From 5bbb90516edc459fd15ff34ef0cbe01ea7ad100f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 27 Jul 2019 19:00:46 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/1xxx/CVE-2018-1042.json | 5 +++ 2019/10xxx/CVE-2019-10266.json | 5 +++ 2019/10xxx/CVE-2019-10267.json | 10 +++++ 2019/14xxx/CVE-2019-14288.json | 67 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14289.json | 67 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14290.json | 67 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14291.json | 67 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14292.json | 67 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14293.json | 67 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14294.json | 67 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14295.json | 62 +++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14296.json | 62 +++++++++++++++++++++++++++++++ 2019/5xxx/CVE-2019-5607.json | 5 +++ 13 files changed, 618 insertions(+) create mode 100644 2019/14xxx/CVE-2019-14288.json create mode 100644 2019/14xxx/CVE-2019-14289.json create mode 100644 2019/14xxx/CVE-2019-14290.json create mode 100644 2019/14xxx/CVE-2019-14291.json create mode 100644 2019/14xxx/CVE-2019-14292.json create mode 100644 2019/14xxx/CVE-2019-14293.json create mode 100644 2019/14xxx/CVE-2019-14294.json create mode 100644 2019/14xxx/CVE-2019-14295.json create mode 100644 2019/14xxx/CVE-2019-14296.json diff --git a/2018/1xxx/CVE-2018-1042.json b/2018/1xxx/CVE-2018-1042.json index 6216f893043..60d7886430b 100644 --- a/2018/1xxx/CVE-2018-1042.json +++ b/2018/1xxx/CVE-2018-1042.json @@ -61,6 +61,11 @@ "name": "102752", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102752" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153766/Moodle-Filepicker-3.5.2-Server-Side-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/153766/Moodle-Filepicker-3.5.2-Server-Side-Request-Forgery.html" } ] } diff --git a/2019/10xxx/CVE-2019-10266.json b/2019/10xxx/CVE-2019-10266.json index 33046a8a32b..55ebe3c1f32 100644 --- a/2019/10xxx/CVE-2019-10266.json +++ b/2019/10xxx/CVE-2019-10266.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.wbsec.nl/ahsay/", "url": "https://www.wbsec.nl/ahsay/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153772/Ahsay-Backup-7.x-8.x-XML-Injection.html", + "url": "http://packetstormsecurity.com/files/153772/Ahsay-Backup-7.x-8.x-XML-Injection.html" } ] } diff --git a/2019/10xxx/CVE-2019-10267.json b/2019/10xxx/CVE-2019-10267.json index 6f4f2944d97..31843bc4ff4 100644 --- a/2019/10xxx/CVE-2019-10267.json +++ b/2019/10xxx/CVE-2019-10267.json @@ -56,6 +56,16 @@ "refsource": "MISC", "name": "https://www.wbsec.nl/ahsay/", "url": "https://www.wbsec.nl/ahsay/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153771/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/153771/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153770/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/153770/Ahsay-Backup-7.x-8.x-File-Upload-Remote-Code-Execution.html" } ] } diff --git a/2019/14xxx/CVE-2019-14288.json b/2019/14xxx/CVE-2019-14288.json new file mode 100644 index 00000000000..abc1d895fa1 --- /dev/null +++ b/2019/14xxx/CVE-2019-14288.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14288", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an Integer overflow in the function JBIG2Bitmap::combine at JBIG2Stream.cc for the \"one byte per line\" case." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01", + "refsource": "MISC", + "name": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01" + }, + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14289.json b/2019/14xxx/CVE-2019-14289.json new file mode 100644 index 00000000000..e5a0cdf2499 --- /dev/null +++ b/2019/14xxx/CVE-2019-14289.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14289", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an integer overflow in the function JBIG2Bitmap::combine at JBIG2Stream.cc for the \"multiple bytes per line\" case." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01", + "refsource": "MISC", + "name": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01" + }, + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14290.json b/2019/14xxx/CVE-2019-14290.json new file mode 100644 index 00000000000..0d48500b15d --- /dev/null +++ b/2019/14xxx/CVE-2019-14290.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14290", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01", + "refsource": "MISC", + "name": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01" + }, + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14291.json b/2019/14xxx/CVE-2019-14291.json new file mode 100644 index 00000000000..794c385034d --- /dev/null +++ b/2019/14xxx/CVE-2019-14291.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14291", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA==6 case 3." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01", + "refsource": "MISC", + "name": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01" + }, + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14292.json b/2019/14xxx/CVE-2019-14292.json new file mode 100644 index 00000000000..ae10650c1b4 --- /dev/null +++ b/2019/14xxx/CVE-2019-14292.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14292", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA!=6 case 1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01", + "refsource": "MISC", + "name": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01" + }, + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14293.json b/2019/14xxx/CVE-2019-14293.json new file mode 100644 index 00000000000..accfe99d655 --- /dev/null +++ b/2019/14xxx/CVE-2019-14293.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14293", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA!=6 case 2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01", + "refsource": "MISC", + "name": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01" + }, + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14294.json b/2019/14xxx/CVE-2019-14294.json new file mode 100644 index 00000000000..d2980170980 --- /dev/null +++ b/2019/14xxx/CVE-2019-14294.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14294", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is a use-after-free in the function JPXStream::fillReadBuf at JPXStream.cc, due to an out of bounds read." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01", + "refsource": "MISC", + "name": "https://github.com/TeamSeri0us/pocs/tree/master/xpdf/4.01.01" + }, + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41851" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14295.json b/2019/14xxx/CVE-2019-14295.json new file mode 100644 index 00000000000..76b1a7111e2 --- /dev/null +++ b/2019/14xxx/CVE-2019-14295.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14295", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/upx/upx/issues/286", + "refsource": "MISC", + "name": "https://github.com/upx/upx/issues/286" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14296.json b/2019/14xxx/CVE-2019-14296.json new file mode 100644 index 00000000000..468fc03df80 --- /dev/null +++ b/2019/14xxx/CVE-2019-14296.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14296", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/upx/upx/issues/287", + "refsource": "MISC", + "name": "https://github.com/upx/upx/issues/287" + } + ] + } +} \ No newline at end of file diff --git a/2019/5xxx/CVE-2019-5607.json b/2019/5xxx/CVE-2019-5607.json index 0ab825a0c13..eeea9e15040 100644 --- a/2019/5xxx/CVE-2019-5607.json +++ b/2019/5xxx/CVE-2019-5607.json @@ -54,6 +54,11 @@ "refsource": "FREEBSD", "name": "FreeBSD-SA-19:17", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:17.fd.asc" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153755/FreeBSD-Security-Advisory-FreeBSD-SA-19-17.fd.html", + "url": "http://packetstormsecurity.com/files/153755/FreeBSD-Security-Advisory-FreeBSD-SA-19-17.fd.html" } ] },