From 111fa540770fc578e3af756c90aa376997b150b9 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 21 Mar 2019 16:00:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/6xxx/CVE-2017-6865.json | 414 +++++++++++++++++++++++++++++++-- 2018/17xxx/CVE-2018-17456.json | 5 + 2018/20xxx/CVE-2018-20234.json | 5 + 2018/20xxx/CVE-2018-20235.json | 5 + 2018/20xxx/CVE-2018-20236.json | 5 + 2018/3xxx/CVE-2018-3963.json | 58 ++++- 2018/3xxx/CVE-2018-3969.json | 58 ++++- 2018/3xxx/CVE-2018-3985.json | 58 ++++- 2018/4xxx/CVE-2018-4003.json | 58 ++++- 2018/4xxx/CVE-2018-4011.json | 58 ++++- 2018/4xxx/CVE-2018-4030.json | 58 ++++- 2018/8xxx/CVE-2018-8088.json | 5 + 2018/9xxx/CVE-2018-9128.json | 5 + 2019/6xxx/CVE-2019-6279.json | 5 + 2019/6xxx/CVE-2019-6282.json | 5 + 2019/6xxx/CVE-2019-6491.json | 48 +++- 2019/9xxx/CVE-2019-9899.json | 18 ++ 17 files changed, 804 insertions(+), 64 deletions(-) create mode 100644 2019/9xxx/CVE-2019-9899.json diff --git a/2017/6xxx/CVE-2017-6865.json b/2017/6xxx/CVE-2017-6865.json index cfd31c0ee9e..61f4cf1977a 100644 --- a/2017/6xxx/CVE-2017-6865.json +++ b/2017/6xxx/CVE-2017-6865.json @@ -1,50 +1,416 @@ { + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2017-6865", + "ASSIGNER": "productcert@siemens.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { + "vendor_name": "Siemens AG", "product": { "product_data": [ { - "product_name": "Siemens Industrial Products", + "product_name": "Primary Setup Tool (PST)", "version": { "version_data": [ { - "version_value": "Siemens Industrial Products" + "version_value": "All versions < V4.2 HF1" } ] } } ] - }, - "vendor_name": "n/a" + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC Automation Tool", + "version": { + "version_data": [ + { + "version_value": "All versions < V3.0" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC NET PC-Software", + "version": { + "version_data": [ + { + "version_value": "All versions < V14 SP1" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC PCS 7 V8.1", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC PCS 7 V8.2", + "version": { + "version_data": [ + { + "version_value": "All versions < V8.2 SP1" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC STEP 7 (TIA Portal) V13", + "version": { + "version_data": [ + { + "version_value": "All versions < V13 SP2" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC STEP 7 (TIA Portal) V14", + "version": { + "version_data": [ + { + "version_value": "All versions < V14 SP1" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC STEP 7 V5.X", + "version": { + "version_data": [ + { + "version_value": "All versions < V5.6" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinAC RTX 2010 SP2", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinAC RTX F 2010 SP2", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinCC (TIA Portal) V13", + "version": { + "version_data": [ + { + "version_value": "All versions < V13 SP2" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinCC (TIA Portal) V14", + "version": { + "version_data": [ + { + "version_value": "All versions < V14 SP1" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinCC V7.2 and prior", + "version": { + "version_data": [ + { + "version_value": "All versions" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinCC V7.3", + "version": { + "version_data": [ + { + "version_value": "All versions < V7.3 Update 15" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinCC V7.4", + "version": { + "version_data": [ + { + "version_value": "All versions < V7.4 SP1 Upd1" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SIMATIC WinCC flexible 2008", + "version": { + "version_data": [ + { + "version_value": "All versions < flexible 2008 SP5" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SINAUT ST7CC", + "version": { + "version_data": [ + { + "version_value": "All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SINEMA Server", + "version": { + "version_data": [ + { + "version_value": "All versions < V14" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SINUMERIK 808D Programming Tool", + "version": { + "version_data": [ + { + "version_value": "All versions < V4.7 SP4 HF2" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "SMART PC Access", + "version": { + "version_data": [ + { + "version_value": "All versions < V2.3" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "STEP 7 - Micro/WIN SMART", + "version": { + "version_data": [ + { + "version_value": "All versions < V2.3" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "Security Configuration Tool (SCT)", + "version": { + "version_data": [ + { + "version_value": "All versions < V5.0" + } + ] + } + } + ] + } + }, + { + "vendor_name": "Siemens AG", + "product": { + "product_data": [ + { + "product_name": "Security Configuration Tool (SCT)", + "version": { + "version_data": [ + { + "version_value": "All versions < V5.0" + } + ] + } + } + ] + } } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover." - } - ] - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "value": "Other" } ] } @@ -53,14 +419,22 @@ "references": { "reference_data": [ { - "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-275839.pdf", "refsource": "CONFIRM", + "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-275839.