"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-12 17:00:49 +00:00
parent 3247b3c029
commit 06793bb8a8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
17 changed files with 272 additions and 63 deletions

View File

@ -56,6 +56,11 @@
"url": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930",
"refsource": "MISC",
"name": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930"
},
{
"refsource": "MISC",
"name": "https://gultsch.de/dino_multiple.html",
"url": "https://gultsch.de/dino_multiple.html"
}
]
}

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "http://jvn.jp/en/vu/JVNVU93628467/index.html"
"url": "http://jvn.jp/en/vu/JVNVU93628467/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/vu/JVNVU93628467/index.html"
}
]
},
@ -11,7 +13,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "Directory traversal vulnerability in WonderCMS 2.6.0 and earlier allows remote attackers to delete arbitrary files via unspecified vectors."
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5956",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/35912"
"url": "https://kb.cybozu.support/article/35912",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/35912"
},
{
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5975",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/35913"
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
},
{
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
"url": "https://kb.cybozu.support/article/35913",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/35913"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5976",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/35915"
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
},
{
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
"url": "https://kb.cybozu.support/article/35915",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/35915"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5977",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/35916"
"url": "http://jvn.jp/en/jp/JVN62618482/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN62618482/index.html"
},
{
"url": "http://jvn.jp/en/jp/JVN62618482/index.html"
"url": "https://kb.cybozu.support/article/35916",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/35916"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5978",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
"url": "http://jvn.jp/en/jp/JVN43172719/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN43172719/index.html"
},
{
"url": "http://jvn.jp/en/jp/JVN43172719/index.html"
"refsource": "CONFIRM",
"name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html",
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
}
]
},
@ -14,7 +18,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
@ -23,28 +27,94 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
"product": {
"product_data": [
{
"product_name": "Hikari Denwa router/Home GateWay",
"version": {
"version_data": [
{
"version_value": "remote attackers"
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
},
{
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
},
{
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
},
{
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
},
{
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
},
{
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
},
{
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
},
{
"version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier"
},
{
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
},
{
"version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier"
}
]
},
"product_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
}
}
]
},
"vendor_name": "Hikari Denwa router/Home GateWay"
}
},
{
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
"product": {
"product_data": [
{
"product_name": "Hikari Denwa router/Home GateWay",
"version": {
"version_data": [
{
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
},
{
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
},
{
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
},
{
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
},
{
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
},
{
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
},
{
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
},
{
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
}
]
}
}
]
}
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2019-5985",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
"url": "http://jvn.jp/en/jp/JVN43172719/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN43172719/index.html"
},
{
"url": "http://jvn.jp/en/jp/JVN43172719/index.html"
"refsource": "CONFIRM",
"name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html",
"url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html"
}
]
},
@ -14,7 +18,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors."
}
]
},
@ -23,28 +27,94 @@
"vendor": {
"vendor_data": [
{
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION",
"product": {
"product_data": [
{
"product_name": "Hikari Denwa router/Home GateWay",
"version": {
"version_data": [
{
"version_value": "remote attackers"
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
},
{
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
},
{
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
},
{
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
},
{
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
},
{
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
},
{
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
},
{
"version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier"
},
{
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier"
},
{
"version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier"
}
]
},
"product_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
}
}
]
},
"vendor_name": "Hikari Denwa router/Home GateWay"
}
},
{
"vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION",
