From 298b4d2ae5ce1b4a07f07c5158d909623a76ebd3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 19 Sep 2019 15:01:17 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/1003xxx/CVE-2019-1003040.json | 10 +- 2019/1003xxx/CVE-2019-1003041.json | 10 +- 2019/1003xxx/CVE-2019-1003042.json | 10 +- 2019/1003xxx/CVE-2019-1003043.json | 10 +- 2019/10xxx/CVE-2019-10321.json | 10 +- 2019/10xxx/CVE-2019-10322.json | 10 +- 2019/10xxx/CVE-2019-10323.json | 10 +- 2019/10xxx/CVE-2019-10324.json | 10 +- 2019/10xxx/CVE-2019-10325.json | 10 +- 2019/10xxx/CVE-2019-10326.json | 10 +- 2019/10xxx/CVE-2019-10327.json | 10 +- 2019/10xxx/CVE-2019-10328.json | 10 +- 2019/10xxx/CVE-2019-10329.json | 10 +- 2019/10xxx/CVE-2019-10330.json | 10 +- 2019/10xxx/CVE-2019-10331.json | 10 +- 2019/10xxx/CVE-2019-10332.json | 10 +- 2019/10xxx/CVE-2019-10333.json | 10 +- 2019/10xxx/CVE-2019-10334.json | 10 +- 2019/10xxx/CVE-2019-10335.json | 10 +- 2019/10xxx/CVE-2019-10336.json | 10 +- 2019/10xxx/CVE-2019-10337.json | 10 +- 2019/10xxx/CVE-2019-10338.json | 10 +- 2019/10xxx/CVE-2019-10339.json | 10 +- 2019/10xxx/CVE-2019-10340.json | 10 +- 2019/10xxx/CVE-2019-10341.json | 10 +- 2019/10xxx/CVE-2019-10342.json | 10 +- 2019/10xxx/CVE-2019-10343.json | 10 +- 2019/10xxx/CVE-2019-10344.json | 10 +- 2019/10xxx/CVE-2019-10345.json | 10 +- 2019/10xxx/CVE-2019-10346.json | 10 +- 2019/10xxx/CVE-2019-10347.json | 10 +- 2019/10xxx/CVE-2019-10348.json | 10 +- 2019/10xxx/CVE-2019-10349.json | 10 +- 2019/10xxx/CVE-2019-10350.json | 10 +- 2019/10xxx/CVE-2019-10351.json | 10 +- 2019/10xxx/CVE-2019-10352.json | 10 +- 2019/10xxx/CVE-2019-10353.json | 10 +- 2019/10xxx/CVE-2019-10354.json | 10 +- 2019/10xxx/CVE-2019-10355.json | 10 +- 2019/10xxx/CVE-2019-10356.json | 10 +- 2019/10xxx/CVE-2019-10357.json | 10 +- 2019/10xxx/CVE-2019-10358.json | 10 +- 2019/10xxx/CVE-2019-10359.json | 10 +- 2019/10xxx/CVE-2019-10360.json | 10 +- 2019/10xxx/CVE-2019-10361.json | 10 +- 2019/10xxx/CVE-2019-10362.json | 10 +- 2019/10xxx/CVE-2019-10363.json | 10 +- 2019/10xxx/CVE-2019-10364.json | 10 +- 2019/10xxx/CVE-2019-10365.json | 10 +- 2019/10xxx/CVE-2019-10366.json | 10 +- 2019/10xxx/CVE-2019-10367.json | 10 +- 2019/10xxx/CVE-2019-10368.json | 10 +- 2019/10xxx/CVE-2019-10369.json | 10 +- 2019/10xxx/CVE-2019-10370.json | 10 +- 2019/10xxx/CVE-2019-10371.json | 10 +- 2019/10xxx/CVE-2019-10372.json | 10 +- 2019/10xxx/CVE-2019-10373.json | 10 +- 2019/10xxx/CVE-2019-10374.json | 10 +- 2019/10xxx/CVE-2019-10375.json | 10 +- 2019/10xxx/CVE-2019-10376.json | 10 +- 2019/10xxx/CVE-2019-10377.json | 10 +- 2019/10xxx/CVE-2019-10378.json | 10 +- 2019/10xxx/CVE-2019-10379.json | 10 +- 2019/10xxx/CVE-2019-10380.json | 10 +- 2019/10xxx/CVE-2019-10381.json | 10 +- 2019/10xxx/CVE-2019-10382.json | 10 +- 2019/10xxx/CVE-2019-10383.json | 10 +- 2019/10xxx/CVE-2019-10384.json | 10 +- 2019/10xxx/CVE-2019-10385.json | 10 +- 2019/10xxx/CVE-2019-10386.json | 10 +- 2019/10xxx/CVE-2019-10387.json | 10 +- 2019/10xxx/CVE-2019-10388.json | 10 +- 2019/10xxx/CVE-2019-10389.json | 10 +- 2019/10xxx/CVE-2019-10390.json | 10 +- 2019/10xxx/CVE-2019-10391.json | 10 +- 2019/10xxx/CVE-2019-10392.json | 2 +- 2019/10xxx/CVE-2019-10393.json | 10 +- 2019/10xxx/CVE-2019-10394.json | 10 +- 2019/10xxx/CVE-2019-10395.json | 10 +- 2019/10xxx/CVE-2019-10396.json | 10 +- 2019/10xxx/CVE-2019-10397.json | 10 +- 2019/10xxx/CVE-2019-10398.json | 10 +- 2019/10xxx/CVE-2019-10399.json | 10 +- 2019/10xxx/CVE-2019-10400.json | 10 +- 2019/14xxx/CVE-2019-14994.json | 245 +++++++++++--------------- 2019/15xxx/CVE-2019-15000.json | 274 +++++++++++------------------ 2019/15xxx/CVE-2019-15001.json | 94 ++-------- 2019/16xxx/CVE-2019-16398.json | 62 +++++++ 88 files changed, 704 insertions(+), 803 deletions(-) create mode 100644 2019/16xxx/CVE-2019-16398.json diff --git a/2019/1003xxx/CVE-2019-1003040.json b/2019/1003xxx/CVE-2019-1003040.json index add29f375dc..b32fd142782 100644 --- a/2019/1003xxx/CVE-2019-1003040.json +++ b/2019/1003xxx/CVE-2019-1003040.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353" - }, { "refsource": "MLIST", "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1423", "url": "https://access.redhat.com/errata/RHSA-2019:1423" + }, + { + "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353" } ] } diff --git a/2019/1003xxx/CVE-2019-1003041.json b/2019/1003xxx/CVE-2019-1003041.json index 5569769e1f7..78ecde51cc2 100644 --- a/2019/1003xxx/CVE-2019-1003041.json +++ b/2019/1003xxx/CVE-2019-1003041.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353" - }, { "refsource": "MLIST", "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1423", "url": "https://access.redhat.com/errata/RHSA-2019:1423" + }, + { + "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1353" } ] } diff --git a/2019/1003xxx/CVE-2019-1003042.json b/2019/1003xxx/CVE-2019-1003042.json index 3878e4fe245..512fd257b79 100644 --- a/2019/1003xxx/CVE-2019-1003042.json +++ b/2019/1003xxx/CVE-2019-1003042.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361" - }, { "refsource": "MLIST", "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1423", "url": "https://access.redhat.com/errata/RHSA-2019:1423" + }, + { + "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-1361" } ] } diff --git a/2019/1003xxx/CVE-2019-1003043.json b/2019/1003xxx/CVE-2019-1003043.json index f9177f76803..a09d8a6d96d 100644 --- a/2019/1003xxx/CVE-2019-1003043.json +++ b/2019/1003xxx/CVE-2019-1003043.