From 30c14d6a29512fe55e5e11c6b5e4d8df449557bd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 1 Oct 2019 13:00:56 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/15xxx/CVE-2019-15940.json | 67 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16869.json | 5 +++ 2 files changed, 72 insertions(+) create mode 100644 2019/15xxx/CVE-2019-15940.json diff --git a/2019/15xxx/CVE-2019-15940.json b/2019/15xxx/CVE-2019-15940.json new file mode 100644 index 00000000000..9f499ba8404 --- /dev/null +++ b/2019/15xxx/CVE-2019-15940.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15940", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Victure PC530 devices allow unauthenticated TELNET access as root." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.govicture.com/pc530", + "refsource": "MISC", + "name": "https://www.govicture.com/pc530" + }, + { + "refsource": "MISC", + "name": "https://blog.avira.com/victure-pc530-home-insecurity-you-can-install-yourself/", + "url": "https://blog.avira.com/victure-pc530-home-insecurity-you-can-install-yourself/" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16869.json b/2019/16xxx/CVE-2019-16869.json index 97c2487215c..e29d43b5864 100644 --- a/2019/16xxx/CVE-2019-16869.json +++ b/2019/16xxx/CVE-2019-16869.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[zookeeper-issues] 20190930 [jira] [Commented] (ZOOKEEPER-3563) dependency check failing on 3.4 and 3.5 branches - CVE-2019-16869 on Netty", "url": "https://lists.apache.org/thread.html/d3eb0dbea75ef5c400bd49dfa1901ad50be606cca3cb29e0d01b6a54@%3Cissues.zookeeper.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-dev] 20191001 Re: [VOTE] Apache ZooKeeper release 3.5.6 candidate 2", + "url": "https://lists.apache.org/thread.html/3e6d7aae1cca10257e3caf2d69b22f74c875f12a1314155af422569d@%3Cdev.zookeeper.apache.org%3E" } ] }