From 6ce99448ffc002737500e392b72ec99208ccaaf0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 27 Feb 2019 17:07:33 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19615.json | 5 ++ 2018/19xxx/CVE-2018-19616.json | 5 ++ 2018/1xxx/CVE-2018-1775.json | 100 +++++++++++++++--------------- 2019/0xxx/CVE-2019-0102.json | 5 ++ 2019/0xxx/CVE-2019-0103.json | 5 ++ 2019/0xxx/CVE-2019-0104.json | 5 ++ 2019/0xxx/CVE-2019-0105.json | 5 ++ 2019/0xxx/CVE-2019-0106.json | 5 ++ 2019/0xxx/CVE-2019-0107.json | 5 ++ 2019/0xxx/CVE-2019-0108.json | 5 ++ 2019/0xxx/CVE-2019-0109.json | 5 ++ 2019/0xxx/CVE-2019-0110.json | 5 ++ 2019/0xxx/CVE-2019-0111.json | 5 ++ 2019/0xxx/CVE-2019-0112.json | 5 ++ 2019/4xxx/CVE-2019-4061.json | 108 ++++++++++++++++----------------- 15 files changed, 167 insertions(+), 106 deletions(-) diff --git a/2018/19xxx/CVE-2018-19615.json b/2018/19xxx/CVE-2018-19615.json index 29829050c8c..f37f2f5f8cb 100644 --- a/2018/19xxx/CVE-2018-19615.json +++ b/2018/19xxx/CVE-2018-19615.json @@ -66,6 +66,11 @@ "name" : "106333", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/106333" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-04", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-04" } ] } diff --git a/2018/19xxx/CVE-2018-19616.json b/2018/19xxx/CVE-2018-19616.json index a1ae958144d..c27fcf7d6e9 100644 --- a/2018/19xxx/CVE-2018-19616.json +++ b/2018/19xxx/CVE-2018-19616.json @@ -66,6 +66,11 @@ "name" : "106333", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/106333" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-04", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-04" } ] } diff --git a/2018/1xxx/CVE-2018-1775.json b/2018/1xxx/CVE-2018-1775.json index 41d7dadd999..b6e27119c5a 100644 --- a/2018/1xxx/CVE-2018-1775.json +++ b/2018/1xxx/CVE-2018-1775.json @@ -1,27 +1,9 @@ { - "references" : { - "reference_data" : [ - { - "title" : "IBM Security Bulletin 872486 (SAN Volume Controller)", - "name" : "https://www.ibm.com/support/docview.wss?uid=ibm10872486", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/docview.wss?uid=ibm10872486" - }, - { - "title" : "X-Force Vulnerability Report", - "name" : "ibm-storwize-cve20181775-file-download (148757)", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148757", - "refsource" : "XF" - } - ] - }, - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products versions 7.5 through 8.2 could allow an authenticated user to download arbitrary files from the operating system. IBM X-Force ID: 148757." - } - ] + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2019-02-25T00:00:00", + "ID" : "CVE-2018-1775", + "STATE" : "PUBLIC" }, "affects" : { "vendor" : { @@ -30,6 +12,7 @@ "product" : { "product_data" : [ { + "product_name" : "torwize V7000", "version" : { "version_data" : [ { @@ -39,10 +22,10 @@ "version_value" : "8.2" } ] - }, - "product_name" : "torwize V7000" + } }, { + "product_name" : "torwize V3500", "version" : { "version_data" : [ { @@ -52,10 +35,10 @@ "version_value" : "8.2" } ] - }, - "product_name" : "torwize V3500" + } }, { + "product_name" : "torwize V3700", "version" : { "version_data" : [ { @@ -65,8 +48,7 @@ "version_value" : "8.2" } ] - }, - "product_name" : "torwize V3700" + } }, { "product_name" : "Spectrum Virtualize for Public Cloud", @@ -82,6 +64,7 @@ } }, { + "product_name" : "Spectrum Virtualize Software", "version" : { "version_data" : [ { @@ -91,10 +74,10 @@ "version_value" : "8.2" } ] - }, - "product_name" : "Spectrum Virtualize Software" + } }, { + "product_name" : "SAN Volume Controller", "version" : { "version_data" : [ { @@ -104,8 +87,7 @@ "version_value" : "8.2" } ] - }, - "product_name" : "SAN Volume Controller" + } }, { "product_name" : "FlashSystem V9000", @@ -134,6 +116,7 @@ } }, { + "product_name" : "FlashSystem 9100 Family", "version" : { "version_data" : [ { @@ -143,8 +126,7 @@ "version_value" : "8.2" } ] - }, - "product_name" : "FlashSystem 9100 Family" + } } ] }, @@ -153,25 +135,29 @@ ] } }, + "data_format" : "MITRE", + "data_type" : "CVE", "data_version" : "4.0", - "CVE_data_meta" : { - "ASSIGNER" : "psirt@us.ibm.com", - "STATE" : "PUBLIC", - "ID" : "CVE-2018-1775", - "DATE_PUBLIC" : "2019-02-25T00:00:00" + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products versions 7.5 through 8.2 could allow an authenticated user to download arbitrary files from the operating system. IBM X-Force ID: 148757." + } + ] }, "impact" : { "cvssv3" : { "BM" : { - "C" : "H", - "AC" : "L", - "PR" : "L", - "I" : "N", - "AV" : "N", "A" : "N", + "AC" : "L", + "AV" : "N", + "C" : "H", + "I" : "N", + "PR" : "L", + "S" : "U", "SCORE" : "6.500", - "UI" : "N", - "S" : "U" + "UI" : "N" }, "TM" : { "E" : "U", @@ -180,18 +166,30 @@ } } }, - "data_format" : "MITRE", "problemtype" : { "problemtype_data" : [ { "description" : [ { - "value" : "Obtain Information", - "lang" : "eng" + "lang" : "eng", + "value" : "Obtain Information" } ] } ] }, - "data_type" : "CVE" + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/docview.wss?uid=ibm10872486", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/docview.wss?uid=ibm10872486" + }, + { + "name" : "ibm-storwize-cve20181775-file-download(148757)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148757" + } + ] + } } diff --git a/2019/0xxx/CVE-2019-0102.json b/2019/0xxx/CVE-2019-0102.json index 0b7a1e67487..ff6356caf4a 100644 --- a/2019/0xxx/CVE-2019-0102.json +++ b/2019/0xxx/CVE-2019-0102.json @@ -62,6 +62,11 @@ "name" : "107069", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107069" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0103.json b/2019/0xxx/CVE-2019-0103.json index 7804537260e..c30f16e93d1 100644 --- a/2019/0xxx/CVE-2019-0103.json +++ b/2019/0xxx/CVE-2019-0103.json @@ -62,6 +62,11 @@ "name" : "107074", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107074" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0104.json b/2019/0xxx/CVE-2019-0104.json index 034ee3d6cc7..c83d3c013bb 100644 --- a/2019/0xxx/CVE-2019-0104.json +++ b/2019/0xxx/CVE-2019-0104.json @@ -62,6 +62,11 @@ "name" : "107109", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107109" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0105.json b/2019/0xxx/CVE-2019-0105.json index d57e7b24537..340f918e1ca 100644 --- a/2019/0xxx/CVE-2019-0105.json +++ b/2019/0xxx/CVE-2019-0105.json @@ -62,6 +62,11 @@ "name" : "107069", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107069" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0106.json b/2019/0xxx/CVE-2019-0106.json index e8ddd3f221e..f2519e83d6b 100644 --- a/2019/0xxx/CVE-2019-0106.json +++ b/2019/0xxx/CVE-2019-0106.json @@ -62,6 +62,11 @@ "name" : "107069", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107069" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0107.json b/2019/0xxx/CVE-2019-0107.json index 22f2d7518d2..2987a2efcc5 100644 --- a/2019/0xxx/CVE-2019-0107.json +++ b/2019/0xxx/CVE-2019-0107.json @@ -62,6 +62,11 @@ "name" : "107069", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107069" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0108.json b/2019/0xxx/CVE-2019-0108.json index 7657af604f7..23b42d22df5 100644 --- a/2019/0xxx/CVE-2019-0108.json +++ b/2019/0xxx/CVE-2019-0108.json @@ -62,6 +62,11 @@ "name" : "107075", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107075" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0109.json b/2019/0xxx/CVE-2019-0109.json index 9bcc51b644b..ebcc3a16507 100644 --- a/2019/0xxx/CVE-2019-0109.json +++ b/2019/0xxx/CVE-2019-0109.json @@ -62,6 +62,11 @@ "name" : "107069", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107069" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0110.json