diff --git a/2019/16xxx/CVE-2019-16235.json b/2019/16xxx/CVE-2019-16235.json index 9cb2fbd7958..2568725c33e 100644 --- a/2019/16xxx/CVE-2019-16235.json +++ b/2019/16xxx/CVE-2019-16235.json @@ -56,6 +56,11 @@ "url": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930", "refsource": "MISC", "name": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930" + }, + { + "refsource": "MISC", + "name": "https://gultsch.de/dino_multiple.html", + "url": "https://gultsch.de/dino_multiple.html" } ] } diff --git a/2019/5xxx/CVE-2019-5956.json b/2019/5xxx/CVE-2019-5956.json index 2531d117a34..87c25f9df38 100644 --- a/2019/5xxx/CVE-2019-5956.json +++ b/2019/5xxx/CVE-2019-5956.json @@ -3,7 +3,9 @@ "references": { "reference_data": [ { - "url": "http://jvn.jp/en/vu/JVNVU93628467/index.html" + "url": "http://jvn.jp/en/vu/JVNVU93628467/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/vu/JVNVU93628467/index.html" } ] }, @@ -11,7 +13,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "Directory traversal vulnerability in WonderCMS 2.6.0 and earlier allows remote attackers to delete arbitrary files via unspecified vectors." } ] }, @@ -41,7 +43,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5956", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5975.json b/2019/5xxx/CVE-2019-5975.json index 69677b17747..04c7833db94 100644 --- a/2019/5xxx/CVE-2019-5975.json +++ b/2019/5xxx/CVE-2019-5975.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/35912" + "url": "https://kb.cybozu.support/article/35912", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/35912" }, { - "url": "http://jvn.jp/en/jp/JVN62618482/index.html" + "url": "http://jvn.jp/en/jp/JVN62618482/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN62618482/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5975", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5976.json b/2019/5xxx/CVE-2019-5976.json index 6d6b58bc3f3..7b34d6c06c8 100644 --- a/2019/5xxx/CVE-2019-5976.json +++ b/2019/5xxx/CVE-2019-5976.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/35913" + "url": "http://jvn.jp/en/jp/JVN62618482/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN62618482/index.html" }, { - "url": "http://jvn.jp/en/jp/JVN62618482/index.html" + "url": "https://kb.cybozu.support/article/35913", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/35913" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5976", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5977.json b/2019/5xxx/CVE-2019-5977.json index d27a615785d..13891f029f0 100644 --- a/2019/5xxx/CVE-2019-5977.json +++ b/2019/5xxx/CVE-2019-5977.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/35915" + "url": "http://jvn.jp/en/jp/JVN62618482/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN62618482/index.html" }, { - "url": "http://jvn.jp/en/jp/JVN62618482/index.html" + "url": "https://kb.cybozu.support/article/35915", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/35915" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5977", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5978.json b/2019/5xxx/CVE-2019-5978.json index 89102d3a96b..34cd668b0db 100644 --- a/2019/5xxx/CVE-2019-5978.json +++ b/2019/5xxx/CVE-2019-5978.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/35916" + "url": "http://jvn.jp/en/jp/JVN62618482/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN62618482/index.html" }, { - "url": "http://jvn.jp/en/jp/JVN62618482/index.html" + "url": "https://kb.cybozu.support/article/35916", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/35916" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5978", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5985.json b/2019/5xxx/CVE-2019-5985.json index e94cd72195b..723763dc24f 100644 --- a/2019/5xxx/CVE-2019-5985.json +++ b/2019/5xxx/CVE-2019-5985.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html" + "url": "http://jvn.jp/en/jp/JVN43172719/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN43172719/index.html" }, { - "url": "http://jvn.jp/en/jp/JVN43172719/index.html" + "refsource": "CONFIRM", + "name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html", + "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html" } ] }, @@ -14,7 +18,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "Cross-site scripting vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, @@ -23,28 +27,94 @@ "vendor": { "vendor_data": [ { + "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION", "product": { "product_data": [ { + "product_name": "Hikari Denwa router/Home GateWay", "version": { "version_data": [ { - "version_value": "remote attackers" + "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" + }, + { + "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" + }, + { + "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" + }, + { + "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" + }, + { + "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" + }, + { + "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" + }, + { + "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" + }, + { + "version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier" + }, + { + "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier" + }, + { + "version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier" } ] - }, - "product_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier" + } } ] - }, - "vendor_name": "Hikari Denwa router/Home