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-275839.pdf" }, { - "name": "98366", "refsource": "BID", - "url": "http://www.securityfocus.com/bid/98366" + "name": "98366", + "url": "https://www.securityfocus.com/bid/98366" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover." } ] } diff --git a/2018/17xxx/CVE-2018-17456.json b/2018/17xxx/CVE-2018-17456.json index 968b3d35288..a8536c91f6c 100644 --- a/2018/17xxx/CVE-2018-17456.json +++ b/2018/17xxx/CVE-2018-17456.json @@ -126,6 +126,11 @@ "refsource": "BID", "name": "107511", "url": "http://www.securityfocus.com/bid/107511" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html", + "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ] } diff --git a/2018/20xxx/CVE-2018-20234.json b/2018/20xxx/CVE-2018-20234.json index 80cc9d6ef16..51085a903c0 100644 --- a/2018/20xxx/CVE-2018-20234.json +++ b/2018/20xxx/CVE-2018-20234.json @@ -72,6 +72,11 @@ "refsource": "BUGTRAQ", "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "url": "https://seclists.org/bugtraq/2019/Mar/30" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html", + "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ] } diff --git a/2018/20xxx/CVE-2018-20235.json b/2018/20xxx/CVE-2018-20235.json index 16572009409..56528194dc2 100644 --- a/2018/20xxx/CVE-2018-20235.json +++ b/2018/20xxx/CVE-2018-20235.json @@ -72,6 +72,11 @@ "refsource": "BUGTRAQ", "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "url": "https://seclists.org/bugtraq/2019/Mar/30" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html", + "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ] } diff --git a/2018/20xxx/CVE-2018-20236.json b/2018/20xxx/CVE-2018-20236.json index f586879929a..d7f6201af70 100644 --- a/2018/20xxx/CVE-2018-20236.json +++ b/2018/20xxx/CVE-2018-20236.json @@ -72,6 +72,11 @@ "refsource": "BUGTRAQ", "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "url": "https://seclists.org/bugtraq/2019/Mar/30" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html", + "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ] } diff --git a/2018/3xxx/CVE-2018-3963.json b/2018/3xxx/CVE-2018-3963.json index 524916a4ed2..cecadee2cef 100644 --- a/2018/3xxx/CVE-2018-3963.json +++ b/2018/3xxx/CVE-2018-3963.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-3963", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-3963", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CUJO", + "version": { + "version_data": [ + { + "version_value": "CUJO Smart Firewall - Firmware version 7003" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "command injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0627", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0627" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable command injection vulnerability exists in the DHCP daemon configuration of the CUJO Smart Firewall. When adding a new static DHCP address, its corresponding hostname is inserted into the dhcpd.conf file without prior sanitization, allowing for arbitrary execution of system commands. To trigger this vulnerability, an attacker can send a DHCP request message and set up the corresponding static DHCP entry." } ] } diff --git a/2018/3xxx/CVE-2018-3969.json b/2018/3xxx/CVE-2018-3969.json index 6593f47640c..58975dd280a 100644 --- a/2018/3xxx/CVE-2018-3969.json +++ b/2018/3xxx/CVE-2018-3969.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-3969", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-3969", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CUJO", + "version": { + "version_data": [ + { + "version_value": "CUJO Smart Firewall - Firmware version 7003" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "permissions, privileges, and access controls" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable vulnerability exists in the verified boot protection of the CUJO Smart Firewall. It is possible to add arbitrary shell commands into the dhcpd.conf file, that persist across reboots and firmware updates, and thus allow for executing unverified commands. To trigger this vulnerability, a local attacker needs to be able to write into /config/dhcpd.conf." } ] } diff --git a/2018/3xxx/CVE-2018-3985.json b/2018/3xxx/CVE-2018-3985.json index f1b48d35146..63cfdab36a8 100644 --- a/2018/3xxx/CVE-2018-3985.json +++ b/2018/3xxx/CVE-2018-3985.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-3985", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-3985", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CUJO", + "version": { + "version_data": [ + { + "version_value": "CUJO Smart Firewall - Firmware version 7003" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "double-free" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0653", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0653" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable double free vulnerability exists in the mdnscap binary of the CUJO Smart Firewall. When parsing mDNS packets, a memory space is freed twice if an invalid query name is encountered, leading to arbitrary code execution in the context of the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability." } ] } diff --git a/2018/4xxx/CVE-2018-4003.json b/2018/4xxx/CVE-2018-4003.json index 02b08fca717..a8738a1f602 100644 --- a/2018/4xxx/CVE-2018-4003.json +++ b/2018/4xxx/CVE-2018-4003.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4003", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4003", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CUJO", + "version": { + "version_data": [ + { + "version_value": "CUJO Smart Firewall - Firmware version 7003" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "heap overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0672", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0672" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable heap overflow vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. The string lengths are handled incorrectly when parsing character strings in mDNS resource records, leading to arbitrary code execution in the context of the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability." } ] } diff --git a/2018/4xxx/CVE-2018-4011.json b/2018/4xxx/CVE-2018-4011.json index 10cf5f7363f..e4825300772 100644 --- a/2018/4xxx/CVE-2018-4011.json +++ b/2018/4xxx/CVE-2018-4011.