From 694e50e3d3b94cc99abfa68ab9f5d12d4b3937b0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 6 Dec 2019 18:01:10 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2012/2xxx/CVE-2012-2130.json | 75 +++++++++++++++++++++++++++-- 2012/2xxx/CVE-2012-2148.json | 60 ++++++++++++++++++++++-- 2019/12xxx/CVE-2019-12750.json | 5 ++ 2019/15xxx/CVE-2019-15627.json | 5 ++ 2019/16xxx/CVE-2019-16670.json | 86 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16671.json | 86 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16672.json | 86 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16673.json | 86 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16674.json | 86 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16702.json | 5 ++ 2019/18xxx/CVE-2019-18671.json | 72 ++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18672.json | 72 ++++++++++++++++++++++++++++ 2019/19xxx/CVE-2019-19576.json | 5 ++ 13 files changed, 723 insertions(+), 6 deletions(-) create mode 100644 2019/16xxx/CVE-2019-16670.json create mode 100644 2019/16xxx/CVE-2019-16671.json create mode 100644 2019/16xxx/CVE-2019-16672.json create mode 100644 2019/16xxx/CVE-2019-16673.json create mode 100644 2019/16xxx/CVE-2019-16674.json create mode 100644 2019/18xxx/CVE-2019-18671.json create mode 100644 2019/18xxx/CVE-2019-18672.json diff --git a/2012/2xxx/CVE-2012-2130.json b/2012/2xxx/CVE-2012-2130.json index 1d7086382d5..f36ce8734e0 100644 --- a/2012/2xxx/CVE-2012-2130.json +++ b/2012/2xxx/CVE-2012-2130.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2130", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "polarssl", + "product": { + "product_data": [ + { + "product_name": "polarssl", + "version": { + "version_data": [ + { + "version_value": "0.99pre4 through 1.1.1" + } + ] + } + } + ] + } + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,53 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Security Bypass vulnerability exists in PolarSSL 0.99pre4 through 1.1.1 due to a weak encryption error when generating Diffie-Hellman values and RSA keys." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "weak key generation in 0.99pre4 throught to 1.1.1" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security-tracker.debian.org/tracker/CVE-2012-2130", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2012-2130" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2130", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2130" + }, + { + "refsource": "MISC", + "name": "https://bugs.gentoo.org/show_bug.cgi?id=CVE-2012-2130", + "url": "https://bugs.gentoo.org/show_bug.cgi?id=CVE-2012-2130" + }, + { + "refsource": "MISC", + "name": "http://security.gentoo.org/glsa/glsa-201310-10.xml", + "url": "http://security.gentoo.org/glsa/glsa-201310-10.xml" + }, + { + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/53610", + "url": "http://www.securityfocus.com/bid/53610" + }, + { + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75726", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75726" } ] } diff --git a/2012/2xxx/CVE-2012-2148.json b/2012/2xxx/CVE-2012-2148.json index 95a1bb89375..b53382feea5 100644 --- a/2012/2xxx/CVE-2012-2148.json +++ b/2012/2xxx/CVE-2012-2148.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2148", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "jbossas4", + "product": { + "product_data": [ + { + "product_name": "AS", + "version": { + "version_data": [ + { + "version_value": "7.1.1" + } + ] + } + } + ] + } + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue exists in the property replacements feature in any descriptor in JBoxx AS 7.1.1 ignores java security policies" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "UNKNOWN_TYPE" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://security-tracker.debian.org/tracker/CVE-2012-2148", + "refsource": "MISC", + "name": "https://security-tracker.debian.org/tracker/CVE-2012-2148" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2148", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2148" + }, + { + "url": "https://access.redhat.com/security/cve/cve-2012-2148", + "refsource": "MISC", + "name": "https://access.redhat.com/security/cve/cve-2012-2148" } ] } diff --git a/2019/12xxx/CVE-2019-12750.json b/2019/12xxx/CVE-2019-12750.json index ef2ee949d17..68671d290fe 100644 --- a/2019/12xxx/CVE-2019-12750.json +++ b/2019/12xxx/CVE-2019-12750.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://support.symantec.com/us/en/article.SYMSA1487.html", "url": "https://support.symantec.com/us/en/article.SYMSA1487.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155581/Symantec-Endpoint-Protection-Information-Disclosure-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/155581/Symantec-Endpoint-Protection-Information-Disclosure-Privilege-Escalation.html" } ] }, diff --git a/2019/15xxx/CVE-2019-15627.json b/2019/15xxx/CVE-2019-15627.json index 57aca098907..105cf80b24e 100644 --- a/2019/15xxx/CVE-2019-15627.json +++ b/2019/15xxx/CVE-2019-15627.json @@ -62,6 +62,11 @@ "refsource": "CONFIRM", "name": "https://success.trendmicro.com/solution/000149495", "url": "https://success.trendmicro.com/solution/000149495" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155579/Trend-Micro-Deep-Security-Agent-11-Arbitrary-File-Overwrite.html", + "url": "http://packetstormsecurity.com/files/155579/Trend-Micro-Deep-Security-Agent-11-Arbitrary-File-Overwrite.html" } ] } diff --git a/2019/16xxx/CVE-2019-16670.json b/2019/16xxx/CVE-2019-16670.json new file mode 100644 index 00000000000..20e64a3b19e --- /dev/null +++ b/2019/16xxx/CVE-2019-16670.json @@ -0,0 +1,86 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16670", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cert.vde.com/en-us/advisories", + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories" + }, + { + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories/vde-2019-018", + "url": "https://cert.vde.com/en-us/advisories/vde-2019-018" + }, + { + "refsource": "MISC", + "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694", + "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "version": "3.0" + } + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16671.json b/2019/16xxx/CVE-2019-16671.json new file mode 100644 index 00000000000..75905c2a8dd --- /dev/null +++ b/2019/16xxx/CVE-2019-16671.json @@ -0,0 +1,86 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16671", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cert.vde.com/en-us/advisories", + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories" + }, + { + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories/vde-2019-018", + "url": "https://cert.vde.com/en-us/advisories/vde-2019-018" + }, + { + "refsource": "CONFIRM", + "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694", + "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:L/S:U/UI:N", + "version": "3.0" + } + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16672.json b/2019/16xxx/CVE-2019-16672.json new file mode 100644 index 00000000000..cc395361b79 --- /dev/null +++ b/2019/16xxx/CVE-2019-16672.json @@ -0,0 +1,86 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16672", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cert.vde.com/en-us/advisories", + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories" + }, + { + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories/vde-2019-018", + "url": "https://cert.vde.com/en-us/advisories/vde-2019-018" + }, + { + "refsource": "CONFIRM", + "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694", + "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "version": "3.0" + } + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16673.json b/2019/16xxx/CVE-2019-16673.json new file mode 100644 index 00000000000..890c058d423 --- /dev/null +++ b/2019/16xxx/CVE-2019-16673.json @@ -0,0 +1,86 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16673", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Passwords are stored in cleartext and can be read by anyone with access to the device." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cert.vde.com/en-us/advisories", + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories" + }, + { + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories/vde-2019-018", + "url": "https://cert.vde.com/en-us/advisories/vde-2019-018" + }, + { + "refsource": "CONFIRM", + "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694", + "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:N/A:N/C:H/I:N/PR:N/S:U/UI:N", + "version": "3.0" + } + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16674.json b/2019/16xxx/CVE-2019-16674.json new file mode 100644 index 00000000000..24ce24258a9 --- /dev/null +++ b/2019/16xxx/CVE-2019-16674.json @@ -0,0 +1,86 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16674", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cert.vde.com/en-us/advisories", + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories" + }, + { + "refsource": "MISC", + "name": "https://cert.vde.com/en-us/advisories/vde-2019-018", + "url": "https://cert.vde.com/en-us/advisories/vde-2019-018" + }, + { + "refsource": "CONFIRM", + "name": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694", + "url": "https://mdcop.weidmueller.com/mediadelivery/asset/900_102694" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "version": "3.0" + } + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16702.json b/2019/16xxx/CVE-2019-16702.json index 6fa01e7469a..9fc58169db4 100644 --- a/2019/16xxx/CVE-2019-16702.json +++ b/2019/16xxx/CVE-2019-16702.json @@ -56,6 +56,11 @@ "url": "https://github.com/purpl3-f0x/exploit-dev/blob/master/nojs_integard.py", "refsource": "MISC", "name": "https://github.com/purpl3-f0x/exploit-dev/blob/master/nojs_integard.py" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155578/Integard-Pro-NoJs-2.2.0.9026-Remote-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/155578/Integard-Pro-NoJs-2.2.0.9026-Remote-Buffer-Overflow.html" } ] } diff --git a/2019/18xxx/CVE-2019-18671.json b/2019/18xxx/CVE-2019-18671.json new file mode 100644 index 00000000000..b6ac3fea51d --- /dev/null +++ b/2019/18xxx/CVE-2019-18671.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18671", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Insufficient checks in the USB packet handling of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow out-of-bounds writes on the stack via crafted messages. The vulnerability could allow code execution or other forms of impact. It can be triggered by unauthenticated attackers and the interface is reachable via WebUSB." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/keepkey/keepkey-firmware/commit/b222c66cdd7c3203d917c80ba615082d309d80c3", + "refsource": "MISC", + "name": "https://github.com/keepkey/keepkey-firmware/commit/b222c66cdd7c3203d917c80ba615082d309d80c3" + }, + { + "url": "https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065", + "refsource": "MISC", + "name": "https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065" + }, + { + "refsource": "CONFIRM", + "name": "https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3", + "url": "https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18672.json b/2019/18xxx/CVE-2019-18672.json new file mode 100644 index 00000000000..ea2c6643fe9 --- /dev/null +++ b/2019/18xxx/CVE-2019-18672.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18672", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Notably, this breaks the security of U2F for new server registrations and invalidates existing registrations. This vulnerability can be exploited by unauthenticated attackers and the interface is reachable via WebUSB." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065", + "refsource": "MISC", + "name": "https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065" + }, + { + "url": "https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680", + "refsource": "MISC", + "name": "https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680" + }, + { + "refsource": "CONFIRM", + "name": "https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3", + "url": "https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19576.json b/2019/19xxx/CVE-2019-19576.json index 7492dc8146b..4dc2a3eb61b 100644 --- a/2019/19xxx/CVE-2019-19576.json +++ b/2019/19xxx/CVE-2019-19576.json @@ -96,6 +96,11 @@ "refsource": "MISC", "name": "https://medium.com/@jra8908/cve-2019-19576-e9da712b779", "url": "https://medium.com/@jra8908/cve-2019-19576-e9da712b779" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html" } ] }