36-44E1-B2CA-653A29A917FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.3.0\", \"versionEndExcluding\": \"2.3.7\", \"matchCriteriaId\": \"17DC7068-E1B8-4699-BDE0-14305D35D24B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.4.0\", \"versionEndExcluding\": \"2.4.4\", \"matchCriteriaId\": \"7172D61A-F82C-4EB5-9763-611CFE08A09B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.5.0\", \"versionEndExcluding\": \"2.5.1\", \"matchCriteriaId\": \"4A56E97B-C7E3-48AC-AAEF-4FA056276D03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:2.6.0:preview1:*:*:*:*:*:*\", \"matchCriteriaId\": \"787FDFC6-E780-4F95-9E46-C5CF77E7EBC7\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.\"}, {\"lang\": \"es\", \"value\": \"En Ruby, en versiones anteriores a la 2.2.10, versiones 2.3.x anteriores a la 2.3.7, versiones 2.4.x anteriores a la 2.4.4, versiones 2.5.x anteriores a la 2.5.1 y la versi\\u00f3n 2.6.0-preview1, los m\\u00e9todos Dir.open, Dir.new, Dir.entries y Dir.empty? no comprueban los caracteres NULL. Al emplear el m\\u00e9todo correspondiente, podr\\u00eda realizarse un salto de directorio no intencionado.\"}]",
"id": "CVE-2018-8780",
"lastModified": "2024-11-21T04:14:17.963",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-04-03T22:29:00.947",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/103739\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1042004\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3729\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3730\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3731\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2028\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0542\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0591\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0663\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3626-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4259\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/103739\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1042004\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3729\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3730\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3731\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:2028\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0542\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0591\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0663\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3626-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4259\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-8780\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-04-03T22:29:00.947\",\"lastModified\":\"2024-11-21T04:14:17.963\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.\"},{\"lang\":\"es\",\"value\":\"En Ruby, en versiones anteriores a la 2.2.10, versiones 2.3.x anteriores a la 2.3.7, versiones 2.4.x anteriores a la 2.4.4, versiones 2.5.x anteriores a la 2.5.1 y la versi\u00f3n 2.6.0-preview1, los m\u00e9todos Dir.open, Dir.new, Dir.entries y Dir.empty? no comprueban los caracteres NULL. Al emplear el m\u00e9todo correspondiente, podr\u00eda realizarse un salto de directorio no intencionado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.10\",\"matchCriteriaId\":\"FDA970A9-AD36-44E1-B2CA-653A29A917FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.3.0\",\"versionEndExcluding\":\"2.3.7\",\"matchCriteriaId\":\"17DC7068-E1B8-4699-BDE0-14305D35D24B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndExcluding\":\"2.4.4\",\"matchCriteriaId\":\"7172D61A-F82C-4EB5-9763-611CFE08A09B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.5.0\",\"versionEndExcluding\":\"2.5.1\",\"matchCriteriaId\":\"4A56E97B-C7E3-48AC-AAEF-4FA056276D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.6.0:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"787FDFC6-E780-4F95-9E46-C5CF77E7EBC7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/103739\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042004\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3729\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3730\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3731\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2028\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0542\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0591\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0663\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3626-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4259\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/103739\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0542\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0591\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3626-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2018-AVI-524
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | Safari | Safari versions antérieures à 12.0.1 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.6 | ||
| Apple | N/A | iOS versions antérieures à 12.1 | ||
| Apple | N/A | watchOS versions antérieures à 5.1 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.6 | ||
| Apple | N/A | tvOS versions antérieures à 12.1 | ||
| Apple | N/A | iCloud for Windows versions antérieures à 7.8 | ||
| Apple | macOS | macOS Mojave versions antérieures à 10.14 | ||
| Apple | N/A | iTunes versions antérieures à 12.9.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Safari versions ant\u00e9rieures \u00e0 12.0.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud for Windows versions ant\u00e9rieures \u00e0 7.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Mojave versions ant\u00e9rieures \u00e0 10.14",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-4310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4310"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4391"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-4368",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4368"
},
{
"name": "CVE-2018-4395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4395"
},
{
"name": "CVE-2018-4425",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4425"
},
{
"name": "CVE-2018-4259",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4259"
},
{
"name": "CVE-2018-4400",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4400"
},
{
"name": "CVE-2018-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4415"
},
{
"name": "CVE-2018-4427",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4427"
},
{
"name": "CVE-2018-4369",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4369"
},
{
"name": "CVE-2018-4396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4396"
},
{
"name": "CVE-2018-4291",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4291"
},
{
"name": "CVE-2017-12618",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12618"
},
{
"name": "CVE-2018-4374",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4374"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2018-4350",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4350"
},
{
"name": "CVE-2018-4386",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4386"
},
{
"name": "CVE-2018-4417",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4417"
},
{
"name": "CVE-2018-4331",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4331"
