diff --git a/2016/2xxx/CVE-2016-2056.json b/2016/2xxx/CVE-2016-2056.json index fdf89501bb6..90343164540 100644 --- a/2016/2xxx/CVE-2016-2056.json +++ b/2016/2xxx/CVE-2016-2056.json @@ -71,6 +71,11 @@ "name": "http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135758/Xymon-4.3.x-Buffer-Overflow-Code-Execution-Information-Disclosure.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153620/Xymon-useradm-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/153620/Xymon-useradm-Command-Execution.html" } ] } diff --git a/2019/10xxx/CVE-2019-10349.json b/2019/10xxx/CVE-2019-10349.json index 97be89012b1..176a28658d1 100644 --- a/2019/10xxx/CVE-2019-10349.json +++ b/2019/10xxx/CVE-2019-10349.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153610/Jenkins-Dependency-Graph-View-0.13-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/153610/Jenkins-Dependency-Graph-View-0.13-Cross-Site-Scripting.html" } ] } diff --git a/2019/10xxx/CVE-2019-10912.json b/2019/10xxx/CVE-2019-10912.json index edb483b5ceb..24d8eef500e 100644 --- a/2019/10xxx/CVE-2019-10912.json +++ b/2019/10xxx/CVE-2019-10912.json @@ -57,10 +57,65 @@ "name": "https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized", "url": "https://symfony.com/blog/cve-2019-10912-prevent-destructors-with-side-effects-from-being-unserialized" }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-0ef4149687", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTJGZJLPG5FHKFH7KNAKNTWOGBB6LXAL/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-f5d6a7ce74", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLOZX5BZMQKWG7PJRQL6MB5CAMKBQAWD/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-2a7f472198", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFARAUAWZE4UDSKVDWRD35D75HI5UGSD/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-8635280de5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDSM576XIOVXVCMHNJHLBBZBTOD62LDA/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-3ee6a7adf2", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAC2TQVEEH5FDJSSWPM2BCRIPTCOEMMO/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-a3ca65028c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42UEKSLKJB72P24JBWVN6AADHLMYSUQD/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-f8db687840", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QEAOZXVNDA63537A2OIH4QE77EKZR5O/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-32067d8b15", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4441", + "url": "https://www.debian.org/security/2019/dsa-4441" + }, + { + "refsource": "BUGTRAQ", + "name": "20190510 [SECURITY] [DSA 4441-1] symfony security update", + "url": "https://seclists.org/bugtraq/2019/May/21" + }, { "refsource": "CONFIRM", "name": "https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b", "url": "https://github.com/symfony/symfony/commit/4fb975281634b8d49ebf013af9e502e67c28816b" + }, + { + "refsource": "CONFIRM", + "name": "https://typo3.org/security/advisory/typo3-core-sa-2019-016/", + "url": "https://typo3.org/security/advisory/typo3-core-sa-2019-016/" } ] } diff --git a/2019/11xxx/CVE-2019-11360.json b/2019/11xxx/CVE-2019-11360.json index 8763a02590f..624b15ef3be 100644 --- a/2019/11xxx/CVE-2019-11360.json +++ b/2019/11xxx/CVE-2019-11360.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11360", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11360", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/", + "url": "https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/" + }, + { + "refsource": "CONFIRM", + "name": "https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e", + "url": "https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e" } ] } diff --git a/2019/12xxx/CVE-2019-12747.json b/2019/12xxx/CVE-2019-12747.json index 807086b5551..955f39c6577 100644 --- a/2019/12xxx/CVE-2019-12747.json +++ b/2019/12xxx/CVE-2019-12747.json @@ -53,9 +53,9 @@ "references": { "reference_data": [ { - "url": "https://typo3.org/cms/release-news/typo3-8-release-notes/", - "refsource": "MISC", - "name": "https://typo3.org/cms/release-news/typo3-8-release-notes/" + "refsource": "CONFIRM", + "name": "https://typo3.org/security/advisory/typo3-core-sa-2019-020/", + "url": "https://typo3.org/security/advisory/typo3-core-sa-2019-020/" } ] } diff --git a/2019/12xxx/CVE-2019-12748.json b/2019/12xxx/CVE-2019-12748.json index d23aeb27431..3d53c52bd5a 100644 --- a/2019/12xxx/CVE-2019-12748.json +++ b/2019/12xxx/CVE-2019-12748.json @@ -53,9 +53,9 @@ "references": { "reference_data": [ { - "url": "https://typo3.org/cms/release-news/typo3-8-release-notes/", - "refsource": "MISC", - "name": "https://typo3.org/cms/release-news/typo3-8-release-notes/" + "refsource": "CONFIRM", + "name": "https://typo3.org/security/advisory/typo3-core-sa-2019-015/", + "url": "https://typo3.org/security/advisory/typo3-core-sa-2019-015/" } ] } diff --git a/2019/13xxx/CVE-2019-13481.json b/2019/13xxx/CVE-2019-13481.json index 74f1392b6d8..d5cccac1456 100644 --- a/2019/13xxx/CVE-2019-13481.json +++ b/2019/13xxx/CVE-2019-13481.json @@ -56,6 +56,11 @@ "url": "https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-3.pdf", "refsource": "MISC", "name": "https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-3.pdf" + }, + { + "refsource": "BID", + "name": "109131", + "url": "http://www.securityfocus.com/bid/109131" } ] } diff --git a/2019/13xxx/CVE-2019-13482.json b/2019/13xxx/CVE-2019-13482.json index b0daf3c1dca..0fa6e5c9f00 100644 --- a/2019/13xxx/CVE-2019-13482.json +++ b/2019/13xxx/CVE-2019-13482.json @@ -56,6 +56,11 @@ "url": "https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-4.pdf", "refsource": "MISC", "name": "https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/dir818-4.pdf" + }, + { + "refsource": "BID", + "name": "109131", + "url": "http://www.securityfocus.com/bid/109131" } ] } diff --git a/2019/13xxx/CVE-2019-13494.json b/2019/13xxx/CVE-2019-13494.json index 29214c7a62c..3f55815668d 100644 --- a/2019/13xxx/CVE-2019-13494.json +++ b/2019/13xxx/CVE-2019-13494.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.mogozobo.com/?p=3534", "url": "https://www.mogozobo.com/?p=3534" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153612/SNMPc-Enterprise-Edition-9-10-Mapping-Filename-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/153612/SNMPc-Enterprise-Edition-9-10-Mapping-Filename-Buffer-Overflow.html" } ] } diff --git a/2019/13xxx/CVE-2019-13503.json b/2019/13xxx/CVE-2019-13503.json index 5e912f96204..83d55bd9790 100644 --- a/2019/13xxx/CVE-2019-13503.json +++ b/2019/13xxx/CVE-2019-13503.json @@ -56,6 +56,11 @@ "url": "https://github.com/cesanta/mongoose/pull/1035", "refsource": "MISC", "name": "https://github.com/cesanta/mongoose/pull/1035" + }, + { + "refsource": "MISC", + "name": "https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/", + "url": "https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/" } ] } diff --git a/2019/13xxx/CVE-2019-13504.json b/2019/13xxx/CVE-2019-13504.json index 2cb49658d5e..d7427f1487a 100644 --- a/2019/13xxx/CVE-2019-13504.json +++ b/2019/13xxx/CVE-2019-13504.json @@ -61,6 +61,11 @@ "refsource": "BID", "name": "109117", "url": "http://www.securityfocus.com/bid/109117" + }, + { + "refsource": "MISC", + "name": "https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/", + "url": "https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/" } ] } diff --git a/2019/13xxx/CVE-2019-13574.json b/2019/13xxx/CVE-2019-13574.json index 3ede2b8e0d6..7e7ff9107a6 100644 --- a/2019/13xxx/CVE-2019-13574.json +++ b/2019/13xxx/CVE-2019-13574.json @@ -66,6 +66,11 @@ "url": "https://github.com/minimagick/minimagick/compare/d484786...293f9bb", "refsource": "MISC", "name": "https://github.com/minimagick/minimagick/compare/d484786...293f9bb" + }, + { + "refsource": "MISC", + "name": "https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/", + "url": "https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/" } ] }