"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-11 19:00:51 +00:00
parent 494bb9c792
commit 26d23049d4
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
22 changed files with 465 additions and 60 deletions

View File

@ -86,6 +86,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2730",
"url": "https://access.redhat.com/errata/RHSA-2019:2730"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2736",
"url": "https://access.redhat.com/errata/RHSA-2019:2736"
}
]
}

View File

@ -115,6 +115,11 @@
"name": "v1.13.9, v1.14.5, v1.15.2 released to address CVE-2019-11247, CVE-2019-11249",
"refsource": "MLIST",
"url": "https://groups.google.com/d/msg/kubernetes-security-announce/vUtEcSEY6SM/v2ZZxsmtFQAJ"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2690",
"url": "https://access.redhat.com/errata/RHSA-2019:2690"
}
]
},

View File

@ -171,6 +171,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2703",
"url": "https://access.redhat.com/errata/RHSA-2019:2703"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2741",
"url": "https://access.redhat.com/errata/RHSA-2019:2741"
}
]
}

View File

@ -72,6 +72,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2592",
"url": "https://access.redhat.com/errata/RHSA-2019:2592"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2737",
"url": "https://access.redhat.com/errata/RHSA-2019:2737"
}
]
}

View File

@ -82,6 +82,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2592",
"url": "https://access.redhat.com/errata/RHSA-2019:2592"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2737",
"url": "https://access.redhat.com/errata/RHSA-2019:2737"
}
]
}

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information."
"value": "In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information."
}
]
},

View File

@ -141,6 +141,11 @@
"refsource": "UBUNTU",
"name": "USN-4118-1",
"url": "https://usn.ubuntu.com/4118-1/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2736",
"url": "https://access.redhat.com/errata/RHSA-2019:2736"
}
]
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13473",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TELESTAR Bobs Rock Radio, Dabman D10, Dabman i30 Stereo, Imperial i110, Imperial i150, Imperial i200, Imperial i200-cd, Imperial i400, Imperial i450, Imperial i500-bt, and Imperial i600 TN81HH96-g102h-g102 devices have an undocumented TELNET service within the BusyBox subsystem, leading to root access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.vulnerability-lab.com/get_content.php?id=2183",
"refsource": "MISC",
"name": "https://www.vulnerability-lab.com/get_content.php?id=2183"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154416/Dabman-And-Imperial-Web-Radio-Devices-Undocumented-Telnet-Backdoor.html",
"url": "http://packetstormsecurity.com/files/154416/Dabman-And-Imperial-Web-Radio-Devices-Undocumented-Telnet-Backdoor.html"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14936",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Easy!Appointments 1.3.2 plugin for WordPress allows Sensitive Information Disclosure (Username and Password Hash)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.blackdragon.team/contents/index.php/cves/cve-2019-14936/",
"url": "https://www.blackdragon.team/contents/index.php/cves/cve-2019-14936/"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16235",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Dino before 2019-09-10 does not properly check the source of a carbons message in module/xep/0280_message_carbons.vala."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930",
"refsource": "MISC",
"name": "https://github.com/dino/dino/commit/e84f2c49567e86d2a261ea264d65c4adc549c930"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16236",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Dino before 2019-09-10 does not check roster push authorization in module/roster/module.vala."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/dino/dino/commit/dd33f5f949248d87d34f399e8846d5ee5b8823d9",
"refsource": "MISC",
"name": "https://github.com/dino/dino/commit/dd33f5f949248d87d34f399e8846d5ee5b8823d9"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16237",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Dino before 2019-09-10 does not properly check the source of an MAM message in module/xep/0313_message_archive_management.vala."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/dino/dino/commit/307f16cc86dd2b95aa02ab8a85110e4a2d5e7363",
"refsource": "MISC",
"name": "https://github.com/dino/dino/commit/307f16cc86dd2b95aa02ab8a85110e4a2d5e7363"
}
]
}
}

View File

@ -111,6 +111,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2592",
"url": "https://access.redhat.com/errata/RHSA-2019:2592"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2737",
"url": "https://access.redhat.com/errata/RHSA-2019:2737"
}
]
}

View File

@ -111,6 +111,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2592",
"url": "https://access.redhat.com/errata/RHSA-2019:2592"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2737",
"url": "https://access.redhat.com/errata/RHSA-2019:2737"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2592",
"url": "https://access.redhat.com/errata/RHSA-2019:2592"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2737",
"url": "https://access.redhat.com/errata/RHSA-2019:2737"
}
]
}

View File

@ -111,6 +111,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2592",
"url": "https://access.redhat.com/errata/RHSA-2019:2592"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2737",
"url": "https://access.redhat.com/errata/RHSA-2019:2737"
}
]
}

View File

@ -153,6 +153,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2703",
"url": "https://access.redhat.com/errata/RHSA-2019:2703"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2741",
"url": "https://access.redhat.com/errata/RHSA-2019:2741"
}
]
},

View File

@ -78,6 +78,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2703",
"url": "https://access.redhat.com/errata/RHSA-2019:2703"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2741",
"url": "https://access.redhat.com/errata/RHSA-2019:2741"
}
]
},

View File

@ -241,6 +241,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2592",
"url": "https://access.redhat.com/errata/RHSA-2019:2592"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2737",
"url": "https://access.redhat.com/errata/RHSA-2019:2737"
}
]
}

View File

@ -1,60 +1,75 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "security@trendmicro.com",
"ID" : "CVE-2019-9488",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Trend Micro Deep Security, Trend Micro Vulnerability Protection",
"version" : {
"version_data" : [
{
"version_value" : "Deep Security 10.x, 11.x; Vulnerability Protection 2.0"
}
]
}
}
]
},
"vendor_name" : "Trend Micro"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Trend Micro Deep Security Manager (10.x, 11.x) and Vulnerability Protection (2.0) are vulnerable to a XML External Entity Attack. However, for the attack to be possible, the attacker must have root/admin access to a protected host which is authorized to communicate with the Deep Security Manager (DSM). "
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "XXE Attack"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://success.trendmicro.com/solution/1122900"
}
]
}
}
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2019-9488",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Trend Micro",
"product": {
"product_data": [
{
"product_name": "Trend Micro Deep Security",
"version": {
"version_data": [
{
"version_value": "10.x"
},
{
"version_value": "11.x"
}
]
}
},
{
"product_name": "Trend Micro Vulnerability Protection",
"version": {
"version_data": [
{
"version_value": "2.0"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Trend Micro Deep Security Manager (10.x, 11.x) and Vulnerability Protection (2.0) are vulnerable to a XML External Entity Attack. However, for the attack to be possible, the attacker must have root/admin access to a protected host which is authorized to communicate with the Deep Security Manager (DSM)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "XXE Attack"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://success.trendmicro.com/solution/1122900",
"url": "https://success.trendmicro.com/solution/1122900"
}
]
}
}

View File

@ -248,6 +248,11 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10296"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2690",
"url": "https://access.redhat.com/errata/RHSA-2019:2690"
}
]
},

View File

@ -248,6 +248,11 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10296",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10296"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2690",
"url": "https://access.redhat.com/errata/RHSA-2019:2690"
}
]
},