},
{
"name": "CVE-2018-4398",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4398"
},
{
"name": "CVE-2018-4412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4412"
},
{
"name": "CVE-2018-4420",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4420"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4392"
},
{
"name": "CVE-2018-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4409"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2018-4419",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4419"
},
{
"name": "CVE-2018-4371",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4371"
},
{
"name": "CVE-2018-4348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4348"
},
{
"name": "CVE-2018-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4382"
},
{
"name": "CVE-2018-4424",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4424"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2018-4288",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4288"
},
{
"name": "CVE-2018-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4203"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2018-4402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4402"
},
{
"name": "CVE-2018-4377",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4377"
},
{
"name": "CVE-2018-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4378"
},
{
"name": "CVE-2018-4341",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4341"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-4426",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4426"
},
{
"name": "CVE-2018-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4367"
},
{
"name": "CVE-2018-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4399"
},
{
"name": "CVE-2018-4342",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4342"
},
{
"name": "CVE-2018-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4389"
},
{
"name": "CVE-2018-4403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4403"
},
{
"name": "CVE-2018-4411",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4411"
},
{
"name": "CVE-2018-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4408"
},
{
"name": "CVE-2018-4375",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4375"
},
{
"name": "CVE-2018-4418",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4418"
},
{
"name": "CVE-2018-4340",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4340"
},
{
"name": "CVE-2018-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4394"
},
{
"name": "CVE-2018-4365",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4365"
},
{
"name": "CVE-2018-6797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6797"
},
{
"name": "CVE-2018-4308",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4308"
},
{
"name": "CVE-2018-4126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4126"
},
{
"name": "CVE-2018-4376",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4376"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2018-4286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4286"
},
{
"name": "CVE-2018-4334",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4334"
},
{
"name": "CVE-2018-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4304"
},
{
"name": "CVE-2018-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4393"
},
{
"name": "CVE-2018-4354",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4354"
},
{
"name": "CVE-2018-4406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4406"
},
{
"name": "CVE-2018-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4372"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4287"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2018-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4423"
},
{
"name": "CVE-2018-4385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4385"
},
{
"name": "CVE-2018-4153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4153"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2018-4388",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4388"
},
{
"name": "CVE-2018-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4373"
},
{
"name": "CVE-2018-4295",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4295"
},
{
"name": "CVE-2018-4416",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4416"
},
{
"name": "CVE-2018-4366",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4366"
},
{
"name": "CVE-2018-4401",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4401"
},
{
"name": "CVE-2018-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4410"
},
{
"name": "CVE-2018-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4242"
},
{
"name": "CVE-2018-4384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4384"
},
{
"name": "CVE-2018-4422",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4422"
},
{
"name": "CVE-2018-4413",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4413"
},
{
"name": "CVE-2018-4407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4407"
},
{
"name": "CVE-2018-4346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4346"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4387"
},
{
"name": "CVE-2018-4326",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4326"
},
{
"name": "CVE-2018-4390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4390"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209192 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209192"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209193 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209193"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209195 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209195"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209196 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209197 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209197"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209194 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209194"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209198 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209198"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-524
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | Safari | Safari versions antérieures à 12.0.1 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.6 | ||
| Apple | N/A | iOS versions antérieures à 12.1 | ||
| Apple | N/A | watchOS versions antérieures à 5.1 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.6 | ||
| Apple | N/A | tvOS versions antérieures à 12.1 | ||
| Apple | N/A | iCloud for Windows versions antérieures à 7.8 | ||
| Apple | macOS | macOS Mojave versions antérieures à 10.14 | ||
| Apple | N/A | iTunes versions antérieures à 12.9.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Safari versions ant\u00e9rieures \u00e0 12.0.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud for Windows versions ant\u00e9rieures \u00e0 7.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Mojave versions ant\u00e9rieures \u00e0 10.14",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-4310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4310"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4391"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-4368",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4368"
},
{
