mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
af1757b90c
commit
40321711fb
72
2019/15xxx/CVE-2019-15695.json
Normal file
72
2019/15xxx/CVE-2019-15695.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-15695",
|
||||
"ASSIGNER": "vulnerability@kaspersky.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Kaspersky",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "TigerVNC",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "1.10.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-121: Stack-based Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1",
|
||||
"url": "https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20191220 VNC vulnerabilities. TigerVNC security update",
|
||||
"url": "https://www.openwall.com/lists/oss-security/2019/12/20/2"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89",
|
||||
"url": "https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-19681",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2019-19681",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Pandora FMS 7.x suffers from remote code execution vulnerability. With an authenticated user who can modify the alert system, it is possible to define and execute Commands in the context of the Application."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://medium.com/@k4m1ll0/remote-code-execution-vulnerability-in-pandorafms-7-x-8ce55d4b1d5a",
|
||||
"url": "https://medium.com/@k4m1ll0/remote-code-execution-vulnerability-in-pandorafms-7-x-8ce55d4b1d5a"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6008",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
|
||||
"url": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.yokogawa.com/library/resources/white-papers/yokogawa-security-advisory-report-list/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/vu/JVNVU98228725/index.html"
|
||||
"url": "http://jvn.jp/vu/JVNVU98228725/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/vu/JVNVU98228725/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,8 +60,8 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges."
|
||||
"value": "An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6011",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wpdatatables/"
|
||||
"url": "https://wordpress.org/plugins/wpdatatables/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wordpress.org/plugins/wpdatatables/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN14776551/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN14776551/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN14776551/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6012",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wpdatatables/"
|
||||
"url": "https://wordpress.org/plugins/wpdatatables/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wordpress.org/plugins/wpdatatables/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN14776551/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN14776551/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN14776551/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6013",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
|
||||
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN95875796/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN95875796/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN95875796/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6014",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
|
||||
"url": "https://www.dlink-jp.com/product/dba-1510p#product_firmware",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.dlink-jp.com/product/dba-1510p#product_firmware"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN95875796/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN95875796/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN95875796/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6015",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
|
||||
"url": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942",
|
||||
"refsource": "MISC",
|
||||
"name": "https://fonjapan.zendesk.com/hc/ja/articles/360000558942"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
|
||||
"url": "http://jvn.jp/en/vu/JVNVU94678942/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/vu/JVNVU94678942/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,7 +60,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
|
||||
"value": "FON2601E-SE, FON2601E-RE, FON2601E-FSW-S, and FON2601E-FSW-B with firmware versions 1.1.7 and earlier contain an issue where they may behave as open resolvers. If this vulnerability is exploited, FON routers may be leveraged for DNS amplification attacks to some other entities."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6016",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://www.remise.jp/data/pdf/20191002.pdf"
|
||||
"url": "http://www.remise.jp/data/pdf/20191002.pdf",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.remise.jp/data/pdf/20191002.pdf"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN59436681/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN59436681/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN59436681/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6017",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "http://www.remise.jp/data/pdf/20191002.pdf"
|
||||
"url": "http://www.remise.jp/data/pdf/20191002.pdf",
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.remise.jp/data/pdf/20191002.pdf"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN59436681/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN59436681/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN59436681/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6018",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.netcommons.org/blogs/blog_entries/view/6/7b40ca16fc8358a57d0e178c931c0027?frame_id=13"
|
||||
"url": "https://www.netcommons.org/blogs/blog_entries/view/6/7b40ca16fc8358a57d0e178c931c0027?frame_id=13",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.netcommons.org/blogs/blog_entries/view/6/7b40ca16fc8358a57d0e178c931c0027?frame_id=13"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN74530672/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN74530672/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN74530672/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6019",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ipa.go.jp/ikc/info/20191126.html"
|
||||
"url": "https://www.ipa.go.jp/ikc/info/20191126.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ipa.go.jp/ikc/info/20191126.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN19386781/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN19386781/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN19386781/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6020",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.powercms.jp/news/release-powercms-201910.html"
|
||||
"url": "https://www.powercms.jp/news/release-powercms-201910.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.powercms.jp/news/release-powercms-201910.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN34634458/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN34634458/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN34634458/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6021",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.ricoh.co.jp/limedio/user/"