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976" - }, { "refsource": "MLIST", "name": "[oss-security] 20190328 Re: Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "107628", "url": "http://www.securityfocus.com/bid/107628" + }, + { + "url": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-03-25/#SECURITY-976" } ] } diff --git a/2019/10xxx/CVE-2019-10321.json b/2019/10xxx/CVE-2019-10321.json index 36a96222e25..08d6ae370fd 100644 --- a/2019/10xxx/CVE-2019-10321.json +++ b/2019/10xxx/CVE-2019-10321.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "MISC", "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)" } ] } diff --git a/2019/10xxx/CVE-2019-10322.json b/2019/10xxx/CVE-2019-10322.json index 95af68dd6f2..e736d5147fd 100644 --- a/2019/10xxx/CVE-2019-10322.json +++ b/2019/10xxx/CVE-2019-10322.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "MISC", "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)" } ] } diff --git a/2019/10xxx/CVE-2019-10323.json b/2019/10xxx/CVE-2019-10323.json index 130a69a513e..6f2904d3a8c 100644 --- a/2019/10xxx/CVE-2019-10323.json +++ b/2019/10xxx/CVE-2019-10323.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "MISC", "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)" } ] } diff --git a/2019/10xxx/CVE-2019-10324.json b/2019/10xxx/CVE-2019-10324.json index 014a39d7b47..4931abc5a20 100644 --- a/2019/10xxx/CVE-2019-10324.json +++ b/2019/10xxx/CVE-2019-10324.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108540", "url": "http://www.securityfocus.com/bid/108540" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1347" } ] } diff --git a/2019/10xxx/CVE-2019-10325.json b/2019/10xxx/CVE-2019-10325.json index 54b0d8611d7..16a4e860f49 100644 --- a/2019/10xxx/CVE-2019-10325.json +++ b/2019/10xxx/CVE-2019-10325.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108540", "url": "http://www.securityfocus.com/bid/108540" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1373" } ] } diff --git a/2019/10xxx/CVE-2019-10326.json b/2019/10xxx/CVE-2019-10326.json index 98f1df52c5d..c095e4ee6d8 100644 --- a/2019/10xxx/CVE-2019-10326.json +++ b/2019/10xxx/CVE-2019-10326.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108540", "url": "http://www.securityfocus.com/bid/108540" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1391" } ] } diff --git a/2019/10xxx/CVE-2019-10327.json b/2019/10xxx/CVE-2019-10327.json index a88fe63e1c4..d10612c4207 100644 --- a/2019/10xxx/CVE-2019-10327.json +++ b/2019/10xxx/CVE-2019-10327.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108540", "url": "http://www.securityfocus.com/bid/108540" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409" } ] } diff --git a/2019/10xxx/CVE-2019-10328.json b/2019/10xxx/CVE-2019-10328.json index 441134e738e..5a89220c20c 100644 --- a/2019/10xxx/CVE-2019-10328.json +++ b/2019/10xxx/CVE-2019-10328.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -76,6 +71,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1636", "url": "https://access.redhat.com/errata/RHSA-2019:1636" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921" } ] } diff --git a/2019/10xxx/CVE-2019-10329.json b/2019/10xxx/CVE-2019-10329.json index efe6886f414..ed8647ddb03 100644 --- a/2019/10xxx/CVE-2019-10329.json +++ b/2019/10xxx/CVE-2019-10329.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108540", "url": "http://www.securityfocus.com/bid/108540" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403" } ] } diff --git a/2019/10xxx/CVE-2019-10330.json b/2019/10xxx/CVE-2019-10330.json index 72e28883d1e..06d94cbe213 100644 --- a/2019/10xxx/CVE-2019-10330.json +++ b/2019/10xxx/CVE-2019-10330.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046" - }, { "refsource": "MLIST", "name": "[oss-security] 20190531 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108540", "url": "http://www.securityfocus.com/bid/108540" + }, + { + "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1046" } ] } diff --git a/2019/10xxx/CVE-2019-10331.json b/2019/10xxx/CVE-2019-10331.json index 0b4cfd0d08a..7a6d13d3690 100644 --- a/2019/10xxx/CVE-2019-10331.json +++ b/2019/10xxx/CVE-2019-10331.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)" } ] } diff --git a/2019/10xxx/CVE-2019-10332.json b/2019/10xxx/CVE-2019-10332.json index 701cb2adb2f..3a1e938284a 100644 --- a/2019/10xxx/CVE-2019-10332.json +++ b/2019/10xxx/CVE-2019-10332.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)" } ] } diff --git a/2019/10xxx/CVE-2019-10333.json b/2019/10xxx/CVE-2019-10333.json index 356a020a866..32ebe397b57 100644 --- a/2019/10xxx/CVE-2019-10333.json +++ b/2019/10xxx/CVE-2019-10333.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)" } ] } diff --git a/2019/10xxx/CVE-2019-10334.json b/2019/10xxx/CVE-2019-10334.json index 145a26ca4c1..3d07275cb8a 100644 --- a/2019/10xxx/CVE-2019-10334.json +++ b/2019/10xxx/CVE-2019-10334.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1411" } ] } diff --git a/2019/10xxx/CVE-2019-10335.json b/2019/10xxx/CVE-2019-10335.json index 6ed0efe9abc..7cbebd8bac5 100644 --- a/2019/10xxx/CVE-2019-10335.json +++ b/2019/10xxx/CVE-2019-10335.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1412" } ] } diff --git a/2019/10xxx/CVE-2019-10336.json b/2019/10xxx/CVE-2019-10336.json index 2bbc6d8c1c3..c34dffeb9b4 100644 --- a/2019/10xxx/CVE-2019-10336.json +++ b/2019/10xxx/CVE-2019-10336.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1420" } ] } diff --git a/2019/10xxx/CVE-2019-10337.json b/2019/10xxx/CVE-2019-10337.json index 29a15368ad0..18f3bc58460 100644 --- a/2019/10xxx/CVE-2019-10337.json +++ b/2019/10xxx/CVE-2019-10337.