"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-12-26 16:01:14 +00:00
parent af1757b90c
commit 40321711fb
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
27 changed files with 331 additions and 86 deletions

View File

@ -0,0 +1,72 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-15695",
"ASSIGNER": "vulnerability@kaspersky.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Kaspersky",
"product": {
"product_data": [
{
"product_name": "TigerVNC",
"version": {
"version_data": [
{
"version_value": "1.10.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-121: Stack-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1",
"url": "https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update",
"url": "https://www.openwall.com/lists/oss-security/2019/12/20/2"
},
{
"refsource": "MISC",
"name": "https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89",
"url": "https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity."
}
]
}
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19681",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-19681",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Pandora FMS 7.x suffers from remote code execution vulnerability. With an authenticated user who can modify the alert system, it is possible to define and execute Commands in the context of the Application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://medium.com/@k4m1ll0/remote-code-execution-vulnerability-in-pandorafms-7-x-8ce55d4b1d5a",
"url": "https://medium.com/@k4m1ll0/remote-code-execution-vulnerability-in-pandorafms-7-x-8ce55d4b1d5a"
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6008",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/",
"refsource": "MISC",
"name": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
},
{
"url": "http://jvn.jp/vu/JVNVU98228725/index.html"
"url": "http://jvn.jp/vu/JVNVU98228725/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/vu/JVNVU98228725/index.html"
}
]
},
@ -55,8 +60,8 @@
"description_data": [
{
"lang": "eng",
"value": "An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges."
"value": "An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges."
}
]
}
}
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6011",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/wpdatatables/"
"url": "https://wordpress.org/plugins/wpdatatables/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/wpdatatables/"
},
{
"url": "http://jvn.jp/en/jp/JVN14776551/index.html"
"url": "http://jvn.jp/en/jp/JVN14776551/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN14776551/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6012",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/wpdatatables/"
"url": "https://wordpress.org/plugins/wpdatatables/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/wpdatatables/"
},
{
"url": "http://jvn.jp/en/jp/JVN14776551/index.html"
"url": "http://jvn.jp/en/jp/JVN14776551/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN14776551/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6013",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware",
"refsource": "MISC",
"name": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
},
{
"url": "http://jvn.jp/en/jp/JVN95875796/index.html"
"url": "http://jvn.jp/en/jp/JVN95875796/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN95875796/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6014",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware",
"refsource": "MISC",
"name": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
},
{
"url": "http://jvn.jp/en/jp/JVN95875796/index.html"
"url": "http://jvn.jp/en/jp/JVN95875796/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN95875796/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6015",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942",
"refsource": "MISC",
"name": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
},
{
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
}
]
},
@ -55,7 +60,7 @@
"description_data": [
{
"lang": "eng",
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
}
]
}