|
||||
"url": "https://www.ricoh.co.jp/limedio/user/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.ricoh.co.jp/limedio/user/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN45633549/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN45633549/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN45633549/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6022",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://kb.cybozu.support/article/36124"
|
||||
"url": "https://kb.cybozu.support/article/36124",
|
||||
"refsource": "MISC",
|
||||
"name": "https://kb.cybozu.support/article/36124"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN79854355/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN79854355/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN79854355/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6023",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://kb.cybozu.support/article/36130"
|
||||
"url": "http://jvn.jp/en/jp/JVN79854355/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN79854355/index.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN79854355/index.html"
|
||||
"url": "https://kb.cybozu.support/article/36130",
|
||||
"refsource": "MISC",
|
||||
"name": "https://kb.cybozu.support/article/36130"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6024",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,13 +45,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en"
|
||||
"url": "https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en",
|
||||
"refsource": "MISC",
|
||||
"name": "https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=en"
|
||||
},
|
||||
{
|
||||
"url": "https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998"
|
||||
"url": "https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998",
|
||||
"refsource": "MISC",
|
||||
"name": "https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN41566067/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN41566067/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN41566067/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6025",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html"
|
||||
"url": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN65280626/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN65280626/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN65280626/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6026",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.motex.co.jp/news/news_topics/2019/release191202/"
|
||||
"url": "https://www.motex.co.jp/news/news_topics/2019/release191202/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.motex.co.jp/news/news_topics/2019/release191202/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN49068796/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN49068796/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN49068796/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6027",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-spell-check/"
|
||||
"url": "https://wordpress.org/plugins/wp-spell-check/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wordpress.org/plugins/wp-spell-check/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN26838191/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN26838191/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN26838191/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6029",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-custom-body-class/"
|
||||
"url": "https://wordpress.org/plugins/wp-custom-body-class/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wordpress.org/plugins/wp-custom-body-class/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN26847507/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN26847507/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN26847507/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6030",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-custom-body-class/"
|
||||
"url": "https://wordpress.org/plugins/wp-custom-body-class/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://wordpress.org/plugins/wp-custom-body-class/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN26847507/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN26847507/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN26847507/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6031",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.kinza.jp/download/releases/"
|
||||
"url": "https://www.kinza.jp/download/releases/",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.kinza.jp/download/releases/"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN63047298/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN63047298/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN63047298/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6032",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=jp.co.ntv.news24&hl=en"
|
||||
"url": "https://play.google.com/store/apps/details?id=jp.co.ntv.news24&hl=en",
|
||||
"refsource": "MISC",
|
||||
"name": "https://play.google.com/store/apps/details?id=jp.co.ntv.news24&hl=en"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN01236065/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN01236065/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN01236065/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6033",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://developer.a-blogcms.jp/download/legacy.html"
|
||||
"url": "https://developer.a-blogcms.jp/download/legacy.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://developer.a-blogcms.jp/download/legacy.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN10377257/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN10377257/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN10377257/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6034",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,10 +45,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://developer.a-blogcms.jp/download/legacy.html"
|
||||
"url": "https://developer.a-blogcms.jp/download/legacy.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://developer.a-blogcms.jp/download/legacy.html"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN10377257/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN10377257/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN10377257/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -4,7 +4,8 @@
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-6035",
|
||||
"ASSIGNER": "vultures@jpcert.or.jp"
|
||||
"ASSIGNER": "vultures@jpcert.or.jp",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
@ -44,13 +45,19 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://github.com/yahoo/athenz"
|
||||
"url": "https://github.com/yahoo/athenz",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/yahoo/athenz"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yahoo/athenz/pull/700"
|
||||
"url": "https://github.com/yahoo/athenz/pull/700",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/yahoo/athenz/pull/700"
|
||||
},
|
||||
{
|
||||
"url": "http://jvn.jp/en/jp/JVN57070811/index.html"
|
||||
"url": "http://jvn.jp/en/jp/JVN57070811/index.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://jvn.jp/en/jp/JVN57070811/index.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user