"name": "CVE-2018-4395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4395"
},
{
"name": "CVE-2018-4425",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4425"
},
{
"name": "CVE-2018-4259",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4259"
},
{
"name": "CVE-2018-4400",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4400"
},
{
"name": "CVE-2018-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4415"
},
{
"name": "CVE-2018-4427",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4427"
},
{
"name": "CVE-2018-4369",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4369"
},
{
"name": "CVE-2018-4396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4396"
},
{
"name": "CVE-2018-4291",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4291"
},
{
"name": "CVE-2017-12618",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12618"
},
{
"name": "CVE-2018-4374",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4374"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2018-4350",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4350"
},
{
"name": "CVE-2018-4386",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4386"
},
{
"name": "CVE-2018-4417",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4417"
},
{
"name": "CVE-2018-4331",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4331"
},
{
"name": "CVE-2018-4398",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4398"
},
{
"name": "CVE-2018-4412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4412"
},
{
"name": "CVE-2018-4420",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4420"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4392"
},
{
"name": "CVE-2018-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4409"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2018-4419",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4419"
},
{
"name": "CVE-2018-4371",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4371"
},
{
"name": "CVE-2018-4348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4348"
},
{
"name": "CVE-2018-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4382"
},
{
"name": "CVE-2018-4424",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4424"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2018-4288",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4288"
},
{
"name": "CVE-2018-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4203"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2018-4402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4402"
},
{
"name": "CVE-2018-4377",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4377"
},
{
"name": "CVE-2018-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4378"
},
{
"name": "CVE-2018-4341",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4341"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-4426",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4426"
},
{
"name": "CVE-2018-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4367"
},
{
"name": "CVE-2018-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4399"
},
{
"name": "CVE-2018-4342",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4342"
},
{
"name": "CVE-2018-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4389"
},
{
"name": "CVE-2018-4403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4403"
},
{
"name": "CVE-2018-4411",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4411"
},
{
"name": "CVE-2018-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4408"
},
{
"name": "CVE-2018-4375",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4375"
},
{
"name": "CVE-2018-4418",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4418"
},
{
"name": "CVE-2018-4340",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4340"
},
{
"name": "CVE-2018-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4394"
},
{
"name": "CVE-2018-4365",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4365"
},
{
"name": "CVE-2018-6797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6797"
},
{
"name": "CVE-2018-4308",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4308"
},
{
"name": "CVE-2018-4126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4126"
},
{
"name": "CVE-2018-4376",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4376"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2018-4286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4286"
},
{
"name": "CVE-2018-4334",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4334"
},
{
"name": "CVE-2018-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4304"
},
{
"name": "CVE-2018-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4393"
},
{
"name": "CVE-2018-4354",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4354"
},
{
"name": "CVE-2018-4406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4406"
},
{
"name": "CVE-2018-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4372"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4287"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2018-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4423"
},
{
"name": "CVE-2018-4385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4385"
},
{
"name": "CVE-2018-4153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4153"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2018-4388",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4388"
},
{
"name": "CVE-2018-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4373"
},
{
"name": "CVE-2018-4295",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4295"
},
{
"name": "CVE-2018-4416",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4416"
},
{
"name": "CVE-2018-4366",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4366"
},
{
"name": "CVE-2018-4401",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4401"
},
{
"name": "CVE-2018-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4410"
},
{
"name": "CVE-2018-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4242"
},
{
"name": "CVE-2018-4384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4384"
},
{
"name": "CVE-2018-4422",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4422"
},
{
"name": "CVE-2018-4413",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4413"
},
{
"name": "CVE-2018-4407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4407"
},
{
"name": "CVE-2018-4346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4346"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4387"
},
{
"name": "CVE-2018-4326",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4326"
},
{
"name": "CVE-2018-4390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4390"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209192 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209192"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209193 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209193"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209195 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209195"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209196 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209197 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209197"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209194 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209194"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209198 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209198"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
