mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-05 18:28:42 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4aa54d0279
commit
0753d1d8c1
72
2019/16xxx/CVE-2019-16978.json
Normal file
72
2019/16xxx/CVE-2019-16978.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16978",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In FusionPBX up to v4.5.7, the file app\\devices\\device_settings.php uses an unsanitized \"id\" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a8614e66-95b7-490f-9aa8-10de5f3f9b7d",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a8614e66-95b7-490f-9aa8-10de5f3f9b7d"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/83622c4ee1d9dd1913e9fb01ce8f060b46a5768a",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fusionpbx/fusionpbx/commit/83622c4ee1d9dd1913e9fb01ce8f060b46a5768a"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-11/",
|
||||
"url": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-11/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
72
2019/16xxx/CVE-2019-16979.json
Normal file
72
2019/16xxx/CVE-2019-16979.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16979",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In FusionPBX up to v4.5.7, the file app\\contacts\\contact_urls.php uses an unsanitized \"id\" variable coming from the URL, which is reflected in HTML, leading to XSS."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=94abcf04-9b03-46cd-8d2b-092e043579aa",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=94abcf04-9b03-46cd-8d2b-092e043579aa"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/a76d9637e31a70060ecc38786246a8b1c9178322",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fusionpbx/fusionpbx/commit/a76d9637e31a70060ecc38786246a8b1c9178322"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-12/",
|
||||
"url": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-12/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
72
2019/16xxx/CVE-2019-16980.json
Normal file
72
2019/16xxx/CVE-2019-16980.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16980",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In FusionPBX up to v4.5.7, the file app\\call_broadcast\\call_broadcast_edit.php uses an unsanitized \"id\" variable coming from the URL in an unparameterized SQL query, leading to SQL injection."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=6fdda50a-99c5-4dda-9587-e814cf1eba54",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=6fdda50a-99c5-4dda-9587-e814cf1eba54"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/6fe372b3d4bb7ff07778d152886edcecc045c7ec",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fusionpbx/fusionpbx/commit/6fe372b3d4bb7ff07778d152886edcecc045c7ec"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-sqli-1/",
|
||||
"url": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-sqli-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
72
2019/16xxx/CVE-2019-16990.json
Normal file
72
2019/16xxx/CVE-2019-16990.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16990",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "In FusionPBX up to v4.5.7, the file app/music_on_hold/music_on_hold.php uses an unsanitized \"file\" variable coming from the URL, which takes any pathname (base64 encoded) and allows a download of it."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a578cdc5-f275-4656-837b-25fd640925ec",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a578cdc5-f275-4656-837b-25fd640925ec"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fusionpbx/fusionpbx/commit/95ed18aa9d781f232f5686a9027bb6f677c9b8da",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/fusionpbx/fusionpbx/commit/95ed18aa9d781f232f5686a9027bb6f677c9b8da"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-path-traversal-3/",
|
||||
"url": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-path-traversal-3/"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -34,7 +34,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The liquid-speech-balloon (aka LIQUID SPEECH BALLOON) plugin 1.0.5 for WordPress allows XSS with Internet Explorer."
|
||||
"value": "The liquid-speech-balloon (aka LIQUID SPEECH BALLOON) plugin before 1.0.7 for WordPress allows XSS with Internet Explorer."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20191017-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20191017-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -67,6 +67,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20191017-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20191017-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,6 +77,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,6 +77,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3136",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3136"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4546",
|
||||
"url": "https://www.debian.org/security/2019/dsa-4546"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user