"product": {
"product_data": [
{
"product_name": "Hikari Denwa router/Home GateWay",
"version": {
"version_data": [
{
"version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier"
},
{
"version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier"
},
{
"version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier"
},
{
"version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier"
},
{
"version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier"
},
{
"version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier"
},
{
"version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier"
},
{
"version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier"
}
]
}
}
]
}
}
]
}
},
"CVE_data_meta": {
"ID": "CVE-2019-5986",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/35975"
"url": "https://kb.cybozu.support/article/35975",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/35975"
},
{
"url": "http://jvn.jp/en/jp/JVN71877187/index.html"
"url": "http://jvn.jp/en/jp/JVN71877187/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN71877187/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5991",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "http://jvn.jp/en/jp/JVN48981892/index.html"
"url": "http://jvn.jp/en/jp/JVN48981892/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN48981892/index.html"
}
]
},
@ -11,7 +13,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "Cross-site request forgery (CSRF) vulnerability in WordPress Ultra Simple Paypal Shopping Cart v4.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5992",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "http://jvn.jp/en/jp/JVN92510087/index.html"
"url": "http://jvn.jp/en/jp/JVN92510087/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN92510087/index.html"
}
]
},
@ -11,7 +13,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "Cross-site request forgery (CSRF) vulnerability in Category Specific RSS feed Subscription version v2.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors."
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5993",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "http://jvn.jp/en/jp/JVN93833849/index.html"
"url": "http://jvn.jp/en/jp/JVN93833849/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN93833849/index.html"
}
]
},
@ -11,7 +13,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "SQL injection vulnerability in the Video Insight VMS 7.3.2.5 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors."
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-5996",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "https://www.ec-cube.net/products/detail.php?product_id=1602"
"url": "https://www.ec-cube.net/products/detail.php?product_id=1602",
"refsource": "MISC",
"name": "https://www.ec-cube.net/products/detail.php?product_id=1602"
},
{
"url": "http://jvn.jp/en/jp/JVN29343839/index.html"
"url": "http://jvn.jp/en/jp/JVN29343839/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN29343839/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-6003",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,10 +3,14 @@
"references": {
"reference_data": [
{
"url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en"
"url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en",
"refsource": "MISC",
"name": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en"
},
{
"url": "http://jvn.jp/en/jp/JVN07679150/index.html"
"url": "http://jvn.jp/en/jp/JVN07679150/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN07679150/index.html"
}
]
},
@ -44,7 +48,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-6004",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "http://jvn.jp/en/jp/JVN17127920/index.html"
"url": "http://jvn.jp/en/jp/JVN17127920/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN17127920/index.html"
}
]
},
@ -11,7 +13,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "Smart TV Box firmware version prior to 1300 allows remote attackers to bypass access restriction to conduct arbitrary operations on the device without user's intent, such as installing arbitrary software or changing the device settings via Android Debug Bridge port 5555/TCP."
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-6005",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,7 +3,9 @@
"references": {
"reference_data": [
{
"url": "http://jvn.jp/en/jp/JVN39383894/index.html"
"url": "http://jvn.jp/en/jp/JVN39383894/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN39383894/index.html"
}
]
},
@ -11,7 +13,7 @@
"description_data": [
{
"lang": "eng",
"value": "1"
"value": "Integer overflow vulnerability in apng-drawable 1.0.0 to 1.6.0 allows an attacker to cause a denial of service (DoS) condition or execute arbitrary code via unspecified vectors."
}
]
},
@ -41,7 +43,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-6007",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {

View File

@ -3,19 +3,29 @@
"references": {
"reference_data": [
{
"url": "https://www.ss-proj.org/"
"url": "https://www.ss-proj.org/",
"refsource": "MISC",
"name": "https://www.ss-proj.org/"
},
{
"url": "https://github.com/shirasagi/shirasagi"
"url": "https://github.com/shirasagi/shirasagi",
"refsource": "MISC",
"name": "https://github.com/shirasagi/shirasagi"
},
{
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3"
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3",
"refsource": "MISC",
"name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3"
},
{
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch"
"url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch",
"refsource": "MISC",
"name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch"
},
{
"url": "http://jvn.jp/en/jp/JVN74699196/index.html"
"url": "http://jvn.jp/en/jp/JVN74699196/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN74699196/index.html"
}
]
},
@ -53,7 +63,8 @@
},
"CVE_data_meta": {
"ID": "CVE-2019-6009",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"problemtype": {