BDU:2019-04036
Vulnerability from fstec - Published: 28.04.2018{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Novell Inc., Ruby Team",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "14.04 LTS (Ubuntu), 7 (Red Hat Enterprise Linux), 16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 17.10 (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 15.1 (OpenSUSE Leap), 7.4 EUS (Red Hat Enterprise Linux), 7.5 EUS (Red Hat Enterprise Linux), 7.6 EUS (Red Hat Enterprise Linux), 8 (Debian GNU/Linux), 7 (Debian GNU/Linux), \u0434\u043e 2.2.10 (Ruby), \u043e\u0442 2.3.0 \u0434\u043e 2.3.7 (Ruby), \u043e\u0442 2.4.0 \u0434\u043e 2.4.4 (Ruby), \u043e\u0442 2.5.0 \u0434\u043e 2.5.1 (Ruby)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Astra Linux:\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=44892734\n\n\u0414\u043b\u044f Ubuntu:\nhttps://usn.ubuntu.com/3626-1/\n\n\u0414\u043b\u044f Ruby:\nhttps://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.: \nhttps://bugzilla.redhat.com/show_bug.cgi?id=1561949\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://lists.debian.org/debian-lts-announce/2018/04/msg00023.html\nhttps://lists.debian.org/debian-lts-announce/2018/04/msg00024.html\nhttps://lists.debian.org/debian-lts-announce/2018/07/msg00012.html\nhttps://www.debian.org/security/2018/dsa-4259\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "28.04.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.11.2019",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.11.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-04036",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-8780",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Red Hat Enterprise Linux, Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), OpenSUSE Leap, Ruby",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 14.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 7 , Canonical Ltd. Ubuntu 16.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 17.10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Novell Inc. OpenSUSE Leap 15.1 , Red Hat Inc. Red Hat Enterprise Linux 7.4 EUS , Red Hat Inc. Red Hat Enterprise Linux 7.5 EUS , Red Hat Inc. Red Hat Enterprise Linux 7.6 EUS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 7 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u043e\u0432 Dir.open, Dir.new, Dir.entries \u0438 Dir.empty \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0430\u0442\u043e\u0440\u0430 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Ruby, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u043b\u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (\u00ab\u041e\u0431\u0445\u043e\u0434 \u043f\u0443\u0442\u0438\u00bb) (CWE-22)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u043e\u0432 Dir.open, Dir.new, Dir.entries \u0438 Dir.empty \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0430\u0442\u043e\u0440\u0430 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Ruby \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0432\u0435\u0440\u043d\u043e\u0433\u043e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u043b\u0438 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://wiki.astralinux.ru/pages/viewpage.action?pageId=44892734\nhttps://usn.ubuntu.com/3626-1/\nhttps://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1561949\nhttps://lists.debian.org/debian-lts-announce/2018/04/msg00023.html\nhttps://lists.debian.org/debian-lts-announce/2018/04/msg00024.html\nhttps://lists.debian.org/debian-lts-announce/2018/07/msg00012.html\nhttps://www.debian.org/security/2018/dsa-4259\nhttps://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-8780\nhttps://www.cvedetails.com/cve/CVE-2018-8780/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-22",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
CNVD-2018-08487
Vulnerability from cnvd - Published: 2018-04-26厂商已发布漏洞修复程序,请及时关注更新: https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
| Name | ['Ruby Ruby <2.2.10', 'Ruby Ruby 2.3.x (<2.3.7)', 'Ruby Ruby 2.4.x (<2.4.4)', 'Ruby Ruby 2.5.x (<2.5.1)', 'Ruby Ruby 2.6.0-preview1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-8780"
}
},
"description": "Ruby\u662f\u4e00\u79cd\u7b80\u5355\u5feb\u6377\u7684\u9762\u5411\u5bf9\u8c61\uff08\u9762\u5411\u5bf9\u8c61\u7a0b\u5e8f\u8bbe\u8ba1\uff09\u811a\u672c\u8bed\u8a00\u3002\r\n\r\nRuby\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u4ea7\u751f\u7684\u539f\u56e0\u662fDir.open\u3001Dir.new\u3001Dir.entries\u53caDir.empty?\u65b9\u6cd5\u672a\u68c0\u67e5\u7a7a\u5b57\u7b26\u3002\u5f53\u4f7f\u7528\u76f8\u5e94\u65b9\u6cd5\u65f6\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u76ee\u5f55\u904d\u5386\u3002",
"discovererName": "ooooooo_q",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-08487",
"openTime": "2018-04-26",
"patchDescription": "Ruby\u662f\u4e00\u79cd\u7b80\u5355\u5feb\u6377\u7684\u9762\u5411\u5bf9\u8c61\uff08\u9762\u5411\u5bf9\u8c61\u7a0b\u5e8f\u8bbe\u8ba1\uff09\u811a\u672c\u8bed\u8a00\u3002\r\n\r\nRuby\u5b58\u5728\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u4ea7\u751f\u7684\u539f\u56e0\u662fDir.open\u3001Dir.new\u3001Dir.entries\u53caDir.empty?\u65b9\u6cd5\u672a\u68c0\u67e5\u7a7a\u5b57\u7b26\u3002\u5f53\u4f7f\u7528\u76f8\u5e94\u65b9\u6cd5\u65f6\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8fdb\u884c\u76ee\u5f55\u904d\u5386\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Ruby\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Ruby Ruby \u003c2.2.10",
"Ruby Ruby 2.3.x (\u003c2.3.7)",
"Ruby Ruby 2.4.x (\u003c2.4.4)",
"Ruby Ruby 2.5.x (\u003c2.5.1)",
"Ruby Ruby 2.6.0-preview1"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"serverity": "\u4e2d",
"submitTime": "2018-04-04",
"title": "Ruby\u76ee\u5f55\u904d\u5386\u6f0f\u6d1e"
}
FKIE_CVE-2018-8780
Vulnerability from fkie_nvd - Published: 2018-04-03 22:29 - Updated: 2024-11-21 04:14| Vendor | Product | Version | |
|---|---|---|---|
| ruby-lang | ruby | * | |
| ruby-lang | ruby | * | |
| ruby-lang | ruby | * | |
| ruby-lang | ruby | * | |
| ruby-lang | ruby | 2.6.0 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 17.10 | |
| debian | debian_linux | 7.0 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA970A9-AD36-44E1-B2CA-653A29A917FB",
"versionEndExcluding": "2.2.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17DC7068-E1B8-4699-BDE0-14305D35D24B",
"versionEndExcluding": "2.3.7",
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7172D61A-F82C-4EB5-9763-611CFE08A09B",
"versionEndExcluding": "2.4.4",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A56E97B-C7E3-48AC-AAEF-4FA056276D03",
"versionEndExcluding": "2.5.1",
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.6.0:preview1:*:*:*:*:*:*",
"matchCriteriaId": "787FDFC6-E780-4F95-9E46-C5CF77E7EBC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed."
},
{
"lang": "es",
"value": "En Ruby, en versiones anteriores a la 2.2.10, versiones 2.3.x anteriores a la 2.3.7, versiones 2.4.x anteriores a la 2.4.4, versiones 2.5.x anteriores a la 2.5.1 y la versi\u00f3n 2.6.0-preview1, los m\u00e9todos Dir.open, Dir.new, Dir.entries y Dir.empty? no comprueban los caracteres NULL. Al emplear el m\u00e9todo correspondiente, podr\u00eda realizarse un salto de directorio no intencionado."
