From 265c1967407c0883c5ab1254dcca077ad7749323 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 14 Apr 2019 23:00:43 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10875.json | 5 +++++ 2019/1xxx/CVE-2019-1663.json | 5 +++++ 2019/9xxx/CVE-2019-9164.json | 5 +++++ 2019/9xxx/CVE-2019-9165.json | 5 +++++ 2019/9xxx/CVE-2019-9166.json | 5 +++++ 2019/9xxx/CVE-2019-9167.json | 5 +++++ 2019/9xxx/CVE-2019-9202.json | 5 +++++ 2019/9xxx/CVE-2019-9203.json | 5 +++++ 2019/9xxx/CVE-2019-9204.json | 5 +++++ 9 files changed, 45 insertions(+) diff --git a/2019/10xxx/CVE-2019-10875.json b/2019/10xxx/CVE-2019-10875.json index ffb233f2347..76daffd3294 100644 --- a/2019/10xxx/CVE-2019-10875.json +++ b/2019/10xxx/CVE-2019-10875.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html", "url": "https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152497/Xiaomi-Mi-Browser-Mint-Browser-URL-Spoofing.html", + "url": "http://packetstormsecurity.com/files/152497/Xiaomi-Mi-Browser-Mint-Browser-URL-Spoofing.html" } ] } diff --git a/2019/1xxx/CVE-2019-1663.json b/2019/1xxx/CVE-2019-1663.json index bb26b650cea..38bcf4e157d 100644 --- a/2019/1xxx/CVE-2019-1663.json +++ b/2019/1xxx/CVE-2019-1663.json @@ -99,6 +99,11 @@ "name": "20190227 Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9164.json b/2019/9xxx/CVE-2019-9164.json index bc8ae828e80..5e42270962e 100644 --- a/2019/9xxx/CVE-2019-9164.json +++ b/2019/9xxx/CVE-2019-9164.json @@ -54,6 +54,11 @@ "refsource": "FULLDISC", "name": "20190413 Nagios XI 5.5.10: XSS to root RCE (CVE-2019-9164, 9165, 9166, 9167, 9202, 9203, 9204)", "url": "http://seclists.org/fulldisclosure/2019/Apr/19" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9165.json b/2019/9xxx/CVE-2019-9165.json index db0f3e10539..86af2907cc5 100644 --- a/2019/9xxx/CVE-2019-9165.json +++ b/2019/9xxx/CVE-2019-9165.json @@ -49,6 +49,11 @@ "refsource": "CONFIRM", "name": "https://www.nagios.com/downloads/nagios-xi/change-log/", "url": "https://www.nagios.com/downloads/nagios-xi/change-log/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9166.json b/2019/9xxx/CVE-2019-9166.json index e7067c35dc5..8c6f6ea845a 100644 --- a/2019/9xxx/CVE-2019-9166.json +++ b/2019/9xxx/CVE-2019-9166.json @@ -49,6 +49,11 @@ "refsource": "CONFIRM", "name": "https://www.nagios.com/downloads/nagios-xi/change-log/", "url": "https://www.nagios.com/downloads/nagios-xi/change-log/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9167.json b/2019/9xxx/CVE-2019-9167.json index 3f28e1b3be0..9d361c865ca 100644 --- a/2019/9xxx/CVE-2019-9167.json +++ b/2019/9xxx/CVE-2019-9167.json @@ -49,6 +49,11 @@ "refsource": "CONFIRM", "name": "https://www.nagios.com/downloads/nagios-xi/change-log/", "url": "https://www.nagios.com/downloads/nagios-xi/change-log/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9202.json b/2019/9xxx/CVE-2019-9202.json index 1ef1534a224..5cfe472ee56 100644 --- a/2019/9xxx/CVE-2019-9202.json +++ b/2019/9xxx/CVE-2019-9202.json @@ -44,6 +44,11 @@ "refsource": "CONFIRM", "name": "https://www.nagios.com/products/security/", "url": "https://www.nagios.com/products/security/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9203.json b/2019/9xxx/CVE-2019-9203.json index d94921077a9..be0b3b12dca 100644 --- a/2019/9xxx/CVE-2019-9203.json +++ b/2019/9xxx/CVE-2019-9203.json @@ -44,6 +44,11 @@ "refsource": "CONFIRM", "name": "https://www.nagios.com/products/security/", "url": "https://www.nagios.com/products/security/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9204.json b/2019/9xxx/CVE-2019-9204.json index 4ff2e89f856..8f2a7361559 100644 --- a/2019/9xxx/CVE-2019-9204.json +++ b/2019/9xxx/CVE-2019-9204.json @@ -44,6 +44,11 @@ "refsource": "CONFIRM", "name": "https://www.nagios.com/products/security/", "url": "https://www.nagios.com/products/security/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/152496/Nagios-XI-5.5.10-XSS-Remote-Code-Execution.html" } ] },