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -76,6 +71,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1851", "url": "https://access.redhat.com/errata/RHSA-2019:1851" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399" } ] } diff --git a/2019/10xxx/CVE-2019-10338.json b/2019/10xxx/CVE-2019-10338.json index 809272f85c5..b769bd7f1b5 100644 --- a/2019/10xxx/CVE-2019-10338.json +++ b/2019/10xxx/CVE-2019-10338.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379" } ] } diff --git a/2019/10xxx/CVE-2019-10339.json b/2019/10xxx/CVE-2019-10339.json index a00729b1639..0f3fff7de13 100644 --- a/2019/10xxx/CVE-2019-10339.json +++ b/2019/10xxx/CVE-2019-10339.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379" - }, { "refsource": "MLIST", "name": "[oss-security] 20190611 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "108747", "url": "http://www.securityfocus.com/bid/108747" + }, + { + "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1379" } ] } diff --git a/2019/10xxx/CVE-2019-10340.json b/2019/10xxx/CVE-2019-10340.json index 5468c62fe68..48338c3cd5d 100644 --- a/2019/10xxx/CVE-2019-10340.json +++ b/2019/10xxx/CVE-2019-10340.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "109156", "url": "http://www.securityfocus.com/bid/109156" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010" } ] } diff --git a/2019/10xxx/CVE-2019-10341.json b/2019/10xxx/CVE-2019-10341.json index d71d9dc0f08..b920aeeb5d2 100644 --- a/2019/10xxx/CVE-2019-10341.json +++ b/2019/10xxx/CVE-2019-10341.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "109156", "url": "http://www.securityfocus.com/bid/109156" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010" } ] } diff --git a/2019/10xxx/CVE-2019-10342.json b/2019/10xxx/CVE-2019-10342.json index 971f86ee122..1f6682ebaa4 100644 --- a/2019/10xxx/CVE-2019-10342.json +++ b/2019/10xxx/CVE-2019-10342.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "109156", "url": "http://www.securityfocus.com/bid/109156" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400" } ] } diff --git a/2019/10xxx/CVE-2019-10343.json b/2019/10xxx/CVE-2019-10343.json index 9cf2c3dc644..ad588468ebf 100644 --- a/2019/10xxx/CVE-2019-10343.json +++ b/2019/10xxx/CVE-2019-10343.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279" } ] } diff --git a/2019/10xxx/CVE-2019-10344.json b/2019/10xxx/CVE-2019-10344.json index 949f95a458a..e13dfb85fb1 100644 --- a/2019/10xxx/CVE-2019-10344.json +++ b/2019/10xxx/CVE-2019-10344.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290" } ] } diff --git a/2019/10xxx/CVE-2019-10345.json b/2019/10xxx/CVE-2019-10345.json index 2fa3f0faf4a..c0897e2b60b 100644 --- a/2019/10xxx/CVE-2019-10345.json +++ b/2019/10xxx/CVE-2019-10345.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303" } ] } diff --git a/2019/10xxx/CVE-2019-10346.json b/2019/10xxx/CVE-2019-10346.json index 1570fd9df4a..37c12c3c911 100644 --- a/2019/10xxx/CVE-2019-10346.json +++ b/2019/10xxx/CVE-2019-10346.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "109156", "url": "http://www.securityfocus.com/bid/109156" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419" } ] } diff --git a/2019/10xxx/CVE-2019-10347.json b/2019/10xxx/CVE-2019-10347.json index 3e1e0de9499..16a17984fb7 100644 --- a/2019/10xxx/CVE-2019-10347.json +++ b/2019/10xxx/CVE-2019-10347.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "BID", "name": "109156", "url": "http://www.securityfocus.com/bid/109156" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775" } ] } diff --git a/2019/10xxx/CVE-2019-10348.json b/2019/10xxx/CVE-2019-10348.json index 9ac6145001c..8d70ab7e888 100644 --- a/2019/10xxx/CVE-2019-10348.json +++ b/2019/10xxx/CVE-2019-10348.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-837/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-837/" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438" } ] } diff --git a/2019/10xxx/CVE-2019-10349.json b/2019/10xxx/CVE-2019-10349.json index 6848da3e8bc..94475a62ebf 100644 --- a/2019/10xxx/CVE-2019-10349.json +++ b/2019/10xxx/CVE-2019-10349.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "BID", "name": "109156", "url": "http://www.securityfocus.com/bid/109156" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177" } ] } diff --git a/2019/10xxx/CVE-2019-10350.json b/2019/10xxx/CVE-2019-10350.json index 5a12f40933d..3250c7c608a 100644 --- a/2019/10xxx/CVE-2019-10350.json +++ b/2019/10xxx/CVE-2019-10350.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-838/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-838/" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441" } ] } diff --git a/2019/10xxx/CVE-2019-10351.json b/2019/10xxx/CVE-2019-10351.json index 469e00c8393..8557f627535 100644 --- a/2019/10xxx/CVE-2019-10351.json +++ b/2019/10xxx/CVE-2019-10351.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437" - }, { "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", @@ -71,6 +66,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-836/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-836/" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437" } ] } diff --git a/2019/10xxx/CVE-2019-10352.json b/2019/10xxx/CVE-2019-10352.json index 4c80acdcae5..35c4e6986c7 100644 --- a/2019/10xxx/CVE-2019-10352.json +++ b/2019/10xxx/CVE-2019-10352.