GateWay" + } + }, + { + "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION", + "product": { + "product_data": [ + { + "product_name": "Hikari Denwa router/Home GateWay", + "version": { + "version_data": [ + { + "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" + }, + { + "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" + }, + { + "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" + }, + { + "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" + }, + { + "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" + }, + { + "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" + }, + { + "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" + }, + { + "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier" + } + ] + } + } + ] + } } ] } }, "CVE_data_meta": { "ID": "CVE-2019-5985", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5986.json b/2019/5xxx/CVE-2019-5986.json index bac1a040f01..124aa4266e0 100644 --- a/2019/5xxx/CVE-2019-5986.json +++ b/2019/5xxx/CVE-2019-5986.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html" + "url": "http://jvn.jp/en/jp/JVN43172719/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN43172719/index.html" }, { - "url": "http://jvn.jp/en/jp/JVN43172719/index.html" + "refsource": "CONFIRM", + "name": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html", + "url": "https://www.ntt-west.co.jp/kiki/support/flets/hgw/190626.html" } ] }, @@ -14,7 +18,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors." } ] }, @@ -23,28 +27,94 @@ "vendor": { "vendor_data": [ { + "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION", "product": { "product_data": [ { + "product_name": "Hikari Denwa router/Home GateWay", "version": { "version_data": [ { - "version_value": "remote attackers" + "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" + }, + { + "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" + }, + { + "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" + }, + { + "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" + }, + { + "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" + }, + { + "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" + }, + { + "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" + }, + { + "version_value": "RS-500KI firmware version Ver.01.00.0070 and earlier" + }, + { + "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier" + }, + { + "version_value": "RS-500MI firmware version Ver.03.01.0019 and earlier" } ] - }, - "product_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier" + } } ] - }, - "vendor_name": "Hikari Denwa router/Home GateWay" + } + }, + { + "vendor_name": "Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION", + "product": { + "product_data": [ + { + "product_name": "Hikari Denwa router/Home GateWay", + "version": { + "version_data": [ + { + "version_value": "PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier" + }, + { + "version_value": "PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier" + }, + { + "version_value": "PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier" + }, + { + "version_value": "PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier" + }, + { + "version_value": "PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier" + }, + { + "version_value": "PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier" + }, + { + "version_value": "PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier" + }, + { + "version_value": "PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier" + } + ] + } + } + ] + } } ] } }, "CVE_data_meta": { "ID": "CVE-2019-5986", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5991.json b/2019/5xxx/CVE-2019-5991.json index a06d8ad05db..153bfbf7f46 100644 --- a/2019/5xxx/CVE-2019-5991.json +++ b/2019/5xxx/CVE-2019-5991.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://kb.cybozu.support/article/35975" + "url": "https://kb.cybozu.support/article/35975", + "refsource": "MISC", + "name": "https://kb.cybozu.support/article/35975" }, { - "url": "http://jvn.jp/en/jp/JVN71877187/index.html" + "url": "http://jvn.jp/en/jp/JVN71877187/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN71877187/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5991", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5992.json b/2019/5xxx/CVE-2019-5992.json index a2b3b48fbcf..b6317a0bdd4 100644 --- a/2019/5xxx/CVE-2019-5992.json +++ b/2019/5xxx/CVE-2019-5992.json @@ -3,7 +3,9 @@ "references": { "reference_data": [ { - "url": "http://jvn.jp/en/jp/JVN48981892/index.html" + "url": "http://jvn.jp/en/jp/JVN48981892/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN48981892/index.html" } ] }, @@ -11,7 +13,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "Cross-site request forgery (CSRF) vulnerability in WordPress Ultra Simple Paypal Shopping Cart v4.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors." } ] }, @@ -41,7 +43,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5992", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5993.json b/2019/5xxx/CVE-2019-5993.json index 7c9132b6c7a..5ae14fee4cb 100644 --- a/2019/5xxx/CVE-2019-5993.json +++ b/2019/5xxx/CVE-2019-5993.json @@ -3,7 +3,9 @@ "references": { "reference_data": [ { - "url": "http://jvn.jp/en/jp/JVN92510087/index.html" + "url": "http://jvn.jp/en/jp/JVN92510087/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN92510087/index.html" } ] }, @@ -11,7 +13,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "Cross-site request forgery (CSRF) vulnerability in Category Specific RSS feed Subscription version v2.