"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-08-27 17:00:57 +00:00
parent 7a5a73e071
commit 78de417630
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
13 changed files with 710 additions and 0 deletions

View File

@ -76,6 +76,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K58502654",
"url": "https://support.f5.com/csp/article/K58502654"
}
]
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13271",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://orenlab.sise.bgu.ac.il/publications/CrossRouter",
"refsource": "MISC",
"name": "https://orenlab.sise.bgu.ac.il/publications/CrossRouter"
},
{
"refsource": "MISC",
"name": "https://www.usenix.org/system/files/woot19-paper_ovadia.pdf",
"url": "https://www.usenix.org/system/files/woot19-paper_ovadia.pdf"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13273",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, a buffer overflow vulnerability exists in the csvinfo CGI script. The overflow may be exploited by sending a crafted GET request that triggers an sprintf of the srcdb parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13274",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, an XSS vulnerability exists in the csvinfo CGI script due to insufficient filtering of the db parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13451",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, a buffer overflow vulnerability exists in history.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://lists.xymon.com/archive/2019-July/046570.html",
"url": "https://lists.xymon.com/archive/2019-July/046570.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13452",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, a buffer overflow vulnerability exists in reportlog.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/reportlog.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/reportlog.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://lists.xymon.com/archive/2019-July/046570.html",
"url": "https://lists.xymon.com/archive/2019-July/046570.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13455",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the alert acknowledgment CGI tool because of   expansion in acknowledge.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/acknowledge.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/acknowledge.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://lists.xymon.com/archive/2019-July/046570.html",
"url": "https://lists.xymon.com/archive/2019-July/046570.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13484",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, a buffer overflow exists in the status-log viewer CGI because of   expansion in appfeed.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/appfeed.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/appfeed.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://lists.xymon.com/archive/2019-July/046570.html",
"url": "https://lists.xymon.com/archive/2019-July/046570.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13485",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the history viewer component via a long hostname or service parameter to history.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://lists.xymon.com/archive/2019-July/046570.html",
"url": "https://lists.xymon.com/archive/2019-July/046570.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13486",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Xymon through 4.3.28, a stack-based buffer overflow exists in the status-log viewer component because of   expansion in svcstatus.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/svcstatus.c",
"refsource": "MISC",
"name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/svcstatus.c"
},
{
"refsource": "CONFIRM",
"name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://lists.xymon.com/archive/2019-July/046570.html",
"url": "https://lists.xymon.com/archive/2019-July/046570.html"
}
]
}
}

View File

@ -61,6 +61,11 @@
"refsource": "BID",
"name": "109253",
"url": "http://www.securityfocus.com/bid/109253"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-5b54793a4a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFFBVE7O73TAVY2BCWXSA2OOSLJVCPXC/"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://github.com/minecrater/exploits/blob/master/TableauXXE.py",
"refsource": "MISC",
"name": "https://github.com/minecrater/exploits/blob/master/TableauXXE.py"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html",
"url": "https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html"
}
]
},

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15698",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Octopus Deploy 2019.7.3 through 2019.7.9, in certain circumstances, an authenticated user with VariableView permissions could view sensitive values. This is fixed in 2019.7.10."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/OctopusDeploy/Issues/issues/5810",
"refsource": "MISC",
"name": "https://github.com/OctopusDeploy/Issues/issues/5810"
}
]
}
}