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424" - }, { "refsource": "MISC", "name": "https://www.tenable.com/security/research/tra-2019-35", @@ -81,6 +76,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2548", "url": "https://access.redhat.com/errata/RHSA-2019:2548" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-1424" } ] } diff --git a/2019/10xxx/CVE-2019-10353.json b/2019/10xxx/CVE-2019-10353.json index 3c8f7880de4..74b7b010931 100644 --- a/2019/10xxx/CVE-2019-10353.json +++ b/2019/10xxx/CVE-2019-10353.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626" - }, { "refsource": "MLIST", "name": "[oss-security] 20190717 Multiple vulnerabilities in Jenkins", @@ -76,6 +71,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2548", "url": "https://access.redhat.com/errata/RHSA-2019:2548" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626" } ] } diff --git a/2019/10xxx/CVE-2019-10354.json b/2019/10xxx/CVE-2019-10354.json index ae837805faa..0195cdad0d2 100644 --- a/2019/10xxx/CVE-2019-10354.json +++ b/2019/10xxx/CVE-2019-10354.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534" - }, { "refsource": "MLIST", "name": "[oss-security] 20190717 Multiple vulnerabilities in Jenkins", @@ -76,6 +71,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2548", "url": "https://access.redhat.com/errata/RHSA-2019:2548" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-17/#SECURITY-534" } ] } diff --git a/2019/10xxx/CVE-2019-10355.json b/2019/10xxx/CVE-2019-10355.json index 42c4406b9b3..6ff88eada8e 100644 --- a/2019/10xxx/CVE-2019-10355.json +++ b/2019/10xxx/CVE-2019-10355.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", @@ -76,6 +71,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2662", "url": "https://access.redhat.com/errata/RHSA-2019:2662" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)" } ] } diff --git a/2019/10xxx/CVE-2019-10356.json b/2019/10xxx/CVE-2019-10356.json index 2e4fe667798..9f91523d055 100644 --- a/2019/10xxx/CVE-2019-10356.json +++ b/2019/10xxx/CVE-2019-10356.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", @@ -76,6 +71,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2662", "url": "https://access.redhat.com/errata/RHSA-2019:2662" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)" } ] } diff --git a/2019/10xxx/CVE-2019-10357.json b/2019/10xxx/CVE-2019-10357.json index e7b41b82ebe..98b82438bd2 100644 --- a/2019/10xxx/CVE-2019-10357.json +++ b/2019/10xxx/CVE-2019-10357.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", @@ -76,6 +71,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2662", "url": "https://access.redhat.com/errata/RHSA-2019:2662" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422" } ] } diff --git a/2019/10xxx/CVE-2019-10358.json b/2019/10xxx/CVE-2019-10358.json index 674a5b5c248..f9550ce4880 100644 --- a/2019/10xxx/CVE-2019-10358.json +++ b/2019/10xxx/CVE-2019-10358.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713" } ] } diff --git a/2019/10xxx/CVE-2019-10359.json b/2019/10xxx/CVE-2019-10359.json index 8de2c9687c2..5bc376dffeb 100644 --- a/2019/10xxx/CVE-2019-10359.json +++ b/2019/10xxx/CVE-2019-10359.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098" } ] } diff --git a/2019/10xxx/CVE-2019-10360.json b/2019/10xxx/CVE-2019-10360.json index 7b61aadbf82..e5bc8d0f838 100644 --- a/2019/10xxx/CVE-2019-10360.json +++ b/2019/10xxx/CVE-2019-10360.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184" } ] } diff --git a/2019/10xxx/CVE-2019-10361.json b/2019/10xxx/CVE-2019-10361.json index 2135fb00f25..0da5161155a 100644 --- a/2019/10xxx/CVE-2019-10361.json +++ b/2019/10xxx/CVE-2019-10361.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-835/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-835/" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435" } ] } diff --git a/2019/10xxx/CVE-2019-10362.json b/2019/10xxx/CVE-2019-10362.json index ae4a81f1d6a..1f130c4111d 100644 --- a/2019/10xxx/CVE-2019-10362.json +++ b/2019/10xxx/CVE-2019-10362.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446" } ] } diff --git a/2019/10xxx/CVE-2019-10363.json b/2019/10xxx/CVE-2019-10363.json index ba40ce7975c..552f256ea90 100644 --- a/2019/10xxx/CVE-2019-10363.json +++ b/2019/10xxx/CVE-2019-10363.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458" } ] } diff --git a/2019/10xxx/CVE-2019-10364.json b/2019/10xxx/CVE-2019-10364.json index 091bd8d08b7..8be7270919d 100644 --- a/2019/10xxx/CVE-2019-10364.json +++ b/2019/10xxx/CVE-2019-10364.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673" } ] } diff --git a/2019/10xxx/CVE-2019-10365.json b/2019/10xxx/CVE-2019-10365.json index d7cf9df573e..aae7474277b 100644 --- a/2019/10xxx/CVE-2019-10365.json +++ b/2019/10xxx/CVE-2019-10365.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/31/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345" } ] } diff --git a/2019/10xxx/CVE-2019-10366.json b/2019/10xxx/CVE-2019-10366.json index 725d5bfcdd2..08fe5f6a196 100644 --- a/2019/10xxx/CVE-2019-10366.json +++ b/2019/10xxx/CVE-2019-10366.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429" - }, { "refsource": "MLIST", "name": "[oss-security] 20190731 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-833/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-833/" + }, + { + "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429" } ] } diff --git a/2019/10xxx/CVE-2019-10367.json b/2019/10xxx/CVE-2019-10367.json index 3c369b050bb..fdc65f97437 100644 --- a/2019/10xxx/CVE-2019-10367.json +++ b/2019/10xxx/CVE-2019-10367.