From 26bc496d36c3d22b9b92e3e7b5418adf8fb99d3d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 22 Mar 2019 19:00:47 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/17xxx/CVE-2018-17057.json | 5 + 2019/4xxx/CVE-2019-4035.json | 174 ++++++++++++++++---------------- 2019/4xxx/CVE-2019-4052.json | 178 ++++++++++++++++----------------- 2019/9xxx/CVE-2019-9648.json | 63 +++++++++++- 2019/9xxx/CVE-2019-9908.json | 5 + 2019/9xxx/CVE-2019-9909.json | 5 + 2019/9xxx/CVE-2019-9910.json | 5 + 7 files changed, 257 insertions(+), 178 deletions(-) diff --git a/2018/17xxx/CVE-2018-17057.json b/2018/17xxx/CVE-2018-17057.json index efd9a06f446..5d27f9746ad 100644 --- a/2018/17xxx/CVE-2018-17057.json +++ b/2018/17xxx/CVE-2018-17057.json @@ -56,6 +56,11 @@ "name": "https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed", "refsource": "MISC", "url": "https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed" + }, + { + "refsource": "FULLDISC", + "name": "20190322 CVE-2018-17057: phar deserialization in TCPDF might lead to RCE", + "url": "http://seclists.org/fulldisclosure/2019/Mar/36" } ] } diff --git a/2019/4xxx/CVE-2019-4035.json b/2019/4xxx/CVE-2019-4035.json index 81058ccca70..54a4946b474 100644 --- a/2019/4xxx/CVE-2019-4035.json +++ b/2019/4xxx/CVE-2019-4035.json @@ -1,90 +1,90 @@ { - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Gain Access", - "lang" : "eng" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.ibm.com/support/docview.wss?uid=ibm10869060", - "url" : "http://www.ibm.com/support/docview.wss?uid=ibm10869060", - "refsource" : "CONFIRM", - "title" : "IBM Security Bulletin 869060 (Content Navigator)" - }, - { - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "name" : "ibm-content-cve20194035-spoofing (156001)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/156001" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "A" : "L", - "UI" : "N", - "SCORE" : "6.300", - "PR" : "L", - "AC" : "L", - "S" : "U", - "AV" : "N", - "C" : "L", - "I" : "L" - }, - "TM" : { - "RL" : "O", - "E" : "U", - "RC" : "C" - } - } - }, - "data_type" : "CVE", - "data_format" : "MITRE", - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ID" : "CVE-2019-4035", - "DATE_PUBLIC" : "2019-03-11T00:00:00", - "ASSIGNER" : "psirt@us.ibm.com" - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Content Navigator 3.0CD could allow attackers to direct web traffic to a malicious site. If attackers make a fake IBM Content Navigator site, they can send a link to ICN users to send request to their Edit client directly. Then Edit client will download documents from the fake ICN website. IBM X-Force ID: 156001.", - "lang" : "eng" - } - ] - }, - "affects" : { - "vendor" : { - "vendor_data" : [ + "problemtype": { + "problemtype_data": [ { - "product" : { - "product_data" : [ - { - "version" : { - "version_data" : [ - { - "version_value" : "3.0CD" - } - ] - }, - "product_name" : "Content Navigator" - } - ] - }, - "vendor_name" : "IBM" + "description": [ + { + "value": "Gain Access", + "lang": "eng" + } + ] } - ] - } - }, - "data_version" : "4.0" -} + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.ibm.com/support/docview.wss?uid=ibm10869060", + "url": "http://www.ibm.com/support/docview.wss?uid=ibm10869060", + "refsource": "CONFIRM", + "title": "IBM Security Bulletin 869060 (Content Navigator)" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "name": "ibm-content-cve20194035-spoofing (156001)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/156001" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "A": "L", + "UI": "N", + "SCORE": "6.300", + "PR": "L", + "AC": "L", + "S": "U", + "AV": "N", + "C": "L", + "I": "L" + }, + "TM": { + "RL": "O", + "E": "U", + "RC": "C" + } + } + }, + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-4035", + "DATE_PUBLIC": "2019-03-11T00:00:00", + "ASSIGNER": "psirt@us.ibm.com" + }, + "description": { + "description_data": [ + { + "value": "IBM Content Navigator 3.0CD could allow attackers to direct web traffic to a malicious site. If attackers make a fake IBM Content Navigator site, they can send a link to ICN users to send request to their Edit client directly. Then Edit client will download documents from the fake ICN website. IBM X-Force ID: 156001.", + "lang": "eng" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "3.0CD" + } + ] + }, + "product_name": "Content Navigator" + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_version": "4.0" +} \ No newline at end of file diff --git a/2019/4xxx/CVE-2019-4052.json b/2019/4xxx/CVE-2019-4052.json index be094ec86b8..fbb9f42d357 100644 --- a/2019/4xxx/CVE-2019-4052.json +++ b/2019/4xxx/CVE-2019-4052.json @@ -1,93 +1,93 @@ { - "data_format" : "MITRE", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM API Connect 2018.1 and 2018.4.1.2 apis can be leveraged by unauthenticated users to discover login ids of registered users. IBM X-Force ID: 156544." - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2019-4052", - "STATE" : "PUBLIC", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-03-20T00:00:00" - }, - "data_type" : "CVE", - "data_version" : "4.0", - "affects" : { - "vendor" : { - "vendor_data" : [ + "data_format": "MITRE", + "description": { + "description_data": [ { - "product" : { - "product_data" : [ - { - "product_name" : "API Connect", - "version" : { - "version_data" : [ - { - "version_value" : "2018.1" - }, - { - "version_value" : "2018.4.1.2" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "lang": "eng", + "value": "IBM API Connect 2018.1 and 2018.4.1.2 apis can be leveraged by unauthenticated users to discover login ids of registered users. IBM X-Force ID: 156544." } - ] - } - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2019-4052", + "STATE": "PUBLIC", + "ASSIGNER": "psirt@us.ibm.com", + "DATE_PUBLIC": "2019-03-20T00:00:00" + }, + "data_type": "CVE", + "data_version": "4.0", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "API Connect", + "version": { + "version_data": [ + { + "version_value": "2018.1" + }, + { + "version_value": "2018.4.1.2" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://www.ibm.com/support/docview.wss?uid=ibm10874248", - "url" : "http://www.ibm.com/support/docview.wss?uid=ibm10874248", - "title" : "IBM Security Bulletin 874248 (API Connect)", - "refsource" : "CONFIRM" - }, - { - "name" : "ibm-api-cve20194052-info-disc (156544)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/156544", - "refsource" : "XF", - "title" : "X-Force Vulnerability Report" - } - ] - }, - "impact" : { - "cvssv3" : { - "BM" : { - "C" : "H", - "I" : "L", - "S" : "U", - "AV" : "N", - "PR" : "N", - "AC" : "L", - "SCORE" : "8.200", - "UI" : "N", - "A" : "N" - }, - "TM" : { - "RC" : "C", - "RL" : "O", - "E" : "U" - } - } - } -} + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.ibm.com/support/docview.wss?uid=ibm10874248", + "url": "http://www.ibm.com/support/docview.wss?uid=ibm10874248", + "title": "IBM Security Bulletin 874248 (API Connect)", + "refsource": "CONFIRM" + }, + { + "name": "ibm-api-cve20194052-info-disc (156544)", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/156544", + "refsource": "XF", + "title": "X-Force Vulnerability Report" + } + ] + }, + "impact": { + "cvssv3": { + "BM": { + "C": "H", + "I": "L", + "S": "U", + "AV": "N", + "PR": "N", + "AC": "L", + "SCORE": "8.200", + "UI": "N", + "A": "N" + }, + "TM": { + "RC": "C", + "RL": "O", + "E": "U" + } + } + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9648.json b/2019/9xxx/CVE-2019-9648.json index 93ef5dfc619..308a3128ac0 100644 --- a/2019/9xxx/CVE-2019-9648.json +++ b/2019/9xxx/CVE-2019-9648.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9648", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,66 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \\..\\..\\ substring, allowing an attacker to enumerate file existence based on the returned information." + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "BID", + "name": "107446", + "url": "http://www.securityfocus.com/bid/107446" + }, + { + "refsource": "CONFIRM", + "name": "http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509", + "url": "http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509" + }, + { + "refsource": "EXPLOIT-DB", + "name": "46535", + "url": "https://www.exploit-db.com/exploits/46535" + }, + { + "refsource": "FULLDISC", + "name": "20190311 CVE-2019-9648 CoreFTP Server FTP / SFTP Server v2 - Build 674 SIZE Directory Traversal", + "url": "https://seclists.org/fulldisclosure/2019/Mar/23" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] } diff --git a/2019/9xxx/CVE-2019-9908.json b/2019/9xxx/CVE-2019-9908.json index f08ec9b91f0..0f474247268 100644 --- a/2019/9xxx/CVE-2019-9908.json +++ b/2019/9xxx/CVE-2019-9908.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://wpvulndb.com/vulnerabilities/9239", "url": "https://wpvulndb.com/vulnerabilities/9239" + }, + { + "refsource": "FULLDISC", + "name": "20190322 Re: Font_Organizer 2.1.1 - Reflected XSS (WordPress Plugin)", + "url": "http://seclists.org/fulldisclosure/2019/Mar/37" } ] } diff --git a/2019/9xxx/CVE-2019-9909.json b/2019/9xxx/CVE-2019-9909.json index a78cc024d68..84fa939dd17 100644 --- a/2019/9xxx/CVE-2019-9909.json +++ b/2019/9xxx/CVE-2019-9909.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://wpvulndb.com/vulnerabilities/9240", "url": "https://wpvulndb.com/vulnerabilities/9240" + }, + { + "refsource": "FULLDISC", + "name": "20190322 Re: Give 2.3.0 - Reflected XSS (WordPress Plugin)", + "url": "http://seclists.org/fulldisclosure/2019/Mar/38" } ] } diff --git a/2019/9xxx/CVE-2019-9910.json b/2019/9xxx/CVE-2019-9910.json index def77a35606..9f99d881dc3 100644 --- a/2019/9xxx/CVE-2019-9910.json +++ b/2019/9xxx/CVE-2019-9910.json @@ -61,6 +61,11 @@ "url": "https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/", "refsource": "MISC", "name": "https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/" + }, + { + "refsource": "FULLDISC", + "name": "20190322 Re: KingComposer 2.7.6 - Reflected XSS (WordPress Plugin)", + "url": "http://seclists.org/fulldisclosure/2019/Mar/39" } ] }