Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit ca2bd36

Browse files
committed
"-Synchronized-Data."
1 parent 50b3d52 commit ca2bd36

19 files changed

+1960
-1762
lines changed

2017/20xxx/CVE-2017-20003.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2017-20003",
7-
"ASSIGNER": "[email protected]",
7+
"ASSIGNER": "[email protected]",
88
"STATE": "REJECT"
99
},
1010
"description": {

2018/25xxx/CVE-2018-25007.json

Lines changed: 132 additions & 130 deletions
Original file line numberDiff line numberDiff line change
@@ -1,137 +1,139 @@
11
{
2-
"data_type": "CVE",
3-
"data_format": "MITRE",
4-
"data_version": "4.0",
5-
"generator": {
6-
"engine": "Vulnogram 0.0.9"
7-
},
8-
"CVE_data_meta": {
9-
"ID": "CVE-2018-25007",
10-
"ASSIGNER": "[email protected]",
11-
"DATE_PUBLIC": "2018-11-29T09:17:00.000Z",
12-
"TITLE": "Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11",
13-
"AKA": "",
14-
"STATE": "PUBLIC"
15-
},
16-
"source": {
17-
"defect": [],
18-
"advisory": "",
19-
"discovery": "INTERNAL"
20-
},
21-
"affects": {
22-
"vendor": {
23-
"vendor_data": [
24-
{
25-
"vendor_name": "Vaadin",
26-
"product": {
27-
"product_data": [
28-
{
29-
"product_name": "Vaadin",
30-
"version": {
31-
"version_data": [
32-
{
33-
"version_name": "",
34-
"version_affected": ">=",
35-
"version_value": "10.0.0",
36-
"platform": ""
37-
},
38-
{
39-
"version_name": "",
40-
"version_affected": "<=",
41-
"version_value": "10.0.7",
42-
"platform": ""
43-
},
44-
{
45-
"version_name": "",
46-
"version_affected": ">=",
47-
"version_value": "11.0.0",
48-
"platform": ""
49-
},
50-
{
51-
"version_name": "",
52-
"version_affected": "<=",
53-
"version_value": "11.0.2",
54-
"platform": ""
2+
"data_type": "CVE",
3+
"data_format": "MITRE",
4+
"data_version": "4.0",
5+
"generator": {
6+
"engine": "Vulnogram 0.0.9"
7+
},
8+
"CVE_data_meta": {
9+
"ID": "CVE-2018-25007",
10+
"ASSIGNER": "[email protected]",
11+
"DATE_PUBLIC": "2018-11-29T09:17:00.000Z",
12+
"TITLE": "Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11",
13+
"AKA": "",
14+
"STATE": "PUBLIC"
15+
},
16+
"source": {
17+
"defect": [],
18+
"advisory": "",
19+
"discovery": "INTERNAL"
20+
},
21+
"affects": {
22+
"vendor": {
23+
"vendor_data": [
24+
{
25+
"vendor_name": "Vaadin",
26+
"product": {
27+
"product_data": [
28+
{
29+
"product_name": "Vaadin",
30+
"version": {
31+
"version_data": [
32+
{
33+
"version_name": "",
34+
"version_affected": ">=",
35+
"version_value": "10.0.0",
36+
"platform": ""
37+
},
38+
{
39+
"version_name": "",
40+
"version_affected": "<=",
41+
"version_value": "10.0.7",
42+
"platform": ""
43+
},
44+
{
45+
"version_name": "",
46+
"version_affected": ">=",
47+
"version_value": "11.0.0",
48+
"platform": ""
49+
},
50+
{
51+
"version_name": "",
52+
"version_affected": "<=",
53+
"version_value": "11.0.2",
54+
"platform": ""
55+
}
56+
]
57+
}
58+
},
59+
{
60+
"product_name": "flow-server",
61+
"version": {
62+
"version_data": [
63+
{
64+
"version_name": "",
65+
"version_affected": ">=",
66+
"version_value": "1.0.0",
67+
"platform": ""
68+
},
69+
{
70+