}
],
"id": "CVE-2018-8780",
"lastModified": "2024-11-21T04:14:17.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-04-03T22:29:00.947",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103739"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3626-1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3626-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-FPHX-J9V2-W2CX
Vulnerability from github – Published: 2022-05-14 00:55 – Updated: 2022-05-14 00:55In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
{
"affected": [],
"aliases": [
"CVE-2018-8780"
],
"database_specific": {
"cwe_ids": [
"CWE-22"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-04-03T22:29:00Z",
"severity": "CRITICAL"
},
"details": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.",
"id": "GHSA-fphx-j9v2-w2cx",
"modified": "2022-05-14T00:55:59Z",
"published": "2022-05-14T00:55:59Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"type": "WEB",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released"
},
{
"type": "WEB",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released"
},
{
"type": "WEB",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released"
},
{
"type": "WEB",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released"
},
{
"type": "WEB",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/3626-1"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/103739"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1042004"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2018-8780
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-8780",
"description": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.",
"id": "GSD-2018-8780",
"references": [
"https://www.suse.com/security/cve/CVE-2018-8780.html",
"https://www.debian.org/security/2018/dsa-4259",
"https://access.redhat.com/errata/RHSA-2020:0663",
"https://access.redhat.com/errata/RHSA-2020:0591",
"https://access.redhat.com/errata/RHSA-2020:0542",
"https://access.redhat.com/errata/RHSA-2019:2028",
"https://access.redhat.com/errata/RHSA-2018:3731",
"https://access.redhat.com/errata/RHSA-2018:3730",
"https://access.redhat.com/errata/RHSA-2018:3729",
"https://ubuntu.com/security/CVE-2018-8780",
"https://advisories.mageia.org/CVE-2018-8780.html",
"https://alas.aws.amazon.com/cve/html/CVE-2018-8780.html",
"https://linux.oracle.com/cve/CVE-2018-8780.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-8780"
],
"details": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.",
"id": "GSD-2018-8780",
"modified": "2023-12-13T01:22:34.870417Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-8780",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
},
{
"name": "RHSA-2018:3729",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"name": "USN-3626-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3626-1/"
},
{
"name": "1042004",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:3730",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"name": "RHSA-2018:3731",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"name": "103739",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103739"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
},
{
"name": "DSA-4259",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/",
"refsource": "CONFIRM",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"name": "openSUSE-SU-2019:1771",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"name": "RHSA-2019:2028",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"name": "RHSA-2020:0542",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"name": "RHSA-2020:0591",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"name": "RHSA-2020:0663",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.5.1",
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.2.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.3.7",
"versionStartIncluding": "2.3.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.4.4",
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:2.6.0:preview1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-8780"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/"
},
{
"name": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
},
{
"name": "103739",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103739"
},
{
"name": "USN-3626-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3626-1/"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html"
},
{
"name": "[debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html"
},
{
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"name": "DSA-4259",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4259"
},
{
"name": "1042004",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:3731",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3731"
},
{
"name": "RHSA-2018:3730",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3730"
},
{
"name": "RHSA-2018:3729",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3729"
},
{
"name": "openSUSE-SU-2019:1771",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html"
},
{
"name": "RHSA-2019:2028",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2019:2028"
},
{
"name": "RHSA-2020:0542",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2020:0542"
},
{
"name": "RHSA-2020:0591",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2020:0591"
},
{
"name": "RHSA-2020:0663",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2020:0663"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
},
"lastModifiedDate": "2019-07-21T12:15Z",
"publishedDate": "2018-04-03T22:29Z"
}
}
}
OPENSUSE-SU-2019:1771-1
