mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
3247b3c029
commit
06793bb8a8
@ -56,6 +56,11 @@
|
||||
"url": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://gultsch.de/dino_multiple.html",
|
||||
"url": "https://gultsch.de/dino_multiple.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/vu/JVNVU93628467/index.html"
|
||||
"url": "http://jvn.jp/en/vu/JVNVU93628467/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/vu/JVNVU93628467/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -11,7 +13,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "Directory traversal vulnerability in WonderCMS 2.6.0 and earlier allows remote attackers to delete arbitrary files via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5956",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://kb.cybozu.support/article/35912"
|
||||
"url": "https://kb.cybozu.support/article/35912",
|
||||
"refsource": "MISC",
|
||||
"name": "https://kb.cybozu.support/article/35912"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5975",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://kb.cybozu.support/article/35913"
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
"url": "https://kb.cybozu.support/article/35913",
|
||||
"refsource": "MISC",
|
||||
"name": "https://kb.cybozu.support/article/35913"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5976",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://kb.cybozu.support/article/35915"
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
"url": "https://kb.cybozu.support/article/35915",
|
||||
"refsource": "MISC",
|
||||
"name": "https://kb.cybozu.support/article/35915"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5977",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://kb.cybozu.support/article/35916"
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
|
||||
"url": "https://kb.cybozu.support/article/35916",
|
||||
"refsource": "MISC",
|
||||
"name": "https://kb.cybozu.support/article/35916"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5978",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN43172719/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN43172719/index.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN43172719/index.html"
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html",
|
||||
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -14,7 +18,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -23,28 +27,94 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Hikari Denwa router/Home GateWay",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "remote attackers"
|
||||
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier"
|
||||
}
|
||||
]
|
||||
},
|
||||
"product_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Hikari Denwa router/Home GateWay"
|
||||
}
|
||||
},
|
||||
{
|
||||
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Hikari Denwa router/Home GateWay",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5985",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN43172719/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN43172719/index.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN43172719/index.html"
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html",
|
||||
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -14,7 +18,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -23,28 +27,94 @@
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Hikari Denwa router/Home GateWay",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "remote attackers"
|
||||
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier"
|
||||
}
|
||||
]
|
||||
},
|
||||
"product_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "Hikari Denwa router/Home GateWay"
|
||||
}
|
||||
},
|
||||
{
|
||||
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Hikari Denwa router/Home GateWay",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
|
||||
},
|
||||
{
|
||||
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5986",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://kb.cybozu.support/article/35975"
|
||||
"url": "https://kb.cybozu.support/article/35975",
|
||||
"refsource": "MISC",
|
||||
"name": "https://kb.cybozu.support/article/35975"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN71877187/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN71877187/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN71877187/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5991",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN48981892/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN48981892/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN48981892/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -11,7 +13,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "Cross-site request forgery (CSRF) vulnerability in WordPress Ultra Simple Paypal Shopping Cart v4.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5992",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN92510087/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN92510087/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN92510087/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -11,7 +13,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "Cross-site request forgery (CSRF) vulnerability in Category Specific RSS feed Subscription version v2.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5993",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN93833849/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN93833849/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN93833849/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -11,7 +13,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "SQL injection vulnerability in the Video Insight VMS 7.3.2.5 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5996",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ec-cube.net/products/detail.php?product_id=1602"
|
||||
"url": "https://www.ec-cube.net/products/detail.php?product_id=1602",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ec-cube.net/products/detail.php?product_id=1602"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN29343839/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN29343839/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN29343839/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6003",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,10 +3,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en"
|
||||
"url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en",
|
||||
"refsource": "MISC",
|
||||
"name": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN07679150/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN07679150/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN07679150/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -44,7 +48,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6004",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN17127920/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN17127920/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN17127920/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -11,7 +13,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "Smart TV Box firmware version prior to 1300 allows remote attackers to bypass access restriction to conduct arbitrary operations on the device without user's intent, such as installing arbitrary software or changing the device settings via Android Debug Bridge port 5555/TCP."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6005",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,7 +3,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN39383894/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN39383894/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN39383894/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -11,7 +13,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "1"
|
||||
"value": "Integer overflow vulnerability in apng-drawable 1.0.0 to 1.6.0 allows an attacker to cause a denial of service (DoS) condition or execute arbitrary code via unspecified vectors."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -41,7 +43,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6007",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
@ -3,19 +3,29 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ss-proj.org/"
|
||||
"url": "https://www.ss-proj.org/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ss-proj.org/"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shirasagi/shirasagi"
|
||||
"url": "https://github.com/shirasagi/shirasagi",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/shirasagi/shirasagi"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3"
|
||||
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch"
|
||||
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN74699196/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN74699196/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN74699196/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -53,7 +63,8 @@
|
||||
},
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6009",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"problemtype": {
|
||||
|
Loading…
x
Reference in New Issue
Block a user