"version_name": "",
71+
"version_affected": "<=",
72+
"version_value": "1.0.5",
73+
"platform": ""
74+
}
75+
]
76+
}
77+
}
78+
]
5579
}
56-
]
5780
}
58-
},
59-
{
60-
"product_name": "flow-server",
61-
"version": {
62-
"version_data": [
63-
{
64-
"version_name": "",
65-
"version_affected": ">=",
66-
"version_value": "1.0.0",
67-
"platform": ""
68-
},
69-
{
70-
"version_name": "",
71-
"version_affected": "<=",
72-
"version_value": "1.0.5",
73-
"platform": ""
74-
}
75-
]
76-
}
77-
}
7881
]
79-
}
8082
}
81-
]
82-
}
83-
},
84-
"problemtype": {
85-
"problemtype_data": [
86-
{
87-
"description": [
88-
{
89-
"lang": "eng",
90-
"value": "CWE-754 Improper Check for Unusual or Exceptional Conditions"
91-
}
83+
},
84+
"problemtype": {
85+
"problemtype_data": [
86+
{
87+
"description": [
88+
{
89+
"lang": "eng",
90+
"value": "CWE-754 Improper Check for Unusual or Exceptional Conditions"
91+
}
92+
]
93+
}
9294
]
93-
}
94-
]
95-
},
96-
"description": {
97-
"description_data": [
98-
{
99-
"lang": "eng",
100-
"value": "Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message."
101-
}
102-
]
103-
},
104-
"references": {
105-
"reference_data": [
106-
{
107-
"refsource": "CONFIRM",
108-
"url": "https://vaadin.com/security/cve-2018-25007"
109-
},
110-
{
111-
"refsource": "CONFIRM",
112-
"url": "https://github.com/vaadin/flow/pull/4774"
113-
}
114-
]
115-
},
116-
"configuration": [],
117-
"impact": {
118-
"cvss": {
119-
"version": "3.1",
120-
"attackVector": "NETWORK",
121-
"attackComplexity": "HIGH",
122-
"privilegesRequired": "LOW",
123-
"userInteraction": "REQUIRED",
124-
"scope": "UNCHANGED",
125-
"confidentialityImpact": "NONE",
126-
"integrityImpact": "LOW",
127-
"availabilityImpact": "NONE",
128-
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
129-
"baseScore": 2.6,
130-
"baseSeverity": "LOW"
131-
}
132-
},
133-
"exploit": [],
134-
"work_around": [],
135-
"solution": [],
136-
"credit": []
95+
},
96+
"description": {
97+
"description_data": [
98+
{
99+
"lang": "eng",
100+
"value": "Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message."
101+
}
102+
]
103+
},
104+
"references": {
105+
"reference_data": [
106+
{
107+
"refsource": "MISC",
108+
"url": "https://vaadin.com/security/cve-2018-25007",
109+
"name": "https://vaadin.com/security/cve-2018-25007"
110+
},
111+
{
112+
"refsource": "MISC",
113+
"url": "https://github.com/vaadin/flow/pull/4774",
114+
"name": "https://github.com/vaadin/flow/pull/4774"
115+
}
116+
]
117+
},
118+
"configuration": [],
119+
"impact": {
120+
"cvss": {
121+
"version": "3.1",
122+
"attackVector": "NETWORK",
123+
"attackComplexity": "HIGH",
124+
"privilegesRequired": "LOW",
125+
"userInteraction": "REQUIRED",
126+
"scope": "UNCHANGED",
127+
"confidentialityImpact": "NONE",
128+
"integrityImpact": "LOW",
129+
"availabilityImpact": "NONE",
130+
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
131+
"baseScore": 2.6,
132+
"baseSeverity": "LOW"
133+
}
134+
},
135+
"exploit": [],
136+
"work_around": [],
137+
"solution": [],
138+
"credit": []
137139
}

0 commit comments

Comments
 (0)