diff --git a/2018/1xxx/CVE-2018-1847.json b/2018/1xxx/CVE-2018-1847.json index 689f7a253c8..30be75e9faa 100644 --- a/2018/1xxx/CVE-2018-1847.json +++ b/2018/1xxx/CVE-2018-1847.json @@ -1,177 +1,177 @@ { - "impact" : { - "cvssv3" : { - "TM" : { - "RC" : "C", - "E" : "U", - "RL" : "O" - }, - "BM" : { - "AC" : "L", - "AV" : "N", - "SCORE" : "5.000", - "I" : "N", - "PR" : "L", - "S" : "C", - "UI" : "N", - "A" : "N", - "C" : "L" - } - } - }, - "description" : { - "description_data" : [ - { - "value" : "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946.", - "lang" : "eng" - } - ] - }, - "data_type" : "CVE", - "references" : { - "reference_data" : [ - { - "name" : "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac", - "url" : "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac", - "title" : "IBM Security Bulletin 958753 (Financial Transaction Manager)", - "refsource" : "CONFIRM" - }, - { - "refsource" : "XF", - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946", - "name" : "ibm-ftm-cve20181847-info-disc (150946)" - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "Obtain Information" - } - ] - } - ] - }, - "CVE_data_meta" : { - "ID" : "CVE-2018-1847", - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "DATE_PUBLIC" : "2019-07-11T00:00:00" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "Financial Transaction Manager", - "version" : { - "version_data" : [ - { - "version_value" : "2.1" - }, - { - "version_value" : "2.0" - }, - { - "version_value" : "2.1.1.2" - }, - { - "version_value" : "3.0.0.0" - }, - { - "version_value" : "3.0.0.1" - }, - { - "version_value" : "3.0.0.2" - }, - { - "version_value" : "2.1.1.0" - }, - { - "version_value" : "3.0.0.3" - }, - { - "version_value" : "3.0.0.4" - }, - { - "version_value" : "3.0.0.5" - }, - { - "version_value" : "3.0.0.6" - }, - { - "version_value" : "3.0.0.7" - }, - { - "version_value" : "3.0" - }, - { - "version_value" : "3.0.0.8" - }, - { - "version_value" : "2.1.1.1" - }, - { - "version_value" : "2.1.1.3" - }, - { - "version_value" : "2.1.1.4" - }, - { - "version_value" : "2.1.1" - }, - { - "version_value" : "2.0.0.0" - }, - { - "version_value" : "2.0.0.1" - }, - { - "version_value" : "2.0.0.2" - }, - { - "version_value" : "2.0.0.3" - }, - { - "version_value" : "2.0.0.4" - }, - { - "version_value" : "2.0.0.5" - }, - { - "version_value" : "2.1.0" - }, - { - "version_value" : "2.1.0.0" - }, - { - "version_value" : "2.1.0.1" - }, - { - "version_value" : "2.1.0.2" - }, - { - "version_value" : "2.1.0.3" - }, - { - "version_value" : "2.1.0.4" - } - ] - } - } - ] - }, - "vendor_name" : "IBM" + "impact": { + "cvssv3": { + "TM": { + "RC": "C", + "E": "U", + "RL": "O" + }, + "BM": { + "AC": "L", + "AV": "N", + "SCORE": "5.000", + "I": "N", + "PR": "L", + "S": "C", + "UI": "N", + "A": "N", + "C": "L" } - ] - } - }, - "data_format" : "MITRE", - "data_version" : "4.0" -} + } + }, + "description": { + "description_data": [ + { + "value": "IBM Financial Transaction Manager (FTM) for Multi-Platform (MP) v2.0.0.0 through 2.0.0.5, v2.1.0.0 through 2.1.0.4, v2.1.1.0 through 2.1.1.4, and v3.0.0.0 through 3.0.0.8 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 150946.", + "lang": "eng" + } + ] + }, + "data_type": "CVE", + "references": { + "reference_data": [ + { + "name": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac", + "url": "https://www.ibm.com/support/pages/security-bulletin-path-traversal-exposure-saveexport-function-ftm-oac", + "title": "IBM Security Bulletin 958753 (Financial Transaction Manager)", + "refsource": "CONFIRM" + }, + { + "refsource": "XF", + "title": "X-Force Vulnerability Report", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/150946", + "name": "ibm-ftm-cve20181847-info-disc (150946)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Obtain Information" + } + ] + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2018-1847", + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC", + "DATE_PUBLIC": "2019-07-11T00:00:00" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Financial Transaction Manager", + "version": { + "version_data": [ + { + "version_value": "2.1" + }, + { + "version_value": "2.0" + }, + { + "version_value": "2.1.1.2" + }, + { + "version_value": "3.0.0.0" + }, + { + "version_value": "3.0.0.1" + }, + { + "version_value": "3.0.0.2" + }, + { + "version_value": "2.1.1.0" + }, + { + "version_value": "3.0.0.3" + }, + { + "version_value": "3.0.0.4" + }, + { + "version_value": "3.0.0.5" + }, + { + "version_value": "3.0.0.6" + }, + { + "version_value": "3.0.0.7" + }, + { + "version_value": "3.0" + }, + { + "version_value": "3.0.0.8" + }, + { + "version_value": "2.1.1.1" + }, + { + "version_value": "2.1.1.3" + }, + { + "version_value": "2.1.1.4" + }, + { + "version_value": "2.1.1" + }, + { + "version_value": "2.0.0.0" + }, + { + "version_value": "2.0.0.1" + }, + { + "version_value": "2.0.0.2" + }, + { + "version_value": "2.0.0.3" + }, + { + "version_value": "2.0.0.4" + }, + { + "version_value": "2.0.0.5" + }, + { + "version_value": "2.1.0" + }, + { + "version_value": "2.1.0.0" + }, + { + "version_value": "2.1.0.1" + }, + { + "version_value": "2.1.0.2" + }, + { + "version_value": "2.1.0.3" + }, + { + "version_value": "2.1.0.4" + } + ] + } + } + ] + }, + "vendor_name": "IBM" + } + ] + } + }, + "data_format": "MITRE", + "data_version": "4.0" +} \ No newline at end of file diff --git a/2019/11xxx/CVE-2019-11552.json b/2019/11xxx/CVE-2019-11552.json index fbdd2d6d237..f4fa9e84194 100644 --- a/2019/11xxx/CVE-2019-11552.json +++ b/2019/11xxx/CVE-2019-11552.json @@ -59,8 +59,8 @@ }, { "refsource": "CONFIRM", - "name": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Untrusted_data_is_executed_as_System_via_a_PAC_file_read_by_CrashPlanService.exe", - "url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Untrusted_data_is_executed_as_System_via_a_PAC_file_read_by_CrashPlanService.exe" + "name": "https://code42.com/r/support/CVE-2019-11552", + "url": "https://code42.com/r/support/CVE-2019-11552" } ] } diff --git a/2019/11xxx/CVE-2019-11553.json b/2019/11xxx/CVE-2019-11553.json index af5fcad08fc..9aac222462f 100644 --- a/2019/11xxx/CVE-2019-11553.json +++ b/2019/11xxx/CVE-2019-11553.json @@ -54,8 +54,8 @@ "reference_data": [ { "refsource": "CONFIRM", - "name": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Privilege_Escalation_in_LoginToken_API", - "url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Privilege_Escalation_in_LoginToken_API" + "name": "https://code42.com/r/support/CVE-2019-11553", + "url": "https://code42.com/r/support/CVE-2019-11553" } ] } diff --git a/2019/14xxx/CVE-2019-14252.json b/2019/14xxx/CVE-2019-14252.json new file mode 100644 index 00000000000..42e14f6f9b1 --- /dev/null +++ b/2019/14xxx/CVE-2019-14252.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14252", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the secure portal in Publisure 2.1.2. Once successfully authenticated as an administrator, one is able to inject arbitrary PHP code by using the adminCons.php form. The code is then stored in the E:\\PUBLISURE\\webservice\\webpages\\AdminDir\\Templates\\ folder even if removed from the adminCons.php view (i.e., the rogue PHP file can be hidden)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt", + "url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14253.json b/2019/14xxx/CVE-2019-14253.json new file mode 100644 index 00000000000..3b889add661 --- /dev/null +++ b/2019/14xxx/CVE-2019-14253.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14253", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in servletcontroller in the secure portal in Publisure 2.1.2. One can bypass authentication and perform a query on PHP forms within the /AdminDir folder that should be restricted." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt", + "url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14254.json b/2019/14xxx/CVE-2019-14254.json new file mode 100644 index 00000000000..4ff2c27c05c --- /dev/null +++ b/2019/14xxx/CVE-2019-14254.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14254", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the secure portal in Publisure 2.1.2. Because SQL queries are not well sanitized, there are multiple SQL injections in userAccFunctions.php functions. Using this, an attacker can access passwords and/or grant access to the user account \"user\" in order to become \"Administrator\" (for example)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt", + "url": "https://github.com/kmkz/exploit/blob/master/PUBLISURE-EXPLOIT-CHAIN-ADVISORY.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16275.json b/2019/16xxx/CVE-2019-16275.json index 417a72a31f8..556d15b1deb 100644 --- a/2019/16xxx/CVE-2019-16275.json +++ b/2019/16xxx/CVE-2019-16275.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update", "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4136-1", + "url": "https://usn.ubuntu.com/4136-1/" } ] }