From 3b88bf7317b2a5fec1c883884a2a25c5801e10fc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 9 Oct 2019 13:00:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/17xxx/CVE-2019-17371.json | 62 ++++++++++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17372.json | 62 ++++++++++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17373.json | 62 ++++++++++++++++++++++++++++++++++ 3 files changed, 186 insertions(+) create mode 100644 2019/17xxx/CVE-2019-17371.json create mode 100644 2019/17xxx/CVE-2019-17372.json create mode 100644 2019/17xxx/CVE-2019-17373.json diff --git a/2019/17xxx/CVE-2019-17371.json b/2019/17xxx/CVE-2019-17371.json new file mode 100644 index 00000000000..f8a42a1aeb1 --- /dev/null +++ b/2019/17xxx/CVE-2019-17371.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17371", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "libpng 1.6.37 has memory leaks in png_malloc_warn and png_create_info_struct." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/glennrp/libpng/issues/307", + "refsource": "MISC", + "name": "https://github.com/glennrp/libpng/issues/307" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17372.json b/2019/17xxx/CVE-2019-17372.json new file mode 100644 index 00000000000..df677d59863 --- /dev/null +++ b/2019/17xxx/CVE-2019-17372.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17372", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Certain NETGEAR devices allow remote attackers to disable all authentication requirements by visiting genieDisableLanChanged.cgi. The attacker can then, for example, visit MNU_accessPassword_recovered.html to obtain a valid new admin password. This affects AC1450, D8500, DC112A, JNDR3000, LG2200D, R4500, R6200, R6200V2, R6250, R6300, R6300v2, R6400, R6700, R6900P, R6900, R7000P, R7000, R7100LG, R7300, R7900, R8000, R8300, R8500, WGR614v10, WN2500RPv2, WNDR3400v2, WNDR3700v3, WNDR4000, WNDR4500, WNDR4500v2, WNR1000, WNR1000v3, WNR3500L, and WNR3500L." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zer0yu/CVE_Request/blob/master/netgear/netgear_cgi_unauthorized_access_vulnerability.md", + "refsource": "MISC", + "name": "https://github.com/zer0yu/CVE_Request/blob/master/netgear/netgear_cgi_unauthorized_access_vulnerability.md" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17373.json b/2019/17xxx/CVE-2019-17373.json new file mode 100644 index 00000000000..ce2428ca953 --- /dev/null +++ b/2019/17xxx/CVE-2019-17373.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17373", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Certain NETGEAR devices allow unauthenticated access to critical .cgi and .htm pages via a substring ending with .jpg, such as by appending ?x=1.jpg to a URL. This affects MBR1515, MBR1516, DGN2200, DGN2200M, DGND3700, WNR2000v2, WNDR3300, WNDR3400, WNR3500, and WNR834Bv2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md", + "refsource": "MISC", + "name": "https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_web_interface_exists_authentication_bypass.md" + } + ] + } +} \ No newline at end of file