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497" } ] } diff --git a/2019/10xxx/CVE-2019-10368.json b/2019/10xxx/CVE-2019-10368.json index fbefd64a57b..0e6099212b0 100644 --- a/2019/10xxx/CVE-2019-10368.json +++ b/2019/10xxx/CVE-2019-10368.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482" } ] } diff --git a/2019/10xxx/CVE-2019-10369.json b/2019/10xxx/CVE-2019-10369.json index 1b36a30b16b..61d9753c7e8 100644 --- a/2019/10xxx/CVE-2019-10369.json +++ b/2019/10xxx/CVE-2019-10369.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1482" } ] } diff --git a/2019/10xxx/CVE-2019-10370.json b/2019/10xxx/CVE-2019-10370.json index 4129b987a1c..8583e64f6a3 100644 --- a/2019/10xxx/CVE-2019-10370.json +++ b/2019/10xxx/CVE-2019-10370.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-157" } ] } diff --git a/2019/10xxx/CVE-2019-10371.json b/2019/10xxx/CVE-2019-10371.json index 61548312bfe..0fc5340d567 100644 --- a/2019/10xxx/CVE-2019-10371.json +++ b/2019/10xxx/CVE-2019-10371.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795" } ] } diff --git a/2019/10xxx/CVE-2019-10372.json b/2019/10xxx/CVE-2019-10372.json index 96f192b7f85..ba107283baf 100644 --- a/2019/10xxx/CVE-2019-10372.json +++ b/2019/10xxx/CVE-2019-10372.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796" } ] } diff --git a/2019/10xxx/CVE-2019-10373.json b/2019/10xxx/CVE-2019-10373.json index ab39b9dd056..61c5ed50cb9 100644 --- a/2019/10xxx/CVE-2019-10373.json +++ b/2019/10xxx/CVE-2019-10373.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-879" } ] } diff --git a/2019/10xxx/CVE-2019-10374.json b/2019/10xxx/CVE-2019-10374.json index d50a325e3b1..8d92fcaae1a 100644 --- a/2019/10xxx/CVE-2019-10374.json +++ b/2019/10xxx/CVE-2019-10374.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142" } ] } diff --git a/2019/10xxx/CVE-2019-10375.json b/2019/10xxx/CVE-2019-10375.json index 780ffc71d5c..503a7081b13 100644 --- a/2019/10xxx/CVE-2019-10375.json +++ b/2019/10xxx/CVE-2019-10375.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-569" } ] } diff --git a/2019/10xxx/CVE-2019-10376.json b/2019/10xxx/CVE-2019-10376.json index c3d1ef117c5..70061e9937e 100644 --- a/2019/10xxx/CVE-2019-10376.json +++ b/2019/10xxx/CVE-2019-10376.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751" } ] } diff --git a/2019/10xxx/CVE-2019-10377.json b/2019/10xxx/CVE-2019-10377.json index ee9d30a85c6..0b3928c7f37 100644 --- a/2019/10xxx/CVE-2019-10377.json +++ b/2019/10xxx/CVE-2019-10377.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1099" } ] } diff --git a/2019/10xxx/CVE-2019-10378.json b/2019/10xxx/CVE-2019-10378.json index 288e8c0969c..3e7689c8afc 100644 --- a/2019/10xxx/CVE-2019-10378.json +++ b/2019/10xxx/CVE-2019-10378.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-839/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-839/" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1428" } ] } diff --git a/2019/10xxx/CVE-2019-10379.json b/2019/10xxx/CVE-2019-10379.json index bfe151424a1..21db1de4708 100644 --- a/2019/10xxx/CVE-2019-10379.json +++ b/2019/10xxx/CVE-2019-10379.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-591" } ] } diff --git a/2019/10xxx/CVE-2019-10380.json b/2019/10xxx/CVE-2019-10380.json index 803fde559a6..8b8be7a80df 100644 --- a/2019/10xxx/CVE-2019-10380.json +++ b/2019/10xxx/CVE-2019-10380.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-922" } ] } diff --git a/2019/10xxx/CVE-2019-10381.json b/2019/10xxx/CVE-2019-10381.json index f53dcaecbb0..c35419f13e3 100644 --- a/2019/10xxx/CVE-2019-10381.json +++ b/2019/10xxx/CVE-2019-10381.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-931" } ] } diff --git a/2019/10xxx/CVE-2019-10382.json b/2019/10xxx/CVE-2019-10382.json index cee23998854..ddc08d19063 100644 --- a/2019/10xxx/CVE-2019-10382.json +++ b/2019/10xxx/CVE-2019-10382.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1376" } ] } diff --git a/2019/10xxx/CVE-2019-10383.json b/2019/10xxx/CVE-2019-10383.json index 6deef05807c..5218fd714c6 100644 --- a/2019/10xxx/CVE-2019-10383.json +++ b/2019/10xxx/CVE-2019-10383.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453" - }, { "refsource": "MLIST", "name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/28/4" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1453" } ] } diff --git a/2019/10xxx/CVE-2019-10384.json b/2019/10xxx/CVE-2019-10384.json index e1fdf6f2b2d..52ebbe4b62b 100644 --- a/2019/10xxx/CVE-2019-10384.json +++ b/2019/10xxx/CVE-2019-10384.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491" - }, { "refsource": "MLIST", "name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/28/4" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1491" } ] } diff --git a/2019/10xxx/CVE-2019-10385.json b/2019/10xxx/CVE-2019-10385.json index 8ab0732a7c8..391915923ee 100644 --- a/2019/10xxx/CVE-2019-10385.json +++ b/2019/10xxx/CVE-2019-10385.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", @@ -66,6 +61,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-834/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-834/" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1430" } ] } diff --git a/2019/10xxx/CVE-2019-10386.json b/2019/10xxx/CVE-2019-10386.json index 8c6b5bd90a0..f1ebb81ad0c 100644 --- a/2019/10xxx/CVE-2019-10386.json +++ b/2019/10xxx/CVE-2019-10386.