b/2019/0xxx/CVE-2019-0110.json index 6a908b6e1db..26c9166a161 100644 --- a/2019/0xxx/CVE-2019-0110.json +++ b/2019/0xxx/CVE-2019-0110.json @@ -62,6 +62,11 @@ "name" : "107071", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107071" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0111.json b/2019/0xxx/CVE-2019-0111.json index 5355b790cd4..780d60e8871 100644 --- a/2019/0xxx/CVE-2019-0111.json +++ b/2019/0xxx/CVE-2019-0111.json @@ -62,6 +62,11 @@ "name" : "107067", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107067" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/0xxx/CVE-2019-0112.json b/2019/0xxx/CVE-2019-0112.json index 4bbddceb246..b3c51ff5bb8 100644 --- a/2019/0xxx/CVE-2019-0112.json +++ b/2019/0xxx/CVE-2019-0112.json @@ -62,6 +62,11 @@ "name" : "107064", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/107064" + }, + { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01", + "refsource" : "MISC", + "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01" } ] } diff --git a/2019/4xxx/CVE-2019-4061.json b/2019/4xxx/CVE-2019-4061.json index 3e057a49fc6..5f0fed26d04 100644 --- a/2019/4xxx/CVE-2019-4061.json +++ b/2019/4xxx/CVE-2019-4061.json @@ -1,24 +1,9 @@ { - "data_type" : "CVE", - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "value" : "Obtain Information", - "lang" : "eng" - } - ] - } - ] - }, - "description" : { - "description_data" : [ - { - "value" : "IBM BigFix Platform 9.2 and 9.5 could allow an attacker to query the relay remotely and gather information about the updates and fixlets deployed to the associated sites due to not enabling authenticated access. IBM X-Force ID: 156869.", - "lang" : "eng" - } - ] + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2019-02-18T00:00:00", + "ID" : "CVE-2019-4061", + "STATE" : "PUBLIC" }, "affects" : { "vendor" : { @@ -27,6 +12,7 @@ "product" : { "product_data" : [ { + "product_name" : "BigFix Platform", "version" : { "version_data" : [ { @@ -36,8 +22,7 @@ "version_value" : "9.5" } ] - }, - "product_name" : "BigFix Platform" + } } ] }, @@ -46,48 +31,61 @@ ] } }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "IBM BigFix Platform 9.2 and 9.5 could allow an attacker to query the relay remotely and gather information about the updates and fixlets deployed to the associated sites due to not enabling authenticated access. IBM X-Force ID: 156869." + } + ] + }, + "impact" : { + "cvssv3" : { + "BM" : { + "A" : "N", + "AC" : "L", + "AV" : "N", + "C" : "L", + "I" : "N", + "PR" : "N", + "S" : "U", + "SCORE" : "5.300", + "UI" : "N" + }, + "TM" : { + "E" : "U", + "RC" : "C", + "RL" : "O" + } + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Obtain Information" + } + ] + } + ] + }, "references" : { "reference_data" : [ { "name" : "http://www.ibm.com/support/docview.wss?uid=ibm10870242", "refsource" : "CONFIRM", - "url" : "http://www.ibm.com/support/docview.wss?uid=ibm10870242", - "title" : "IBM Security Bulletin 870242 (BigFix Platform)" + "url" : "http://www.ibm.com/support/docview.wss?uid=ibm10870242" }, { - "title" : "X-Force Vulnerability Report", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/156869", + "name" : "ibm-bigfix-cve20194061-info-disc(156869)", "refsource" : "XF", - "name" : "ibm-bigfix-cve20194061-info-disc (156869)" + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/156869" } ] - }, - "data_version" : "4.0", - "impact" : { - "cvssv3" : { - "BM" : { - "SCORE" : "5.300", - "UI" : "N", - "S" : "U", - "AC" : "L", - "C" : "L", - "PR" : "N", - "I" : "N", - "AV" : "N", - "A" : "N" - }, - "TM" : { - "RL" : "O", - "RC" : "C", - "E" : "U" - } - } - }, - "data_format" : "MITRE", - "CVE_data_meta" : { - "STATE" : "PUBLIC", - "ID" : "CVE-2019-4061", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-02-18T00:00:00" } }