From 36a8390b2eb985ddc904952c64a986b98e5bb312 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 18 Dec 2019 21:01:07 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/11xxx/CVE-2019-11996.json | 57 +++----------------- 2019/15xxx/CVE-2019-15575.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15576.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15577.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15580.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15589.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15591.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15596.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15597.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15598.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15599.json | 62 ++++++++++++++++++++++ 2019/15xxx/CVE-2019-15600.json | 62 ++++++++++++++++++++++ 2019/18xxx/CVE-2019-18571.json | 43 +++++++-------- 2019/18xxx/CVE-2019-18572.json | 43 +++++++-------- 2019/18xxx/CVE-2019-18573.json | 43 +++++++-------- 2019/18xxx/CVE-2019-18994.json | 96 ++++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18995.json | 95 +++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18996.json | 95 +++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18997.json | 95 +++++++++++++++++++++++++++++++++ 2019/19xxx/CVE-2019-19724.json | 56 +++++++++++++++++--- 2019/1xxx/CVE-2019-1387.json | 88 ++++++++++++++++++++++++++++--- 2019/5xxx/CVE-2019-5073.json | 71 ++++++++++++++++++++++--- 2019/5xxx/CVE-2019-5075.json | 71 ++++++++++++++++++++++--- 2019/5xxx/CVE-2019-5078.json | 71 ++++++++++++++++++++++--- 2019/5xxx/CVE-2019-5079.json | 71 ++++++++++++++++++++++--- 2019/5xxx/CVE-2019-5080.json | 71 ++++++++++++++++++++++--- 2019/5xxx/CVE-2019-5469.json | 63 +++++++++++++++++++--- 2019/5xxx/CVE-2019-5486.json | 58 +++++++++++++++++--- 2019/5xxx/CVE-2019-5487.json | 58 +++++++++++++++++--- 29 files changed, 1746 insertions(+), 181 deletions(-) create mode 100644 2019/15xxx/CVE-2019-15575.json create mode 100644 2019/15xxx/CVE-2019-15576.json create mode 100644 2019/15xxx/CVE-2019-15577.json create mode 100644 2019/15xxx/CVE-2019-15580.json create mode 100644 2019/15xxx/CVE-2019-15589.json create mode 100644 2019/15xxx/CVE-2019-15591.json create mode 100644 2019/15xxx/CVE-2019-15596.json create mode 100644 2019/15xxx/CVE-2019-15597.json create mode 100644 2019/15xxx/CVE-2019-15598.json create mode 100644 2019/15xxx/CVE-2019-15599.json create mode 100644 2019/15xxx/CVE-2019-15600.json create mode 100644 2019/18xxx/CVE-2019-18994.json create mode 100644 2019/18xxx/CVE-2019-18995.json create mode 100644 2019/18xxx/CVE-2019-18996.json create mode 100644 2019/18xxx/CVE-2019-18997.json diff --git a/2019/11xxx/CVE-2019-11996.json b/2019/11xxx/CVE-2019-11996.json index 757039b95f3..05bb327bb63 100644 --- a/2019/11xxx/CVE-2019-11996.json +++ b/2019/11xxx/CVE-2019-11996.json @@ -11,62 +11,21 @@ "vendor": { "vendor_data": [ { - "vendor_name": "HPE", + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "Nimble Storage Hybrid Flash Arrays", + "product_name": "HPE Nimble Storage Hybrid Flash Arrays; Nimble Storage All Flash Arrays; Nimble Storage Secondary Flash Arrays", "version": { "version_data": [ { - "version_value": "5.1.2.0 and older" + "version_value": "5.1.2.0 and older, 5.0.7.0 and older, 4.5.4.0 and older, 3.9.1.0 and older" }, { - "version_value": "5.0.7.0 and older" + "version_value": "5.1.2.0 and older, 5.0.7.0 and older, 4.5.4.0 and older, 3.9.1.0 and older" }, { - "version_value": "4.5.4.0 and older" - }, - { - "version_value": "3.9.1.0 and older" - } - ] - } - }, - { - "product_name": "Nimble Storage All Flash Arrays", - "version": { - "version_data": [ - { - "version_value": "5.1.2.0 and older" - }, - { - "version_value": "5.0.7.0 and older" - }, - { - "version_value": "4.5.4.0 and older" - }, - { - "version_value": "3.9.1.0 and older" - } - ] - } - }, - { - "product_name": "Nimble Storage Secondary Flash Arrays", - "version": { - "version_data": [ - { - "version_value": "5.1.2.0 and older" - }, - { - "version_value": "5.0.7.0 and older" - }, - { - "version_value": "4.5.4.0 and older" - }, - { - "version_value": "3.9.1.0 and older" + "version_value": "5.1.2.0 and older, 5.0.7.0 and older, 4.5.4.0 and older, 3.9.1.0 and older" } ] } @@ -83,7 +42,7 @@ "description": [ { "lang": "eng", - "value": "remote gain elevated privileges and disclose information" + "value": "remote disclosure of information; remote elevation of privilege; remote multiple vulnerabilities" } ] } @@ -92,7 +51,7 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", + "refsource": "MISC", "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03964en_us", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03964en_us" } @@ -102,7 +61,7 @@ "description_data": [ { "lang": "eng", - "value": "Potential security vulnerabilities have been identified with HPE Nimble Storage systems in multi array group configurations. The vulnerabilities could be remotely exploited by an attacker to gain elevated privileges or disclose information the array. Affected products and versions include: Nimble Storage Hybrid Flash Arrays - 5.1.2.0 and older, 5.0.7.0 and older, 4.5.4.0 and older, and 3.9.1.0 and older Nimble Storage All Flash Arrays - 5.1.2.0 and older, 5.0.7.0 and older, 4.5.4.0 and older, and 3.9.1.0 and older Nimble Storage Secondary Flash Arrays - 5.1.2.0 and older, 5.0.7.0 and older, 4.5.4.0 and older, and 3.9.1.0 and older" + "value": "Potential security vulnerabilities have been identified with HPE Nimble Storage systems in multi array group configurations. The vulnerabilities could be exploited by an attacker to gain elevated privileges on the array. The following NimbleOS versions, and all subsequent releases, contain a software fix for this vulnerability: 3.9.2.0, 4.5.5.0, 5.0.8.0 and 5.1.3.0." } ] } diff --git a/2019/15xxx/CVE-2019-15575.json b/2019/15xxx/CVE-2019-15575.json new file mode 100644 index 00000000000..d121881ceee --- /dev/null +++ b/2019/15xxx/CVE-2019-15575.json @@ -0,0 +1,62 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-15575", + "ASSIGNER": "support@hackerone.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "GitLab CE/EE", + "version": { + "version_data": [ + { + "version_value": "12.3.2, 12.2.6, and 12.1.12" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Command Injection - Generic (CWE-77)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://hackerone.com/reports/682442", + "url": "https://hackerone.com/reports/682442" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A command injection exists in GitLab CE/EE