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4011", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4011", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CUJO", + "version": { + "version_data": [ + { + "version_value": "CUJO Smart Firewall - Firmware version 7003" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "integer underflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0681", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0681" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable integer underflow vulnerability exists in the mdnscap binary of the CUJO Smart Firewall, version 7003. When parsing SRV records in an mDNS packet, the \"RDLENGTH\" value is handled incorrectly, leading to an out-of-bounds access that crashes the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability." } ] } diff --git a/2018/4xxx/CVE-2018-4030.json b/2018/4xxx/CVE-2018-4030.json index a77a782f0ef..e5150bf3431 100644 --- a/2018/4xxx/CVE-2018-4030.json +++ b/2018/4xxx/CVE-2018-4030.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-4030", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-4030", + "ASSIGNER": "talos-cna@cisco.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "CUJO", + "version": { + "version_data": [ + { + "version_value": "CUJO Smart Firewall - Firmware version 7003" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "'HTTP Request Smuggling" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0702", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0702" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exploitable vulnerability exists the safe browsing function of the CUJO Smart Firewall, version 7003. The bug lies in the way the safe browsing function parses HTTP requests. The \"Host\" header is incorrectly extracted from captured HTTP requests, which would allow an attacker to visit any malicious websites and bypass the firewall. An attacker could send an HTTP request to exploit this vulnerability." } ] } diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json index d2cbcd6a1bb..3f4d86241f2 100644 --- a/2018/8xxx/CVE-2018-8088.json +++ b/2018/8xxx/CVE-2018-8088.json @@ -196,6 +196,11 @@ "refsource": "MLIST", "name": "[infra-devnull] 20190321 [GitHub] [tika] dadoonet opened pull request #268: Update slf4j to 1.8.0-beta4", "url": "https://lists.apache.org/thread.html/956ba8e76b6793a6670b2eb0129a5e3003ce2124ca3130fd57d48d0f@%3Cdevnull.infra.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[infra-devnull] 20190321 [GitHub] [tika] grossws commented on issue #268: Update slf4j to 1.8.0-beta4", + "url": "https://lists.apache.org/thread.html/95ce76613c869dbccf1d3d29327099ccc71aeec156f76c30853044fa@%3Cdevnull.infra.apache.org%3E" } ] } diff --git a/2018/9xxx/CVE-2018-9128.json b/2018/9xxx/CVE-2018-9128.json index 0380446ab3c..c05c395aa21 100644 --- a/2018/9xxx/CVE-2018-9128.json +++ b/2018/9xxx/CVE-2018-9128.json @@ -61,6 +61,11 @@ "name": "44438", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44438/" + }, + { + "refsource": "EXPLOIT-DB", + "name": "46584", + "url": "https://www.exploit-db.com/exploits/46584/" } ] } diff --git a/2019/6xxx/CVE-2019-6279.json b/2019/6xxx/CVE-2019-6279.json index 558ffe56314..ab3a6804fe6 100644 --- a/2019/6xxx/CVE-2019-6279.json +++ b/2019/6xxx/CVE-2019-6279.json @@ -66,6 +66,11 @@ "refsource": "EXPLOIT-DB", "name": "46580", "url": "https://www.exploit-db.com/exploits/46580/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152166/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html", + "url": "http://packetstormsecurity.com/files/152166/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html" } ] } diff --git a/2019/6xxx/CVE-2019-6282.json b/2019/6xxx/CVE-2019-6282.json index 54b5f658a87..9234e8a6b7c 100644 --- a/2019/6xxx/CVE-2019-6282.json +++ b/2019/6xxx/CVE-2019-6282.json @@ -66,6 +66,11 @@ "refsource": "EXPLOIT-DB", "name": "46581", "url": "https://www.exploit-db.com/exploits/46581/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152167/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/152167/PLC-Wireless-Router-GPN2.4P21-C-CN-Cross-Site-Request-Forgery.html" } ] } diff --git a/2019/6xxx/CVE-2019-6491.json b/2019/6xxx/CVE-2019-6491.json index 33d69e3607d..4a6d6cf5351 100644 --- a/2019/6xxx/CVE-2019-6491.json +++ b/2019/6xxx/CVE-2019-6491.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6491", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,8 +11,52 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "RISI Gestao de Horarios v3201.09.08 rev.23 allows SQL Injection." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.0x90.zone/web/sqli/2019/02/01/risi-gestaohorario.html", + "url": "https://www.0x90.zone/web/sqli/2019/02/01/risi-gestaohorario.html" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } } } \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9899.json b/2019/9xxx/CVE-2019-9899.json new file mode 100644 index 00000000000..48d421be105 --- /dev/null +++ b/2019/9xxx/CVE-2019-9899.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9899", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file