diff --git a/2019/10xxx/CVE-2019-10215.json b/2019/10xxx/CVE-2019-10215.json index a19ef5440f0..4e836100be1 100644 --- a/2019/10xxx/CVE-2019-10215.json +++ b/2019/10xxx/CVE-2019-10215.json @@ -19,7 +19,7 @@ "version": { "version_data": [ { - "version_value": "Bootstrap-3-Typeahead version 4.0.2 and later" + "version_value": "after version bootstrap3-typeahead 4.0.2" } ] } diff --git a/2019/14xxx/CVE-2019-14846.json b/2019/14xxx/CVE-2019-14846.json index 058a06c6cb0..e8d3f825adb 100644 --- a/2019/14xxx/CVE-2019-14846.json +++ b/2019/14xxx/CVE-2019-14846.json @@ -56,6 +56,11 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846", "refsource": "CONFIRM" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/ansible/ansible/pull/63366", + "url": "https://github.com/ansible/ansible/pull/63366" } ] }, diff --git a/2019/16xxx/CVE-2019-16279.json b/2019/16xxx/CVE-2019-16279.json index 8480b2f43fa..1bad461c3bd 100644 --- a/2019/16xxx/CVE-2019-16279.json +++ b/2019/16xxx/CVE-2019-16279.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Directory Traversal in the function SSL_accept in nostromo nhttpd through 1.9.6 allows an attacker to trigger a denial of service via a crafted HTTP request." + "value": "A memory error in the function SSL_accept in nostromo nhttpd through 1.9.6 allows an attacker to trigger a denial of service via a crafted HTTP request." } ] }, diff --git a/2019/16xxx/CVE-2019-16530.json b/2019/16xxx/CVE-2019-16530.json new file mode 100644 index 00000000000..56fbc68f506 --- /dev/null +++ b/2019/16xxx/CVE-2019-16530.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16530", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Sonatype Nexus Repository Manager 2.x before 2.14.15 and 3.x before 3.19, and IQ Server before 72, has remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://issues.sonatype.org/secure/ReleaseNote.jspa", + "refsource": "MISC", + "name": "https://issues.sonatype.org/secure/ReleaseNote.jspa" + }, + { + "refsource": "CONFIRM", + "name": "https://support.sonatype.com/hc/en-us/articles/360036132453", + "url": "https://support.sonatype.com/hc/en-us/articles/360036132453" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17179.json b/2019/17xxx/CVE-2019-17179.json index b357c75c082..210474c8e11 100644 --- a/2019/17xxx/CVE-2019-17179.json +++ b/2019/17xxx/CVE-2019-17179.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "XSS in library/custom_template/add_template.php in OpenEMR through 5.0.2 allows a malicious user to execute code in the context of a victim's browser via a crafted list_id query parameter." + "value": "4.1.0, 4.1.1, 4.1.2, 4.1.2.3, 4.1.2.6, 4.1.2.7, 4.2.0, 4.2.1, 4.2.2, 5.0.0, 5.0.0.5, 5.0.0.6, 5.0.1, 5.0.1.1, 5.0.1.2, 5.0.1.3, 5.0.1.4, 5.0.1.5, 5.0.1.6, 5.0.1.7, 5.0.2, fixed in version 5.0.2.1" } ] }, @@ -56,6 +56,11 @@ "url": "https://github.com/openemr/openemr/pull/2701", "refsource": "MISC", "name": "https://github.com/openemr/openemr/pull/2701" + }, + { + "refsource": "MISC", + "name": "https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17179/README.md", + "url": "https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-17179/README.md" } ] }