diff --git a/2018/20xxx/CVE-2018-20961.json b/2018/20xxx/CVE-2018-20961.json index f0f2ef9279b..6c8e801b240 100644 --- a/2018/20xxx/CVE-2018-20961.json +++ b/2018/20xxx/CVE-2018-20961.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "url": "http://packetstormsecurity.com/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K58502654", + "url": "https://support.f5.com/csp/article/K58502654" } ] } diff --git a/2019/13xxx/CVE-2019-13271.json b/2019/13xxx/CVE-2019-13271.json new file mode 100644 index 00000000000..9e51ad0cb44 --- /dev/null +++ b/2019/13xxx/CVE-2019-13271.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13271", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://orenlab.sise.bgu.ac.il/publications/CrossRouter", + "refsource": "MISC", + "name": "https://orenlab.sise.bgu.ac.il/publications/CrossRouter" + }, + { + "refsource": "MISC", + "name": "https://www.usenix.org/system/files/woot19-paper_ovadia.pdf", + "url": "https://www.usenix.org/system/files/woot19-paper_ovadia.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13273.json b/2019/13xxx/CVE-2019-13273.json new file mode 100644 index 00000000000..aaba7adf302 --- /dev/null +++ b/2019/13xxx/CVE-2019-13273.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13273", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, a buffer overflow vulnerability exists in the csvinfo CGI script. The overflow may be exploited by sending a crafted GET request that triggers an sprintf of the srcdb parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13274.json b/2019/13xxx/CVE-2019-13274.json new file mode 100644 index 00000000000..bc3ff6a80f0 --- /dev/null +++ b/2019/13xxx/CVE-2019-13274.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13274", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, an XSS vulnerability exists in the csvinfo CGI script due to insufficient filtering of the db parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/csvinfo.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13451.json b/2019/13xxx/CVE-2019-13451.json new file mode 100644 index 00000000000..6864598b6b8 --- /dev/null +++ b/2019/13xxx/CVE-2019-13451.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13451", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, a buffer overflow vulnerability exists in history.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.xymon.com/archive/2019-July/046570.html", + "url": "https://lists.xymon.com/archive/2019-July/046570.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13452.json b/2019/13xxx/CVE-2019-13452.json new file mode 100644 index 00000000000..086c45b04d5 --- /dev/null +++ b/2019/13xxx/CVE-2019-13452.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13452", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, a buffer overflow vulnerability exists in reportlog.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/reportlog.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/reportlog.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.xymon.com/archive/2019-July/046570.html", + "url": "https://lists.xymon.com/archive/2019-July/046570.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13455.json b/2019/13xxx/CVE-2019-13455.json new file mode 100644 index 00000000000..7a226006f01 --- /dev/null +++ b/2019/13xxx/CVE-2019-13455.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13455", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the alert acknowledgment CGI tool because of   expansion in acknowledge.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/acknowledge.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/acknowledge.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.xymon.com/archive/2019-July/046570.html", + "url": "https://lists.xymon.com/archive/2019-July/046570.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13484.json b/2019/13xxx/CVE-2019-13484.json new file mode 100644 index 00000000000..f54ce8fe3e2 --- /dev/null +++ b/2019/13xxx/CVE-2019-13484.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13484", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, a buffer overflow exists in the status-log viewer CGI because of   expansion in appfeed.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/appfeed.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/appfeed.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.xymon.com/archive/2019-July/046570.html", + "url": "https://lists.xymon.com/archive/2019-July/046570.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13485.json b/2019/13xxx/CVE-2019-13485.json new file mode 100644 index 00000000000..dc00dffbf88 --- /dev/null +++ b/2019/13xxx/CVE-2019-13485.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13485", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, a stack-based buffer overflow vulnerability exists in the history viewer component via a long hostname or service parameter to history.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/history.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.xymon.com/archive/2019-July/046570.html", + "url": "https://lists.xymon.com/archive/2019-July/046570.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13486.json b/2019/13xxx/CVE-2019-13486.json new file mode 100644 index 00000000000..67801670fdc --- /dev/null +++ b/2019/13xxx/CVE-2019-13486.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13486", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Xymon through 4.3.28, a stack-based buffer overflow exists in the status-log viewer component because of   expansion in svcstatus.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/svcstatus.c", + "refsource": "MISC", + "name": "https://github.com/svn2github/xymon/blob/master/branches/4.3.28/web/svcstatus.c" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html", + "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00032.html" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.xymon.com/archive/2019-July/046570.html", + "url": "https://lists.xymon.com/archive/2019-July/046570.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13509.json b/2019/13xxx/CVE-2019-13509.json index 24f0e83ee79..59685ee88c1 100644 --- a/2019/13xxx/CVE-2019-13509.json +++ b/2019/13xxx/CVE-2019-13509.json @@ -61,6 +61,11 @@ "refsource": "BID", "name": "109253", "url": "http://www.securityfocus.com/bid/109253" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-5b54793a4a", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFFBVE7O73TAVY2BCWXSA2OOSLJVCPXC/" } ] } diff --git a/2019/15xxx/CVE-2019-15637.json b/2019/15xxx/CVE-2019-15637.json index 5950e494c95..4983377f628 100644 --- a/2019/15xxx/CVE-2019-15637.json +++ b/2019/15xxx/CVE-2019-15637.json @@ -61,6 +61,11 @@ "url": "https://github.com/minecrater/exploits/blob/master/TableauXXE.py", "refsource": "MISC", "name": "https://github.com/minecrater/exploits/blob/master/TableauXXE.py" + }, + { + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html", + "url": "https://packetstormsecurity.com/files/154232/Tableau-XML-Injection.html" } ] }, diff --git a/2019/15xxx/CVE-2019-15698.json b/2019/15xxx/CVE-2019-15698.json new file mode 100644 index 00000000000..cb0b67b38f4 --- /dev/null +++ b/2019/15xxx/CVE-2019-15698.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15698", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Octopus Deploy 2019.7.3 through 2019.7.9, in certain circumstances, an authenticated user with VariableView permissions could view sensitive values. This is fixed in 2019.7.10." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/OctopusDeploy/Issues/issues/5810", + "refsource": "MISC", + "name": "https://github.com/OctopusDeploy/Issues/issues/5810" + } + ] + } +} \ No newline at end of file