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6016",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "http://www.remise.jp/data/pdf/20191002.pdf"
"url": "http://www.remise.jp/data/pdf/20191002.pdf",
"refsource": "MISC",
"name": "http://www.remise.jp/data/pdf/20191002.pdf"
},
{
"url": "http://jvn.jp/en/jp/JVN59436681/index.html"
"url": "http://jvn.jp/en/jp/JVN59436681/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN59436681/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6017",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "http://www.remise.jp/data/pdf/20191002.pdf"
"url": "http://www.remise.jp/data/pdf/20191002.pdf",
"refsource": "MISC",
"name": "http://www.remise.jp/data/pdf/20191002.pdf"
},
{
"url": "http://jvn.jp/en/jp/JVN59436681/index.html"
"url": "http://jvn.jp/en/jp/JVN59436681/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN59436681/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6018",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.netcommons.org/blogs/blog_entries/view/6/7b40ca16fc8358a57d0e178c931c0027?frame_id=13"
"url": "https://www.netcommons.org/blogs/blog_entries/view/6/7b40ca16fc8358a57d0e178c931c0027?frame_id=13",
"refsource": "MISC",
"name": "https://www.netcommons.org/blogs/blog_entries/view/6/7b40ca16fc8358a57d0e178c931c0027?frame_id=13"
},
{
"url": "http://jvn.jp/en/jp/JVN74530672/index.html"
"url": "http://jvn.jp/en/jp/JVN74530672/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN74530672/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6019",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.ipa.go.jp/ikc/info/20191126.html"
"url": "https://www.ipa.go.jp/ikc/info/20191126.html",
"refsource": "MISC",
"name": "https://www.ipa.go.jp/ikc/info/20191126.html"
},
{
"url": "http://jvn.jp/en/jp/JVN19386781/index.html"
"url": "http://jvn.jp/en/jp/JVN19386781/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN19386781/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6020",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.powercms.jp/news/release-powercms-201910.html"
"url": "https://www.powercms.jp/news/release-powercms-201910.html",
"refsource": "MISC",
"name": "https://www.powercms.jp/news/release-powercms-201910.html"
},
{
"url": "http://jvn.jp/en/jp/JVN34634458/index.html"
"url": "http://jvn.jp/en/jp/JVN34634458/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN34634458/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6021",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.ricoh.co.jp/limedio/user/"
"url": "https://www.ricoh.co.jp/limedio/user/",
"refsource": "MISC",
"name": "https://www.ricoh.co.jp/limedio/user/"
},
{
"url": "http://jvn.jp/en/jp/JVN45633549/index.html"
"url": "http://jvn.jp/en/jp/JVN45633549/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN45633549/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6022",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36124"
"url": "https://kb.cybozu.support/article/36124",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36124"
},
{
"url": "http://jvn.jp/en/jp/JVN79854355/index.html"
"url": "http://jvn.jp/en/jp/JVN79854355/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN79854355/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6023",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://kb.cybozu.support/article/36130"
"url": "http://jvn.jp/en/jp/JVN79854355/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN79854355/index.html"
},
{
"url": "http://jvn.jp/en/jp/JVN79854355/index.html"
"url": "https://kb.cybozu.support/article/36130",
"refsource": "MISC",
"name": "https://kb.cybozu.support/article/36130"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6024",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en"
"url": "https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en",
"refsource": "MISC",
"name": "https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en"
},
{
"url": "https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998"
"url": "https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998",
"refsource": "MISC",
"name": "https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998"
},
{
"url": "http://jvn.jp/en/jp/JVN41566067/index.html"
"url": "http://jvn.jp/en/jp/JVN41566067/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN41566067/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6025",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html"
"url": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html",
"refsource": "MISC",
"name": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html"
},
{
"url": "http://jvn.jp/en/jp/JVN65280626/index.html"
"url": "http://jvn.jp/en/jp/JVN65280626/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN65280626/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6026",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.motex.co.jp/news/news_topics/2019/release191202/"
"url": "https://www.motex.co.jp/news/news_topics/2019/release191202/",
"refsource": "MISC",
"name": "https://www.motex.co.jp/news/news_topics/2019/release191202/"
},
{
"url": "http://jvn.jp/en/jp/JVN49068796/index.html"
"url": "http://jvn.jp/en/jp/JVN49068796/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN49068796/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6027",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/wp-spell-check/"
"url": "https://wordpress.org/plugins/wp-spell-check/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/wp-spell-check/"
},
{
"url": "http://jvn.jp/en/jp/JVN26838191/index.html"
"url": "http://jvn.jp/en/jp/JVN26838191/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN26838191/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6029",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/wp-custom-body-class/"
"url": "https://wordpress.org/plugins/wp-custom-body-class/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/wp-custom-body-class/"
},
{
"url": "http://jvn.jp/en/jp/JVN26847507/index.html"
"url": "http://jvn.jp/en/jp/JVN26847507/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN26847507/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6030",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/wp-custom-body-class/"
"url": "https://wordpress.org/plugins/wp-custom-body-class/",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/wp-custom-body-class/"
},
{
"url": "http://jvn.jp/en/jp/JVN26847507/index.html"
"url": "http://jvn.jp/en/jp/JVN26847507/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN26847507/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6031",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://www.kinza.jp/download/releases/"
"url": "https://www.kinza.jp/download/releases/",
"refsource": "MISC",
"name": "https://www.kinza.jp/download/releases/"
},
{
"url": "http://jvn.jp/en/jp/JVN63047298/index.html"
"url": "http://jvn.jp/en/jp/JVN63047298/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN63047298/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6032",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://play.google.com/store/apps/details?id=jp.co.ntv.news24&hl=en"
"url": "https://play.google.com/store/apps/details?id=jp.co.ntv.news24&hl=en",
"refsource": "MISC",
"name": "https://play.google.com/store/apps/details?id=jp.co.ntv.news24&hl=en"
},
{
"url": "http://jvn.jp/en/jp/JVN01236065/index.html"
"url": "http://jvn.jp/en/jp/JVN01236065/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN01236065/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6033",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://developer.a-blogcms.jp/download/legacy.html"
"url": "https://developer.a-blogcms.jp/download/legacy.html",
"refsource": "MISC",
"name": "https://developer.a-blogcms.jp/download/legacy.html"
},
{
"url": "http://jvn.jp/en/jp/JVN10377257/index.html"
"url": "http://jvn.jp/en/jp/JVN10377257/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN10377257/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6034",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,10 +45,14 @@
"references": {
"reference_data": [
{
"url": "https://developer.a-blogcms.jp/download/legacy.html"
"url": "https://developer.a-blogcms.jp/download/legacy.html",
"refsource": "MISC",
"name": "https://developer.a-blogcms.jp/download/legacy.html"
},
{
"url": "http://jvn.jp/en/jp/JVN10377257/index.html"
"url": "http://jvn.jp/en/jp/JVN10377257/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN10377257/index.html"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6035",
"ASSIGNER": "vultures@jpcert.or.jp"
"ASSIGNER": "vultures@jpcert.or.jp",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -44,13 +45,19 @@
"references": {
"reference_data": [
{
"url": "https://github.com/yahoo/athenz"
"url": "https://github.com/yahoo/athenz",
"refsource": "MISC",
"name": "https://github.com/yahoo/athenz"
},
{
"url": "https://github.com/yahoo/athenz/pull/700"
"url": "https://github.com/yahoo/athenz/pull/700",
"refsource": "MISC",
"name": "https://github.com/yahoo/athenz/pull/700"
},
{
"url": "http://jvn.jp/en/jp/JVN57070811/index.html"
"url": "http://jvn.jp/en/jp/JVN57070811/index.html",
"refsource": "MISC",
"name": "http://jvn.jp/en/jp/JVN57070811/index.html"
}
]
},