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors." } ] }, @@ -41,7 +43,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5993", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/5xxx/CVE-2019-5996.json b/2019/5xxx/CVE-2019-5996.json index d8aedb6e08e..2c167b8b453 100644 --- a/2019/5xxx/CVE-2019-5996.json +++ b/2019/5xxx/CVE-2019-5996.json @@ -3,7 +3,9 @@ "references": { "reference_data": [ { - "url": "http://jvn.jp/en/jp/JVN93833849/index.html" + "url": "http://jvn.jp/en/jp/JVN93833849/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN93833849/index.html" } ] }, @@ -11,7 +13,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "SQL injection vulnerability in the Video Insight VMS 7.3.2.5 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors." } ] }, @@ -41,7 +43,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-5996", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/6xxx/CVE-2019-6003.json b/2019/6xxx/CVE-2019-6003.json index 4d50f0c4d6e..54f15496cac 100644 --- a/2019/6xxx/CVE-2019-6003.json +++ b/2019/6xxx/CVE-2019-6003.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.ec-cube.net/products/detail.php?product_id=1602" + "url": "https://www.ec-cube.net/products/detail.php?product_id=1602", + "refsource": "MISC", + "name": "https://www.ec-cube.net/products/detail.php?product_id=1602" }, { - "url": "http://jvn.jp/en/jp/JVN29343839/index.html" + "url": "http://jvn.jp/en/jp/JVN29343839/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN29343839/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-6003", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/6xxx/CVE-2019-6004.json b/2019/6xxx/CVE-2019-6004.json index bdb7a963dcb..2e3a641ffeb 100644 --- a/2019/6xxx/CVE-2019-6004.json +++ b/2019/6xxx/CVE-2019-6004.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en" + "url": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en", + "refsource": "MISC", + "name": "http://onlinesupport.fujixerox.com/processDriverForm.do?ctry_code=SG&lang_code=en&d_lang=en&corp_pid=AWMS2&rts=null&model=ApeosWare+Management+Suite+2&type_id=7&oslist=Windows+10+64bit&lang_list=en" }, { - "url": "http://jvn.jp/en/jp/JVN07679150/index.html" + "url": "http://jvn.jp/en/jp/JVN07679150/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN07679150/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-6004", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/6xxx/CVE-2019-6005.json b/2019/6xxx/CVE-2019-6005.json index 7034a2bfcd5..98b6f32cb2d 100644 --- a/2019/6xxx/CVE-2019-6005.json +++ b/2019/6xxx/CVE-2019-6005.json @@ -3,7 +3,9 @@ "references": { "reference_data": [ { - "url": "http://jvn.jp/en/jp/JVN17127920/index.html" + "url": "http://jvn.jp/en/jp/JVN17127920/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN17127920/index.html" } ] }, @@ -11,7 +13,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "Smart TV Box firmware version prior to 1300 allows remote attackers to bypass access restriction to conduct arbitrary operations on the device without user's intent, such as installing arbitrary software or changing the device settings via Android Debug Bridge port 5555/TCP." } ] }, @@ -41,7 +43,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-6005", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/6xxx/CVE-2019-6007.json b/2019/6xxx/CVE-2019-6007.json index 4dc33c133a5..127c2db1539 100644 --- a/2019/6xxx/CVE-2019-6007.json +++ b/2019/6xxx/CVE-2019-6007.json @@ -3,7 +3,9 @@ "references": { "reference_data": [ { - "url": "http://jvn.jp/en/jp/JVN39383894/index.html" + "url": "http://jvn.jp/en/jp/JVN39383894/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN39383894/index.html" } ] }, @@ -11,7 +13,7 @@ "description_data": [ { "lang": "eng", - "value": "1" + "value": "Integer overflow vulnerability in apng-drawable 1.0.0 to 1.6.0 allows an attacker to cause a denial of service (DoS) condition or execute arbitrary code via unspecified vectors." } ] }, @@ -41,7 +43,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-6007", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2019/6xxx/CVE-2019-6009.json b/2019/6xxx/CVE-2019-6009.json index 03adb61149d..15a82e418c5 100644 --- a/2019/6xxx/CVE-2019-6009.json +++ b/2019/6xxx/CVE-2019-6009.json @@ -3,19 +3,29 @@ "references": { "reference_data": [ { - "url": "https://www.ss-proj.org/" + "url": "https://www.ss-proj.org/", + "refsource": "MISC", + "name": "https://www.ss-proj.org/" }, { - "url": "https://github.com/shirasagi/shirasagi" + "url": "https://github.com/shirasagi/shirasagi", + "refsource": "MISC", + "name": "https://github.com/shirasagi/shirasagi" }, { - "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3" + "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3", + "refsource": "MISC", + "name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3" }, { - "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch" + "url": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch", + "refsource": "MISC", + "name": "https://github.com/shirasagi/shirasagi/commit/6016948ea535e51b16535888af13df064a1a15d3.patch" }, { - "url": "http://jvn.jp/en/jp/JVN74699196/index.html" + "url": "http://jvn.jp/en/jp/JVN74699196/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN74699196/index.html" } ] }, @@ -53,7 +63,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-6009", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": {