"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-16 15:01:00 +00:00
parent ce782f2778
commit 5362d401ee
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
12 changed files with 292 additions and 7 deletions

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1484",
"url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1484",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191016 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/16/6"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1436",
"url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1436",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191016 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/16/6"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1607",
"url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1607",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191016 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/16/6"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1431",
"url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1431",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191016 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/16/6"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1450",
"url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1450",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191016 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/16/6"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1462",
"url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1462",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191016 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/16/6"
}
]
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16521",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The broken-link-checker plugin through 1.11.8 for WordPress (aka Broken Link Checker) is susceptible to Reflected XSS due to improper encoding and insertion of an HTTP GET parameter into HTML. The filter function on the page listing all detected broken links can be exploited by providing an XSS payload in the s_filter GET parameter in a filter_id=search request. NOTE: this is an end-of-life product."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/broken-link-checker/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/broken-link-checker/#developers"
},
{
"refsource": "MISC",
"name": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-02_WordPress_Plugin_Broken_Link_Checker",
"url": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-02_WordPress_Plugin_Broken_Link_Checker"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16522",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. An attacker with high privileges can attack other users."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/eu-cookie-law/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/eu-cookie-law/#developers"
},
{
"refsource": "MISC",
"name": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-01_WordPress_Plugin_EU_Cookie_Law",
"url": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-01_WordPress_Plugin_EU_Cookie_Law"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16523",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/events-manager/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/events-manager/#developers"
},
{
"refsource": "MISC",
"name": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-03_WordPress_Plugin_Events_Manager",
"url": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190913-03_WordPress_Plugin_Events_Manager"
}
]
}
}

View File

@ -66,6 +66,11 @@
"refsource": "UBUNTU",
"name": "USN-4149-1",
"url": "https://usn.ubuntu.com/4149-1/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4544",
"url": "https://www.debian.org/security/2019/dsa-4544"
}
]
}

View File

@ -44,6 +44,11 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://safebreach.com/Post/HP-Touchpoint-Analytics-DLL-Search-Order-Hijacking-Potential-Abuses-CVE-2019-6333",
"url": "https://safebreach.com/Post/HP-Touchpoint-Analytics-DLL-Search-Order-Hijacking-Potential-Abuses-CVE-2019-6333"
},
{
"refsource": "CONFIRM",
"name": "https://support.hp.com/us-en/document/c06463166",

