diff --git a/2018/10xxx/CVE-2018-10239.json b/2018/10xxx/CVE-2018-10239.json index 88760b73c39..a5b1d728cd1 100644 --- a/2018/10xxx/CVE-2018-10239.json +++ b/2018/10xxx/CVE-2018-10239.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10239", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A privilege escalation vulnerability in the \"support access\" feature on Infoblox NIOS 6.8 through 8.4.1 could allow a locally authenticated administrator to temporarily gain additional privileges on an affected device and perform actions within the super user scope. The vulnerability is due to a weakness in the \"support access\" password generation algorithm. A locally authenticated administrative user may be able to exploit this vulnerability if the \"support access\" feature is enabled, they know the support access code for the current session, and they know the algorithm to generate the support access password from the support access code. \"Support access\" is disabled by default. When enabled, the access will be automatically disabled (and support access code will expire) after the 24 hours." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://community.infoblox.com/t5/Security-Blog/10427-NIOS-Privilege-Escalation-Vulnerability/ba-p/17309", + "url": "https://community.infoblox.com/t5/Security-Blog/10427-NIOS-Privilege-Escalation-Vulnerability/ba-p/17309" } ] } diff --git a/2019/1xxx/CVE-2019-1013.json b/2019/1xxx/CVE-2019-1013.json index 4df30795272..a13a6c499b5 100644 --- a/2019/1xxx/CVE-2019-1013.json +++ b/2019/1xxx/CVE-2019-1013.json @@ -90,6 +90,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1013", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1013" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-573/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-573/" } ] } diff --git a/2019/5xxx/CVE-2019-5243.json b/2019/5xxx/CVE-2019-5243.json index 4cb58d7012d..b36b3bce7db 100644 --- a/2019/5xxx/CVE-2019-5243.json +++ b/2019/5xxx/CVE-2019-5243.json @@ -44,6 +44,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://utkusen.com/advisories/CVE-2019-5243.txt", + "url": "https://utkusen.com/advisories/CVE-2019-5243.txt" + }, { "refsource": "MISC", "name": "https://support.huawei.com/carrier/navi?lang=en&coltype=software#col=software&detailId=PBI1-22976324&path=PBI1-7275726/PBI1-7275742/PBI1-22892608/PBI1-22903845/PBI1-21219153&lang=en",