From 506bcdb415940f444c407d4bcf5ce4093c0db133 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 24 Jun 2019 19:00:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2017/17xxx/CVE-2017-17945.json | 48 ++++++++++++++++++++++++-- 2017/18xxx/CVE-2017-18342.json | 17 +++++++++- 2019/10xxx/CVE-2019-10271.json | 56 +++++++++++++++++++++++++++---- 2019/12xxx/CVE-2019-12880.json | 61 ++++++++++++++++++++++++++++++---- 2019/7xxx/CVE-2019-7229.json | 5 +++ 2019/7xxx/CVE-2019-7230.json | 5 +++ 2019/7xxx/CVE-2019-7232.json | 5 +++ 2019/9xxx/CVE-2019-9957.json | 56 +++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9958.json | 56 +++++++++++++++++++++++++++---- 9 files changed, 282 insertions(+), 27 deletions(-) diff --git a/2017/17xxx/CVE-2017-17945.json b/2017/17xxx/CVE-2017-17945.json index 059a1e4d15a..4bbaad5afdf 100644 --- a/2017/17xxx/CVE-2017-17945.json +++ b/2017/17xxx/CVE-2017-17945.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17945", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The ASUS HiVivo aspplication before 5.6.27 for ASUS Watch has Missing SSL Certificate Validation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues", + "refsource": "MISC", + "name": "http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues" } ] } diff --git a/2017/18xxx/CVE-2017-18342.json b/2017/18xxx/CVE-2017-18342.json index 1fa7604e888..de0192fc6d8 100644 --- a/2017/18xxx/CVE-2017-18342.json +++ b/2017/18xxx/CVE-2017-18342.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "In PyYAML before 4.1, the yaml.load() API could execute arbitrary code. In other words, yaml.safe_load is not used." + "value": "In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function." } ] }, @@ -76,6 +76,21 @@ "refsource": "FEDORA", "name": "FEDORA-2019-44643e8bcb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/" + }, + { + "refsource": "MISC", + "name": "https://github.com/marshmallow-code/apispec/issues/278", + "url": "https://github.com/marshmallow-code/apispec/issues/278" + }, + { + "refsource": "MISC", + "name": "https://github.com/yaml/pyyaml/issues/193", + "url": "https://github.com/yaml/pyyaml/issues/193" + }, + { + "refsource": "MISC", + "name": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation", + "url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation" } ] } diff --git a/2019/10xxx/CVE-2019-10271.json b/2019/10xxx/CVE-2019-10271.json index 4a452963753..d50dfb491ce 100644 --- a/2019/10xxx/CVE-2019-10271.json +++ b/2019/10xxx/CVE-2019-10271.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-10271", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-10271", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Ultimate Member plugin 2.39 for WordPress. It allows unauthorized profile and cover picture modification. It is possible to modify the profile and cover picture of any user once one is connected. One can also modify the profiles and cover pictures of privileged users. To perform such a modification, one first needs to (for example) intercept an upload-picture request and modify the user_id parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://cxsecurity.com/issue/WLB-2019060120", + "url": "https://cxsecurity.com/issue/WLB-2019060120" } ] } diff --git a/2019/12xxx/CVE-2019-12880.json b/2019/12xxx/CVE-2019-12880.json index 4d257283e8b..946cbd3f9e8 100644 --- a/2019/12xxx/CVE-2019-12880.json +++ b/2019/12xxx/CVE-2019-12880.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12880", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12880", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "BCN Quark Quarking Password Manager 3.1.84 suffers from a clickjacking vulnerability caused by allowing * within web_accessible_resources. An attacker can take advantage of this vulnerability and cause significant harm." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://chrome.google.com/webstore/detail/quarking-password-manager/gfkmpfajamepgekgohcdnjogmeamcdmm?hl=en", + "refsource": "MISC", + "name": "https://chrome.google.com/webstore/detail/quarking-password-manager/gfkmpfajamepgekgohcdnjogmeamcdmm?hl=en" + }, + { + "refsource": "FULLDISC", + "name": "20190624 Quarking Password Manager 3.1.84 - Clickjacking Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/31" } ] } diff --git a/2019/7xxx/CVE-2019-7229.json b/2019/7xxx/CVE-2019-7229.json index 12adc03e5b4..d3036377a70 100644 --- a/2019/7xxx/CVE-2019-7229.json +++ b/2019/7xxx/CVE-2019-7229.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "FULLDISC", + "name": "20190624 XL-19-005 - ABB HMI Absence of Signature Verification Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/34" + }, { "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2019/Jun/34", diff --git a/2019/7xxx/CVE-2019-7230.json b/2019/7xxx/CVE-2019-7230.json index 99eb49d6cc8..5de10333e56 100644 --- a/2019/7xxx/CVE-2019-7230.json +++ b/2019/7xxx/CVE-2019-7230.json @@ -57,6 +57,11 @@ "refsource": "MISC", "name": "https://www.darkmatter.ae/xen1thlabs/published-advisories/" }, + { + "refsource": "FULLDISC", + "name": "20190624 XL-19-004 - ABB IDAL FTP Server Uncontrolled Format String Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/33" + }, { "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2019/Jun/33", diff --git a/2019/7xxx/CVE-2019-7232.json b/2019/7xxx/CVE-2019-7232.json index e41e806c898..15ef394c247 100644 --- a/2019/7xxx/CVE-2019-7232.json +++ b/2019/7xxx/CVE-2019-7232.json @@ -57,6 +57,11 @@ "refsource": "MISC", "name": "https://www.darkmatter.ae/xen1thlabs/published-advisories/" }, + { + "refsource": "FULLDISC", + "name": "20190624 XL-19-011 - ABB IDAL HTTP Server Stack-Based Buffer Overflow Vulnerability", + "url": "http://seclists.org/fulldisclosure/2019/Jun/40" + }, { "refsource": "MISC", "name": "http://seclists.org/fulldisclosure/2019/Jun/40", diff --git a/2019/9xxx/CVE-2019-9957.json b/2019/9xxx/CVE-2019-9957.json index 56ed82641c2..78545fbae85 100644 --- a/2019/9xxx/CVE-2019-9957.json +++ b/2019/9xxx/CVE-2019-9957.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9957", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9957", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored XSS within Quadbase EspressReport ES (ERES) v7.0 update 7 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The XSS payload is stored by creating a new user account, and setting the username to an XSS payload. The stored payload can then be triggered by accessing the \"Set Security Levels\" or \"View User/Group Relationships\" page. If the attacker does not currently have permission to create a new user, another vulnerability such as CSRF must be exploited first." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://crawl3r.xyz/cve/cve-2019-9957/", + "url": "https://crawl3r.xyz/cve/cve-2019-9957/" } ] } diff --git a/2019/9xxx/CVE-2019-9958.json b/2019/9xxx/CVE-2019-9958.json index ccef073603b..29899b1ef9d 100644 --- a/2019/9xxx/CVE-2019-9958.json +++ b/2019/9xxx/CVE-2019-9958.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9958", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9958", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CSRF within the admin panel in Quadbase EspressReport ES (ERES) v7.0 update 7 allows remote attackers to escalate privileges, or create new admin accounts by crafting a malicious web page that issues specific requests, using a target admin's session to process their requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://crawl3r.xyz/cve/cve-2019-9958/", + "url": "https://crawl3r.xyz/cve/cve-2019-9958/" } ] }