Vulnerability from csaf_opensuse - Published: 2019-07-21 05:37 - Updated: 2019-07-21 05:37| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ruby-bundled-gems-rpmhelper, ruby2.5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ruby2.5 and ruby-bundled-gems-rpmhelper fixes the following issues:\n\nChanges in ruby2.5:\n\nUpdate to 2.5.5 and 2.5.4:\n\nhttps://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/\nhttps://www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/\n\nSecurity issues fixed:\n\n- CVE-2019-8320: Delete directory using symlink when\n decompressing tar (bsc#1130627)\n- CVE-2019-8321: Escape sequence injection vulnerability in\n verbose (bsc#1130623)\n- CVE-2019-8322: Escape sequence injection vulnerability in gem\n owner (bsc#1130622)\n- CVE-2019-8323: Escape sequence injection vulnerability in API\n response handling (bsc#1130620)\n- CVE-2019-8324: Installing a malicious gem may lead to arbitrary\n code execution (bsc#1130617)\n- CVE-2019-8325: Escape sequence injection vulnerability in\n errors (bsc#1130611)\n\n\nRuby 2.5 was updated to 2.5.3:\n\nThis release includes some bug fixes and some security fixes.\n\nSecurity issues fixed:\n\n- CVE-2018-16396: Tainted flags are not propagated in Array#pack\n and String#unpack with some directives (bsc#1112532)\n- CVE-2018-16395: OpenSSL::X509::Name equality check does not\n work correctly (bsc#1112530)\n\nRuby 2.5 was updated to 2.5.1:\n\nThis release includes some bug fixes and some security fixes.\n\nSecurity issues fixed:\n\n- CVE-2017-17742: HTTP response splitting in WEBrick (bsc#1087434)\n- CVE-2018-6914: Unintentional file and directory creation with\n directory traversal in tempfile and tmpdir (bsc#1087441)\n- CVE-2018-8777: DoS by large request in WEBrick (bsc#1087436)\n- CVE-2018-8778: Buffer under-read in String#unpack (bsc#1087433)\n- CVE-2018-8779: Unintentional socket creation by poisoned NUL\n byte in UNIXServer and UNIXSocket (bsc#1087440)\n- CVE-2018-8780: Unintentional directory traversal by poisoned\n NUL byte in Dir (bsc#1087437)\n\n- Multiple vulnerabilities in RubyGems were fixed:\n\n - CVE-2018-1000079: Fixed path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058)\n - CVE-2018-1000075: Fixed infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014)\n - CVE-2018-1000078: Fixed XSS vulnerability in homepage attribute when displayed via gem server (bsc#1082011)\n - CVE-2018-1000077: Fixed that missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (bsc#1082010)\n - CVE-2018-1000076: Fixed improper verification of signatures in tarball allows to install mis-signed gem (bsc#1082009)\n - CVE-2018-1000074: Fixed unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (bsc#1082008)\n - CVE-2018-1000073: Fixed path traversal when writing to a symlinked basedir outside of the root (bsc#1082007)\n\nOther changes:\n\n- Fixed Net::POPMail methods modify frozen literal when using default arg\n- ruby: change over of the Japanese Era to the new emperor May 1st 2019 (bsc#1133790)\n- build with PIE support (bsc#1130028)\n\n\nChanges in ruby-bundled-gems-rpmhelper:\n\n- Add a new helper for bundled ruby gems.\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1771",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1771-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1771-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1771-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z"
},
{
"category": "self",
"summary": "SUSE Bug 1082007",
"url": "https://bugzilla.suse.com/1082007"
},
{
"category": "self",
"summary": "SUSE Bug 1082008",
"url": "https://bugzilla.suse.com/1082008"
},
{
"category": "self",
"summary": "SUSE Bug 1082009",
"url": "https://bugzilla.suse.com/1082009"
},
{
"category": "self",
"summary": "SUSE Bug 1082010",
"url": "https://bugzilla.suse.com/1082010"
},
{
"category": "self",
"summary": "SUSE Bug 1082011",
"url": "https://bugzilla.suse.com/1082011"
},
{
"category": "self",
"summary": "SUSE Bug 1082014",
"url": "https://bugzilla.suse.com/1082014"
},
{
"category": "self",
"summary": "SUSE Bug 1082058",
"url": "https://bugzilla.suse.com/1082058"
},
{
"category": "self",
"summary": "SUSE Bug 1087433",
"url": "https://bugzilla.suse.com/1087433"
},
{
"category": "self",
"summary": "SUSE Bug 1087434",
"url": "https://bugzilla.suse.com/1087434"
},
{
"category": "self",
"summary": "SUSE Bug 1087436",
"url": "https://bugzilla.suse.com/1087436"
},
{
"category": "self",
"summary": "SUSE Bug 1087437",
"url": "https://bugzilla.suse.com/1087437"
},
{
"category": "self",
"summary": "SUSE Bug 1087440",
"url": "https://bugzilla.suse.com/1087440"
},
{
"category": "self",
"summary": "SUSE Bug 1087441",
"url": "https://bugzilla.suse.com/1087441"
},
{
"category": "self",
"summary": "SUSE Bug 1112530",
"url": "https://bugzilla.suse.com/1112530"
},
{
"category": "self",
"summary": "SUSE Bug 1112532",
"url": "https://bugzilla.suse.com/1112532"
},
{
"category": "self",
"summary": "SUSE Bug 1130028",
"url": "https://bugzilla.suse.com/1130028"
},
{
"category": "self",
"summary": "SUSE Bug 1130611",
"url": "https://bugzilla.suse.com/1130611"
},
{
"category": "self",
"summary": "SUSE Bug 1130617",
"url": "https://bugzilla.suse.com/1130617"
},
{
"category": "self",
"summary": "SUSE Bug 1130620",
"url": "https://bugzilla.suse.com/1130620"
},
{
"category": "self",
"summary": "SUSE Bug 1130622",
"url": "https://bugzilla.suse.com/1130622"
},
{
"category": "self",
"summary": "SUSE Bug 1130623",
"url": "https://bugzilla.suse.com/1130623"
},
{
"category": "self",
"summary": "SUSE Bug 1130627",
"url": "https://bugzilla.suse.com/1130627"
},
{
"category": "self",
"summary": "SUSE Bug 1133790",
"url": "https://bugzilla.suse.com/1133790"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17742 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000073 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000074 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000075 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000076 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000077 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000078 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000079 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16395 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16396 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6914 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8777 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8778 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8779 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8780 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8780/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8320 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8321 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8322 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8323 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8324 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8324/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8325 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8325/"
}
],
"title": "Security update for ruby-bundled-gems-rpmhelper, ruby2.5",
"tracking": {
"current_release_date": "2019-07-21T05:37:45Z",
"generator": {
"date": "2019-07-21T05:37:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1771-1",