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008" } ] } diff --git a/2019/10xxx/CVE-2019-10387.json b/2019/10xxx/CVE-2019-10387.json index 8f425247c6e..a65a3b54f99 100644 --- a/2019/10xxx/CVE-2019-10387.json +++ b/2019/10xxx/CVE-2019-10387.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1008" } ] } diff --git a/2019/10xxx/CVE-2019-10388.json b/2019/10xxx/CVE-2019-10388.json index 9592b73f0c6..828562a9357 100644 --- a/2019/10xxx/CVE-2019-10388.json +++ b/2019/10xxx/CVE-2019-10388.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053" } ] } diff --git a/2019/10xxx/CVE-2019-10389.json b/2019/10xxx/CVE-2019-10389.json index ad1cf5dad65..1cc0ab42936 100644 --- a/2019/10xxx/CVE-2019-10389.json +++ b/2019/10xxx/CVE-2019-10389.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053" - }, { "refsource": "MLIST", "name": "[oss-security] 20190807 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/07/1" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1053" } ] } diff --git a/2019/10xxx/CVE-2019-10390.json b/2019/10xxx/CVE-2019-10390.json index d9bce2077dd..6fc05b6dafe 100644 --- a/2019/10xxx/CVE-2019-10390.json +++ b/2019/10xxx/CVE-2019-10390.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294" - }, { "refsource": "MLIST", "name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/28/4" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1294" } ] } diff --git a/2019/10xxx/CVE-2019-10391.json b/2019/10xxx/CVE-2019-10391.json index c409078846b..ead5dc22d38 100644 --- a/2019/10xxx/CVE-2019-10391.json +++ b/2019/10xxx/CVE-2019-10391.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512" - }, { "refsource": "MLIST", "name": "[oss-security] 20190828 Multiple vulnerabilities in Jenkins and Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/08/28/4" + }, + { + "url": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-08-28/#SECURITY-1512" } ] } diff --git a/2019/10xxx/CVE-2019-10392.json b/2019/10xxx/CVE-2019-10392.json index 80cfbd30a38..e7e70f6730f 100644 --- a/2019/10xxx/CVE-2019-10392.json +++ b/2019/10xxx/CVE-2019-10392.json @@ -54,7 +54,7 @@ "reference_data": [ { "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534", - "refsource": "CONFIRM", + "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1534" }, { diff --git a/2019/10xxx/CVE-2019-10393.json b/2019/10xxx/CVE-2019-10393.json index 2aa514b20b0..766144b1ad4 100644 --- a/2019/10xxx/CVE-2019-10393.json +++ b/2019/10xxx/CVE-2019-10393.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } diff --git a/2019/10xxx/CVE-2019-10394.json b/2019/10xxx/CVE-2019-10394.json index 07f797f5db3..77019894075 100644 --- a/2019/10xxx/CVE-2019-10394.json +++ b/2019/10xxx/CVE-2019-10394.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } diff --git a/2019/10xxx/CVE-2019-10395.json b/2019/10xxx/CVE-2019-10395.json index 3d5f5f5a699..21c08189ac4 100644 --- a/2019/10xxx/CVE-2019-10395.json +++ b/2019/10xxx/CVE-2019-10395.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1476" } ] } diff --git a/2019/10xxx/CVE-2019-10396.json b/2019/10xxx/CVE-2019-10396.json index a828891e185..3742e384560 100644 --- a/2019/10xxx/CVE-2019-10396.json +++ b/2019/10xxx/CVE-2019-10396.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489" } ] } diff --git a/2019/10xxx/CVE-2019-10397.json b/2019/10xxx/CVE-2019-10397.json index af68bee194e..a1b66d7cbac 100644 --- a/2019/10xxx/CVE-2019-10397.json +++ b/2019/10xxx/CVE-2019-10397.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURTY-1509" } ] } diff --git a/2019/10xxx/CVE-2019-10398.json b/2019/10xxx/CVE-2019-10398.json index 36930dd37e1..ef8ed44a524 100644 --- a/2019/10xxx/CVE-2019-10398.json +++ b/2019/10xxx/CVE-2019-10398.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545" } ] } diff --git a/2019/10xxx/CVE-2019-10399.json b/2019/10xxx/CVE-2019-10399.json index be71f69b505..07d477b04ca 100644 --- a/2019/10xxx/CVE-2019-10399.json +++ b/2019/10xxx/CVE-2019-10399.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } diff --git a/2019/10xxx/CVE-2019-10400.json b/2019/10xxx/CVE-2019-10400.json index c58c5a0040c..557c4d1a8c0 100644 --- a/2019/10xxx/CVE-2019-10400.json +++ b/2019/10xxx/CVE-2019-10400.json @@ -52,15 +52,15 @@ }, "references": { "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", - "refsource": "CONFIRM", - "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" - }, { "refsource": "MLIST", "name": "[oss-security] 20190912 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/09/12/2" + }, + { + "url": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538", + "refsource": "CONFIRM", + "name": "https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1538" } ] } diff --git a/2019/14xxx/CVE-2019-14994.json b/2019/14xxx/CVE-2019-14994.json index f68bd50b41c..f173f6d55c5 100644 --- a/2019/14xxx/CVE-2019-14994.json +++ b/2019/14xxx/CVE-2019-14994.json @@ -1,146 +1,103 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2018-09-18T00:00:00", - "ID": "CVE-2019-14994", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Jira Service Desk Server", - "version": { - "version_data": [ - { - "version_value": "3.9.16", - "version_affected": "<" - }, - { - "version_value": "3.10.0", - "version_affected": ">=" - }, - { - "version_value": "3.16.8", - "version_affected": "<" - }, - { - "version_value": "4.0.0", - "version_affected": ">=" - }, - { - "version_value": "4.1.3", - "version_affected": "<" - }, - { - "version_value": "4.2.0", - "version_affected": ">=" - }, - { - "version_value": "4.2.5", - "version_affected": "<" - }, - { - "version_value": "4.3.0", - "version_affected": ">=" - }, - { - "version_value": "4.3.4", - "version_affected": "<" - }, - { - "version_value": "4.4.0", - "version_affected": "=" - } - ] - } - }, - { - "product_name": "Jira