diff --git a/2019/0xxx/CVE-2019-0379.json b/2019/0xxx/CVE-2019-0379.json index c1cc13bbde5..db756e0f6c7 100644 --- a/2019/0xxx/CVE-2019-0379.json +++ b/2019/0xxx/CVE-2019-0379.json @@ -15,15 +15,15 @@ "product": { "product_data": [ { - "product_name": "SAP NetWeaver Process Integration (AS2 Adapter)", + "product_name": "SAP Process Integration, business-to-business add-on", "version": { "version_data": [ { - "version_name": "<", + "version_name": "=", "version_value": "1.0" }, { - "version_name": "<", + "version_name": "=", "version_value": "2.0" } ] @@ -39,7 +39,7 @@ "description_data": [ { "lang": "eng", - "value": "In SAP NetWeaver Process Integration (AS2 Adapter), before versions 1.0 and 2.0, the attacker is able to consistently bypass the authenticity check by crafting ad-hoc public certificates based on arbitrary key-pairs leading to Missing Authentication Check." + "value": "SAP Process Integration, business-to-business add-on, versions 1.0, 2.0, does not perform authentication check properly when the default security provider is changed to BouncyCastle (BC), leading to Missing Authentication Check" } ] }, diff --git a/2019/17xxx/CVE-2019-17059.json b/2019/17xxx/CVE-2019-17059.json new file mode 100644 index 00000000000..858d2e500f2 --- /dev/null +++ b/2019/17xxx/CVE-2019-17059.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17059", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A shell injection vulnerability on the Sophos Cyberoam firewall appliance with CyberoamOS before 10.6.6 MR-6 allows remote attackers to execute arbitrary commands via the Web Admin and SSL VPN consoles." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://community.sophos.com/products/cyberoamos/", + "refsource": "MISC", + "name": "https://community.sophos.com/products/cyberoamos/" + }, + { + "refsource": "CONFIRM", + "name": "https://community.sophos.com/kb/en-us/134732", + "url": "https://community.sophos.com/kb/en-us/134732" + }, + { + "refsource": "MISC", + "name": "https://thebestvpn.com/cyberoam-preauth-rce/", + "url": "https://thebestvpn.com/cyberoam-preauth-rce/" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17503.json b/2019/17xxx/CVE-2019-17503.json new file mode 100644 index 00000000000..f1672a24797 --- /dev/null +++ b/2019/17xxx/CVE-2019-17503.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17503", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Kirona Dynamic Resource Scheduling (DRS) 5.5.3.5. An unauthenticated user can access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd) directly: it contains sensitive information about the database through the SQL queries within this batch file. This file exposes SQL database information such as database version, table name, column name, etc." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Ramikan/Vulnerabilities/blob/master/Kirona-DRS%205.5.3.5%20Multiple%20Vulnerabilities", + "refsource": "MISC", + "name": "https://github.com/Ramikan/Vulnerabilities/blob/master/Kirona-DRS%205.5.3.5%20Multiple%20Vulnerabilities" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17504.json b/2019/17xxx/CVE-2019-17504.json new file mode 100644 index 00000000000..e65036a688d --- /dev/null +++ b/2019/17xxx/CVE-2019-17504.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17504", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Kirona Dynamic Resource Scheduling (DRS) 5.5.3.5. A reflected Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script via the /osm/report/ password parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Ramikan/Vulnerabilities/blob/master/Kirona-DRS%205.5.3.5%20Multiple%20Vulnerabilities", + "refsource": "MISC", + "name": "https://github.com/Ramikan/Vulnerabilities/blob/master/Kirona-DRS%205.5.3.5%20Multiple%20Vulnerabilities" + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6333.json b/2019/6xxx/CVE-2019-6333.json index c151c8fc984..5bef61727d6 100644 --- a/2019/6xxx/CVE-2019-6333.json +++ b/2019/6xxx/CVE-2019-6333.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6333", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6333", + "ASSIGNER": "hp-security-alert@hp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "HP", + "product": { + "product_data": [ + { + "product_name": "Touchpoint Analytics", + "version": { + "version_data": [ + { + "version_value": "before 4.1.4.2827" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Execution of arbitrary code." + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.hp.com/us-en/document/c06463166", + "url": "https://support.hp.com/us-en/document/c06463166" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A potential security vulnerability has been identified with certain versions of HP Touchpoint Analytics prior to version 4.1.4.2827. This vulnerability may allow a local attacker with administrative privileges to execute arbitrary code via an HP Touchpoint Analytics system service." } ] }