"initial_release_date": "2019-07-21T05:37:45Z",
"revision_history": [
{
"date": "2019-07-21T05:37:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"product": {
"name": "ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"product_id": "ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"product": {
"name": "ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"product_id": "ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"product": {
"name": "libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"product_id": "libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"product": {
"name": "ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"product_id": "ruby2.5-2.5.5-lp151.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"product": {
"name": "ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"product_id": "ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"product": {
"name": "ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"product_id": "ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"product": {
"name": "ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"product_id": "ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"product": {
"name": "ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"product_id": "ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch"
},
"product_reference": "ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch"
},
"product_reference": "ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch"
},
"product_reference": "ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch"
},
"product_reference": "ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-17742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17742"
}
],
"notes": [
{
"category": "general",
"text": "Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17742",
"url": "https://www.suse.com/security/cve/CVE-2017-17742"
},
{
"category": "external",
"summary": "SUSE Bug 1087434 for CVE-2017-17742",
"url": "https://bugzilla.suse.com/1087434"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2017-17742",
"url": "https://bugzilla.suse.com/1136906"
},
{
"category": "external",
"summary": "SUSE Bug 1152992 for CVE-2017-17742",
"url": "https://bugzilla.suse.com/1152992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2017-17742"
},
{
"cve": "CVE-2018-1000073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000073"
}
],
"notes": [
{
"category": "general",
"text": "RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000073",
"url": "https://www.suse.com/security/cve/CVE-2018-1000073"
},
{
"category": "external",
"summary": "SUSE Bug 1082007 for CVE-2018-1000073",
"url": "https://bugzilla.suse.com/1082007"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000073"
},
{
"cve": "CVE-2018-1000074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000074"
}
],
"notes": [
{
"category": "general",
"text": "RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000074",
"url": "https://www.suse.com/security/cve/CVE-2018-1000074"
},
{
"category": "external",
"summary": "SUSE Bug 1082008 for CVE-2018-1000074",
"url": "https://bugzilla.suse.com/1082008"
},
{
"category": "external",
"summary": "SUSE Bug 1175764 for CVE-2018-1000074",
"url": "https://bugzilla.suse.com/1175764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2018-1000074"
},
{
"cve": "CVE-2018-1000075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000075"
}
],
"notes": [
{
"category": "general",
"text": "RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. This vulnerability appears to have been fixed in 2.7.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000075",
"url": "https://www.suse.com/security/cve/CVE-2018-1000075"
},
{
"category": "external",
"summary": "SUSE Bug 1082014 for CVE-2018-1000075",
"url": "https://bugzilla.suse.com/1082014"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "low"
}
],
"title": "CVE-2018-1000075"
},
{
"cve": "CVE-2018-1000076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000076"
}
],
"notes": [
{
"category": "general",
"text": "RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. This vulnerability appears to have been fixed in 2.7.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000076",
"url": "https://www.suse.com/security/cve/CVE-2018-1000076"
},
{
"category": "external",
"summary": "SUSE Bug 1082009 for CVE-2018-1000076",
"url": "https://bugzilla.suse.com/1082009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000076"
},
{
"cve": "CVE-2018-1000077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000077"
}
],
"notes": [
{
"category": "general",
"text": "RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. This vulnerability appears to have been fixed in 2.7.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000077",
"url": "https://www.suse.com/security/cve/CVE-2018-1000077"
},
{
"category": "external",
"summary": "SUSE Bug 1082010 for CVE-2018-1000077",
"url": "https://bugzilla.suse.com/1082010"
},
{
"category": "external",
"summary": "SUSE Bug 1183937 for CVE-2018-1000077",
"url": "https://bugzilla.suse.com/1183937"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000077"
},
{
"cve": "CVE-2018-1000078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000078"
}
],
"notes": [
{
"category": "general",
"text": "RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000078",
"url": "https://www.suse.com/security/cve/CVE-2018-1000078"
},
{
"category": "external",
"summary": "SUSE Bug 1082011 for CVE-2018-1000078",
"url": "https://bugzilla.suse.com/1082011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000078"
},
{
"cve": "CVE-2018-1000079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000079"
}
],
"notes": [
{
"category": "general",
"text": "RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000079",
"url": "https://www.suse.com/security/cve/CVE-2018-1000079"
},
{
"category": "external",
"summary": "SUSE Bug 1082058 for CVE-2018-1000079",
"url": "https://bugzilla.suse.com/1082058"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000079"
},
{
"cve": "CVE-2018-16395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16395"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16395",
"url": "https://www.suse.com/security/cve/CVE-2018-16395"
},
{
"category": "external",
"summary": "SUSE Bug 1112530 for CVE-2018-16395",
"url": "https://bugzilla.suse.com/1112530"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2018-16395",