Service Desk Data Center", - "version": { - "version_data": [ - { - "version_value": "3.9.16", - "version_affected": "<" - }, - { - "version_value": "3.10.0", - "version_affected": ">=" - }, - { - "version_value": "3.16.8", - "version_affected": "<" - }, - { - "version_value": "4.0.0", - "version_affected": ">=" - }, - { - "version_value": "4.1.3", - "version_affected": "<" - }, - { - "version_value": "4.2.0", - "version_affected": ">=" - }, - { - "version_value": "4.2.5", - "version_affected": "<" - }, - { - "version_value": "4.3.0", - "version_affected": ">=" - }, - { - "version_value": "4.3.4", - "version_affected": "<" - }, - { - "version_value": "4.4.0", - "version_affected": "=" - } - ] - } - } - ] - }, - "vendor_name": "Atlassian" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before version 3.9.16, from version 3.10.0 before version 3.16.8, from version 4.0.0 before version 4.1.3, from version 4.2.0 before version 4.2.5, from version 4.3.0 before version 4.3.4, and version 4.4.0 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via a path traversal vulnerability. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Path Traversal" - } + "CVE_data_meta": { + "ASSIGNER": "security@atlassian.com", + "DATE_PUBLIC": "2018-09-18T00:00:00", + "ID": "CVE-2019-14994", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Atlassian", + "product": { + "product_data": [ + { + "product_name": "Jira Service Desk Server", + "version": { + "version_data": [ + { + "version_value": "before version 3.9.16" + }, + { + "version_value": "from version 3.10.0 before version 3.16.8" + }, + { + "version_value": "from version 4.0.0 before version 4.1.3" + }, + { + "version_value": "from version 4.2.0 before version 4.2.5" + }, + { + "version_value": "from version 4.3.0 before version 4.3.4" + }, + { + "version_value": "version 4.4.0" + } + ] + } + }, + { + "product_name": "Jira Service Desk Data Center", + "version": { + "version_data": [ + { + "version_value": "before version 3.9.16" + }, + { + "version_value": "from version 3.10.0 before version 3.16.8" + }, + { + "version_value": "from version 4.0.0 before version 4.1.3" + }, + { + "version_value": "from version 4.2.0 before version 4.2.5" + }, + { + "version_value": "from version 4.3.0 before version 4.3.4" + }, + { + "version_value": "version 4.4.0" + } + ] + } + } + ] + } + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://confluence.atlassian.com/jira/jira-service-desk-security-advisory-2019-09-11-976171274.html", - "url": "https://jira.atlassian.com/browse/JSDSERVER-6517" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Customer Context Filter in Atlassian Jira Service Desk Server and Jira Service Desk Data Center before version 3.9.16, from version 3.10.0 before version 3.16.8, from version 4.0.0 before version 4.1.3, from version 4.2.0 before version 4.2.5, from version 4.3.0 before version 4.3.4, and version 4.4.0 allows remote attackers with portal access to view arbitrary issues in Jira Service Desk projects via a path traversal vulnerability. Note that when the 'Anyone can email the service desk or raise a request in the portal' setting is enabled, an attacker can grant themselves portal access, allowing them to exploit the vulnerability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Path Traversal" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.atlassian.com/browse/JSDSERVER-6517", + "refsource": "MISC", + "name": "https://jira.atlassian.com/browse/JSDSERVER-6517" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15000.json b/2019/15xxx/CVE-2019-15000.json index 47b9de1ce31..8dd34578cb1 100644 --- a/2019/15xxx/CVE-2019-15000.json +++ b/2019/15xxx/CVE-2019-15000.json @@ -1,169 +1,109 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2019-09-18T00:00:00", - "ID": "CVE-2019-15000", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Bitbucket Server", - "version": { - "version_data": [ - { - "version_value": "5.16.10", - "version_affected": "<" - }, - { - "version_value": "6.0.0", - "version_affected": ">=" - }, - { - "version_value": "6.0.10", - "version_affected": "<" - }, - { - "version_value": "6.1.0", - "version_affected": ">=" - }, - { - "version_value": "6.1.8", - "version_affected": "<" - }, - { - "version_value": "6.2.0", - "version_affected": ">=" - }, - { - "version_value": "6.2.6", - "version_affected": "<" - }, - { - "version_value": "6.3.0", - "version_affected": ">=" - }, - { - "version_value": "6.3.5", - "version_affected": "<" - }, - { - "version_value": "6.4.0", - "version_affected": ">=" - }, - { - "version_value": "6.4.3", - "version_affected": "<" - }, - { - "version_value": "6.5.0", - "version_affected": ">=" - }, - { - "version_value": "6.5.2", - "version_affected": "<" - } - ] - } - }, - { - "product_name": "Bitbucket Data Center", - "version": { - "version_data": [ - { - "version_value": "5.16.10", - "version_affected": "<" - }, - { - "version_value": "6.0.0", - "version_affected": ">=" - }, - { - "version_value": "6.0.10", - "version_affected": "<" - }, - { - "version_value": "6.1.0", - "version_affected": ">=" - }, - { - "version_value": "6.1.8", - "version_affected": "<" - }, - { - "version_value": "6.2.0", - "version_affected": ">=" - }, - { - "version_value": "6.2.6", - "version_affected": "<" - }, - { - "version_value": "6.3.0", - "version_affected": ">=" - }, - { - "version_value": "6.3.5", - "version_affected": "<" - }, - { - "version_value": "6.4.0", - "version_affected": ">=" - }, - { - "version_value": "6.4.3", - "version_affected": "<" - }, - { - "version_value": "6.5.0", - "version_affected": ">=" - }, - { - "version_value": "6.5.2", - "version_affected": "<" - } - ] - } - } - ] - }, - "vendor_name": "Atlassian" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Argument Injection" - } + "CVE_data_meta": { + "ASSIGNER": "security@atlassian.com", + "DATE_PUBLIC": "2019-09-18T00:00:00", + "ID": "CVE-2019-15000", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Atlassian", + "product": { + "product_data": [ + { + "product_name": "Bitbucket Server", + "version": { + "version_data": [ + { + "version_value": "before 5.16.10" + }, + { + "version_value": "from 6.0.0 before 6.0.10" + }, + { + "version_value": "from 6.1.0 before 6.1.8" + }, + { + "version_value": "from 6.2.0 before 6.2.6" + }, + { + "version_value": "from 6.3.0 before 6.3.5" + }, + { + "version_value": "from 6.4.0 before 6.4.3" + }, + { + "version_value": "from 6.5.0 before 6.5.2" + } + ] + } + }, + { + "product_name": "Bitbucket Data Center", + "version": { + "version_data": [ + { + "version_value": "before 5.16.10" + }, + { + "version_value": "from 6.0.0 before 6.0.10" + }, + { + "version_value": "from 6.1.0 before 6.1.8" + }, + { + "version_value": "from 6.2.0 before 6.2.6" + }, + { + "version_value": "from 6.3.0 before 6.3.5" + }, + { + "version_value": "from 6.4.0 before 6.4.3" + }, + { + "version_value": "from 6.5.0 before 6.5.2" + } + ] + } + } + ] + } + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://jira.atlassian.com/browse/BSERV-11947" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Argument Injection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.atlassian.com/browse/BSERV-11947", + "refsource": "MISC", + "name": "https://jira.atlassian.com/browse/BSERV-11947" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15001.json b/2019/15xxx/CVE-2019-15001.json index 7f9dbf26dda..fa6a1aad598 100644 --- a/2019/15xxx/CVE-2019-15001.json +++ b/2019/15xxx/CVE-2019-15001.json @@ -9,6 +9,7 @@ "vendor": { "vendor_data": [ { + "vendor_name": "Atlassian", "product": { "product_data": [ { @@ -16,52 +17,22 @@ "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "7.0.10" + "version_value": "from version with 7.0.10 before 7.6.16" }, { - "version_affected": "<", - "version_value": "7.6.16" + "version_value": "from 7.7.0 before 7.13.8" }, { - "version_affected": ">=", - "version_value": "7.7.0" + "version_value": "from 8.1.0 before 8.1.3" }, { - "version_affected": "<", - "version_value": "7.13.8" + "version_value": "from 8.2.0 before 8.2.5" }, { - "version_affected": ">=", - "version_value": "8.1.0" + "version_value": "from 8.3.0 before 8.3.4" }, { - "version_affected": "<", - "version_value": "8.1.3" - }, - { - "version_affected": ">=", - "version_value": "8.2.0" - }, - { - "version_affected": "<", - "version_value": "8.2.5" - }, - { - "version_affected": ">=", - "version_value": "8.3.0" - }, - { - "version_affected": "<", - "version_value": "8.3.4" - }, - { - "version_affected": ">=", - "version_value": "8.4.0" - }, - { - "version_affected": "<", - "version_value": "8.4.1" + "version_value": "from 8.4.0 before 8.4.1" } ] } @@ -71,59 +42,28 @@ "version": { "version_data": [ { - "version_affected": ">=", - "version_value": "7.0.10" + "version_value": "from version with 7.0.10 before 7.6.16" }, { - "version_affected": "<", - "version_value": "7.6.16" + "version_value": "from 7.7.0 before 7.13.8" }, { - "version_affected": ">=", - "version_value": "7.7.0" + "version_value": "from 8.1.0 before 8.1.3" }, { - "version_affected": "<", - "version_value": "7.13.8" + "version_value": "from 8.2.0 before 8.2.5" }, { - "version_affected": ">=", - "version_value": "8.1.0" + "version_value": "from 8.3.0 before 8.3.4" }, { - "version_affected": "<", - "version_value": "8.1.3" - }, - { - "version_affected": ">=", - "version_value": "8.2.0" - }, - { - "version_affected": "<", - "version_value": "8.2.5" - }, - { - "version_affected": ">=", - "version_value": "8.3.0" - }, - { - "version_affected": "<", - "version_value": "8.3.4" - }, - { - "version_affected": ">=", - "version_value": "8.4.0" - }, - { - "version_affected": "<", - "version_value": "8.4.1" + "version_value": "from 8.4.0 before 8.4.1" } ] } } ] - }, - "vendor_name": "Atlassian" + } } ] } @@ -154,8 +94,10 @@ "references": { "reference_data": [ { - "url": "https://jira.atlassian.com/browse/JRASERVER-69933" + "url": "https://jira.atlassian.com/browse/JRASERVER-69933", + "refsource": "MISC", + "name": "https://jira.atlassian.com/browse/JRASERVER-69933" } ] } -} +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16398.json b/2019/16xxx/CVE-2019-16398.json new file mode 100644 index 00000000000..cbc96906051 --- /dev/null +++ b/2019/16xxx/CVE-2019-16398.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16398", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On Keeper K5 20.1.0.25 and 20.1.0.63 devices, remote code execution can occur by inserting an SD card containing a file named zskj_script_run.sh that executes a reverse shell." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://gitlab.com/crypt0crc/cve-2019-16398", + "url": "https://gitlab.com/crypt0crc/cve-2019-16398" + } + ] + } +} \ No newline at end of file