diff --git a/2019/11xxx/CVE-2019-11479.json b/2019/11xxx/CVE-2019-11479.json index 9a44cc2c610..3d0e7ad5d4e 100644 --- a/2019/11xxx/CVE-2019-11479.json +++ b/2019/11xxx/CVE-2019-11479.json @@ -129,6 +129,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K35421172", "url": "https://support.f5.com/csp/article/K35421172" + }, + { + "refsource": "BID", + "name": "108818", + "url": "http://www.securityfocus.com/bid/108818" } ] }, diff --git a/2019/12xxx/CVE-2019-12435.json b/2019/12xxx/CVE-2019-12435.json index 43110752e1c..7b7fd595bb8 100644 --- a/2019/12xxx/CVE-2019-12435.json +++ b/2019/12xxx/CVE-2019-12435.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://www.samba.org/samba/security/CVE-2019-12435.html", "url": "https://www.samba.org/samba/security/CVE-2019-12435.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4018-1", + "url": "https://usn.ubuntu.com/4018-1/" } ] } diff --git a/2019/12xxx/CVE-2019-12436.json b/2019/12xxx/CVE-2019-12436.json index 499243b8563..06ea88e1aaa 100644 --- a/2019/12xxx/CVE-2019-12436.json +++ b/2019/12xxx/CVE-2019-12436.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://www.samba.org/samba/security/CVE-2019-12436.html", "url": "https://www.samba.org/samba/security/CVE-2019-12436.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-4018-1", + "url": "https://usn.ubuntu.com/4018-1/" } ] } diff --git a/2019/12xxx/CVE-2019-12884.json b/2019/12xxx/CVE-2019-12884.json new file mode 100644 index 00000000000..a0a2686746e --- /dev/null +++ b/2019/12xxx/CVE-2019-12884.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12884", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12885.json b/2019/12xxx/CVE-2019-12885.json new file mode 100644 index 00000000000..cf152b5dc0b --- /dev/null +++ b/2019/12xxx/CVE-2019-12885.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12885", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12886.json b/2019/12xxx/CVE-2019-12886.json new file mode 100644 index 00000000000..666c20b9295 --- /dev/null +++ b/2019/12xxx/CVE-2019-12886.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12886", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6971.json b/2019/6xxx/CVE-2019-6971.json index b7920326363..5804773e12b 100644 --- a/2019/6xxx/CVE-2019-6971.json +++ b/2019/6xxx/CVE-2019-6971.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6971", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on TP-Link TL-WR1043ND V2 devices. An attacker can send a cookie in an HTTP authentication packet to the router management web interface, and fully control the router without knowledge of the credentials." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf", + "url": "https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf" + }, + { + "refsource": "MISC", + "name": "https://twitter.com/MalFuzzer/status/1141269335685652480?s=19", + "url": "https://twitter.com/MalFuzzer/status/1141269335685652480?s=19" } ] } diff --git a/2019/6xxx/CVE-2019-6972.json b/2019/6xxx/CVE-2019-6972.json index 17f568d2ac2..5b3e1a67701 100644 --- a/2019/6xxx/CVE-2019-6972.json +++ b/2019/6xxx/CVE-2019-6972.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-6972", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the \"Authorization\" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the username is cleartext, and the password is hashed with the MD5 algorithm (after decoding of the URL encoded string with base64)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf", + "url": "https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf" + }, + { + "refsource": "MISC", + "name": "https://twitter.com/MalFuzzer/status/1141269335685652480?s=19", + "url": "https://twitter.com/MalFuzzer/status/1141269335685652480?s=19" } ] }