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-6334",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6334",
"ASSIGNER": "hp-security-alert@hp.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "HP Color LaserJet CM4540 MFP,HP Color LaserJet Managed flow MFP M880zm,HP Color LaserJet Enterprise flow MFP M880z,HP Color LaserJet Enterprise M552,HP Color LaserJet Managed M553,HP Color LaserJet Enterprise M553,HP Color LaserJet Managed M651,HP Color LaserJet Enterprise M651,HP Color LaserJet Enterprise M652,HP Color LaserJet Enterprise M653,HP Color LaserJet Enterprise M750,HP Color LaserJet Managed E75245,HP Color LaserJet Enterprise M751,HP Color LaserJet Enterprise M855,HP Color LaserJet Enterprise Flow MFP M577,HP Color LaserJet Enterprise MFP M577,HP Color LaserJet Enterprise Flow MFP M680,HP Color LaserJet Enterprise MFP M680,HP Color LaserJet Enterprise flow MFP M681,HP Color LaserJet Enterprise MFP M681,HP Color LaserJet Enterprise flow MFP M682,HP Color LaserJet Enterprise MFP M682,HP Color LaserJet Enterprises CP5525,HP Color LaserJet Managed E55040dw,HP Color LaserJet Managed E65050/60,HP Color LaserJet Managed flow MFP E77822/25/30,HP Color LaserJet Managed flow MFP E57540,HP Color LaserJet Managed MFP E57540,HP Color LaserJet Managed flow MFP E67550/60,HP Color LaserJet Managed MFP E67550/60,HP Color LaserJet Managed MFP E77422/28,HP Color LaserJet Managed MFP E77822/25/30,HP Color LaserJet Managed flow MFP E87640/50/60,HP Color LaserJet Managed MFP E87640/50/60,HP Color LaserJet Managed Flow MFP M577,HP Color LaserJet Managed MFP M577,HP Color LaserJet Managed Flow MFP M680,HP Color LaserJet Managed MFP M680,HP LaserJet Enterprise 500 Color M551HP LaserJet Enterprise color flow MFP M575,HP LaserJet Enterprise 500 color MFP M575,HP LaserJet Enterprise Flow MFP M525,HP LaserJet Enterprise 500 MFP M525f,HP LaserJet Enterprise 600 M601,HP LaserJet Enterprise 600 M602,HP LaserJet Enterprise 600 M603,HP Color LaserJet Managed MFP M775,HP LaserJet Enterprise 700 color MFP M775,HP LaserJet Enterprise 700 M712,HP LaserJet Managed flow MFP M630,HP LaserJet Enterprise flow MFP M630,HP LaserJet Managed flow MFP M830,HP LaserJet Enterprise flow MFP M830,HP LaserJet Enterprise M4555 MFP,HP LaserJet Managed M506,HP LaserJet Enterprise M506,HP LaserJet Managed E50145,HP LaserJet Enterprise M507,HP LaserJet Enterprise M604,HP LaserJet Managed M605,HP LaserJet Enterprise M605,HP LaserJet Enterprise M606,HP LaserJet Enterprise M607,HP LaserJet Enterprise M608,HP LaserJet Enterprise M609,HP LaserJet Enterprise M806,HP LaserJet Enterprise Flow MFP M527z,HP LaserJet Enterprise MFP M527,HP LaserJet Managed MFP E52645,HP LaserJet Enterprise MFP M528,HP LaserJet Managed MFP M630,HP LaserJet Enterprise MFP M630,HP LaserJet Enterprise flow MFP M631,HP LaserJet Enterprise MFP M631,HP LaserJet Enterprise flow MFP M632,HP LaserJet Enterprise MFP M632,HP LaserJet Enterprise flow MFP M633,HP LaserJet Enterprise MFP M633,HP LaserJet Managed MFP M725,HP LaserJet Enterprise MFP M725,HP LaserJet Managed color flow MFP M575,HP LaserJet Managed 500 color MFP M575,HP LaserJet Managed Flow MFP M525,HP LaserJet Managed 500 MFP M525,HP LaserJet Managed E50045,HP LaserJet Managed E60055/65/75,HP LaserJet Managed flow MFP E52545c,HP LaserJet Managed MFP E52545,HP LaserJet Managed flow MFP E62555/65/75,HP LaserJet Managed MFP E62555/65,HP LaserJet Managed MFP E72425/30,HP LaserJet Managed flow MFP E72525/30/35,HP LaserJet Managed MFP E72525/30/35,HP LaserJet Managed flow MFP E82540/50/60,HP LaserJet Managed MFP E82540/50/60,HP LaserJet Managed Flow MFP M527z,HP LaserJet Managed MFP M527,HP OfficeJet Managed Color flow MFP X585,HP OfficeJet Enterprise Color flow MFP X585,HP OfficeJet Managed Color MFP X585,HP OfficeJet Enterprise Color MFP X585,HP OfficeJet Enterprise Color X555,HP PageWide Color 755,HP PageWide Color MFP 774,HP PageWide Color MFP 779,HP PageWide Enterprise Color 556,HP PageWide Enterprise Color 765,HP PageWide Enterprise Color Flow MFP 785,HP PageWide Enterprise Color flow MFP 586z,HP PageWide Enterprise Color MFP 586,HP PageWide Enterprise Color Flow MFP 780f,HP PageWide Enterprise Color MFP 780,HP PageWide Managed Color E55650,HP PageWide Managed Color E75160,HP PageWide Managed Color flow MFP E77660z,HP PageWide Managed Color flow MFP E58650z,HP PageWide Managed Color MFP E58650dn,HP PageWide Managed Color Flow MFP E77650/60z,HP PageWide Managed Color MFP E77650,HP PageWide Managed Color MFP P77440,HP PageWide Managed Color MFP P77940/50/60,HP PageWide Managed Color P75250,HP Scanjet Enterprise 8500 fn1 Document Capture Workstation,HP Digital Sender flow 8500 fn2 Document Capture Workstation,HP ScanJet Enterprise flow N9120 fn2 Document Scanner",
"version": {
"version_data": [
{
"version_value": "Multiple"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execution of arbitrary code"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://support.hp.com/us-en/document/c06447795",
"url": "https://support.hp.com/us-en/document/c06447795"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "HP LaserJet, PageWide, OfficeJet Enterprise, and LaserJet Managed Printers have a solution to check application signature that may allow potential execution of arbitrary code."
}
]
}