"url": "https://bugzilla.suse.com/1136906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2018-16395"
},
{
"cve": "CVE-2018-16396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16396"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16396",
"url": "https://www.suse.com/security/cve/CVE-2018-16396"
},
{
"category": "external",
"summary": "SUSE Bug 1112532 for CVE-2018-16396",
"url": "https://bugzilla.suse.com/1112532"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2018-16396",
"url": "https://bugzilla.suse.com/1136906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-16396"
},
{
"cve": "CVE-2018-6914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6914"
}
],
"notes": [
{
"category": "general",
"text": "Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6914",
"url": "https://www.suse.com/security/cve/CVE-2018-6914"
},
{
"category": "external",
"summary": "SUSE Bug 1087441 for CVE-2018-6914",
"url": "https://bugzilla.suse.com/1087441"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2018-6914",
"url": "https://bugzilla.suse.com/1136906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "low"
}
],
"title": "CVE-2018-6914"
},
{
"cve": "CVE-2018-8777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8777"
}
],
"notes": [
{
"category": "general",
"text": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8777",
"url": "https://www.suse.com/security/cve/CVE-2018-8777"
},
{
"category": "external",
"summary": "SUSE Bug 1087436 for CVE-2018-8777",
"url": "https://bugzilla.suse.com/1087436"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2018-8777",
"url": "https://bugzilla.suse.com/1136906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2018-8777"
},
{
"cve": "CVE-2018-8778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8778"
}
],
"notes": [
{
"category": "general",
"text": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8778",
"url": "https://www.suse.com/security/cve/CVE-2018-8778"
},
{
"category": "external",
"summary": "SUSE Bug 1087433 for CVE-2018-8778",
"url": "https://bugzilla.suse.com/1087433"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2018-8778",
"url": "https://bugzilla.suse.com/1136906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-8778"
},
{
"cve": "CVE-2018-8779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8779"
}
],
"notes": [
{
"category": "general",
"text": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8779",
"url": "https://www.suse.com/security/cve/CVE-2018-8779"
},
{
"category": "external",
"summary": "SUSE Bug 1087440 for CVE-2018-8779",
"url": "https://bugzilla.suse.com/1087440"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2018-8779",
"url": "https://bugzilla.suse.com/1136906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "low"
}
],
"title": "CVE-2018-8779"
},
{
"cve": "CVE-2018-8780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8780"
}
],
"notes": [
{
"category": "general",
"text": "In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8780",
"url": "https://www.suse.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "SUSE Bug 1087437 for CVE-2018-8780",
"url": "https://bugzilla.suse.com/1087437"
},
{
"category": "external",
"summary": "SUSE Bug 1136906 for CVE-2018-8780",
"url": "https://bugzilla.suse.com/1136906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "low"
}
],
"title": "CVE-2018-8780"
},
{
"cve": "CVE-2019-8320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8320"
}
],
"notes": [
{
"category": "general",
"text": "A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user\u0027s machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8320",
"url": "https://www.suse.com/security/cve/CVE-2019-8320"
},
{
"category": "external",
"summary": "SUSE Bug 1130627 for CVE-2019-8320",
"url": "https://bugzilla.suse.com/1130627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2019-8320"
},
{
"cve": "CVE-2019-8321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8321"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8321",
"url": "https://www.suse.com/security/cve/CVE-2019-8321"
},
{
"category": "external",
"summary": "SUSE Bug 1130623 for CVE-2019-8321",
"url": "https://bugzilla.suse.com/1130623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2019-8321"
},
{
"cve": "CVE-2019-8322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8322",
"url": "https://www.suse.com/security/cve/CVE-2019-8322"
},
{
"category": "external",
"summary": "SUSE Bug 1130622 for CVE-2019-8322",
"url": "https://bugzilla.suse.com/1130622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2019-8322"
},
{
"cve": "CVE-2019-8323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8323"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8323",
"url": "https://www.suse.com/security/cve/CVE-2019-8323"
},
{
"category": "external",
"summary": "SUSE Bug 1130620 for CVE-2019-8323",
"url": "https://bugzilla.suse.com/1130620"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2019-8323"
},
{
"cve": "CVE-2019-8324",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8324"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8324",
"url": "https://www.suse.com/security/cve/CVE-2019-8324"
},
{
"category": "external",
"summary": "SUSE Bug 1130617 for CVE-2019-8324",
"url": "https://bugzilla.suse.com/1130617"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2019-8324"
},
{
"cve": "CVE-2019-8325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8325"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8325",
"url": "https://www.suse.com/security/cve/CVE-2019-8325"
},
{
"category": "external",
"summary": "SUSE Bug 1130611 for CVE-2019-8325",
"url": "https://bugzilla.suse.com/1130611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.0:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.0:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.0:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:libruby2_5-2_5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby-bundled-gems-rpmhelper-0.0.2-lp151.2.1.noarch",
"openSUSE Leap 15.1:ruby2.5-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-devel-extra-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-2.5.5-lp151.4.3.1.x86_64",
"openSUSE Leap 15.1:ruby2.5-doc-ri-2.5.5-lp151.4.3.1.noarch",
"openSUSE Leap 15.1:ruby2.5-stdlib-2.5.5-lp151.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-21T05:37:45Z",
"details": "important"
}
],
"title": "CVE-2019-8325"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.