From 83cf8864993f78b1038987247e83f005998d2ebd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 3 Jun 2019 21:00:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/10xxx/CVE-2019-10009.json | 61 ++++++++++++++++++++++++++--- 2019/10xxx/CVE-2019-10883.json | 71 +++++++++++++++++++++++++++++++--- 2019/11xxx/CVE-2019-11185.json | 66 ++++++++++++++++++++++++++++--- 2019/11xxx/CVE-2019-11367.json | 61 ++++++++++++++++++++++++++--- 2019/11xxx/CVE-2019-11368.json | 61 ++++++++++++++++++++++++++--- 2019/12xxx/CVE-2019-12097.json | 56 ++++++++++++++++++++++++--- 2019/12xxx/CVE-2019-12548.json | 66 ++++++++++++++++++++++++++++--- 2019/9xxx/CVE-2019-9824.json | 48 ++++++++++++++++++++++- 2019/9xxx/CVE-2019-9838.json | 53 ++++++++++++++++++++++++- 2019/9xxx/CVE-2019-9839.json | 53 ++++++++++++++++++++++++- 10 files changed, 548 insertions(+), 48 deletions(-) diff --git a/2019/10xxx/CVE-2019-10009.json b/2019/10xxx/CVE-2019-10009.json index 3ffd4787fc2..63da6a11e67 100644 --- a/2019/10xxx/CVE-2019-10009.json +++ b/2019/10xxx/CVE-2019-10009.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-10009", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-10009", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Directory Traversal issue was discovered in the Web GUI in Titan FTP Server 2019 Build 3505. When an authenticated user attempts to preview an uploaded file (through PreviewHandler.ashx) by using a \\..\\..\\ technique, arbitrary files can be loaded in the server response outside the root directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://seclists.org/fulldisclosure/2019/Mar/47", + "url": "https://seclists.org/fulldisclosure/2019/Mar/47" + }, + { + "refsource": "EXPLOIT-DB", + "name": "46611", + "url": "https://www.exploit-db.com/exploits/46611" } ] } diff --git a/2019/10xxx/CVE-2019-10883.json b/2019/10xxx/CVE-2019-10883.json index db36cdaedb7..72a3e8cedcb 100644 --- a/2019/10xxx/CVE-2019-10883.json +++ b/2019/10xxx/CVE-2019-10883.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-10883", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-10883", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Citrix SD-WAN Center 10.2.x before 10.2.1 and NetScaler SD-WAN Center 10.0.x before 10.0.7 allow Command Injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.tenable.com/security/research", + "refsource": "MISC", + "name": "https://www.tenable.com/security/research" + }, + { + "url": "https://support.citrix.com/v1/search?searchQuery=%22%22&lang=en&sort=cr_date_desc&prod=&pver=&ct=Security+Bulletin", + "refsource": "MISC", + "name": "https://support.citrix.com/v1/search?searchQuery=%22%22&lang=en&sort=cr_date_desc&prod=&pver=&ct=Security+Bulletin" + }, + { + "refsource": "MISC", + "name": "https://www.tenable.com/security/research/tra-2019-18", + "url": "https://www.tenable.com/security/research/tra-2019-18" + }, + { + "refsource": "CONFIRM", + "name": "https://support.citrix.com/article/CTX247737", + "url": "https://support.citrix.com/article/CTX247737" } ] } diff --git a/2019/11xxx/CVE-2019-11185.json b/2019/11xxx/CVE-2019-11185.json index 5bfd5aa1ae4..4143bd9b78a 100644 --- a/2019/11xxx/CVE-2019-11185.json +++ b/2019/11xxx/CVE-2019-11185.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11185", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11185", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP Live Chat Support Pro plugin through 8.0.26 for WordPress contains an arbitrary file upload vulnerability. This results from an incomplete patch for CVE-2018-12426. Arbitrary file upload is achieved by using a non-blacklisted executable file extension in conjunction with a whitelisted file extension, and prepending \"magic bytes\" to the payload to pass MIME checks. Specifically, an unauthenticated remote user submits a crafted file upload POST request to the REST api remote_upload endpoint. The file contains data that will fool the plugin's MIME check into classifying it as an image (which is a whitelisted file extension) and finally a trailing .phtml file extension." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-live-chat-support/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-live-chat-support/#developers" + }, + { + "url": "https://wp-livechat.com/", + "refsource": "MISC", + "name": "https://wp-livechat.com/" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9320", + "url": "https://wpvulndb.com/vulnerabilities/9320" } ] } diff --git a/2019/11xxx/CVE-2019-11367.json b/2019/11xxx/CVE-2019-11367.json index a386e814f48..1130f37aedf 100644 --- a/2019/11xxx/CVE-2019-11367.json +++ b/2019/11xxx/CVE-2019-11367.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11367", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11367", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in AUO Solar Data Recorder before 1.3.0. The web portal uses HTTP Basic Authentication and provides the account and password in the WWW-Authenticate attribute. By using this account and password, anyone can login successfully." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://drive.google.com/file/d/1H1L5s14Omnx1eJAdRlRninnqUKLJ_xDA/view", + "refsource": "MISC", + "name": "https://drive.google.com/file/d/1H1L5s14Omnx1eJAdRlRninnqUKLJ_xDA/view" + }, + { + "refsource": "MISC", + "name": "https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11367", + "url": "https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11367" } ] } diff --git a/2019/11xxx/CVE-2019-11368.json b/2019/11xxx/CVE-2019-11368.json index 929d97b5128..6fd11f39045 100644 --- a/2019/11xxx/CVE-2019-11368.json +++ b/2019/11xxx/CVE-2019-11368.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11368", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11368", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored XSS was discovered in AUO Solar Data Recorder before 1.3.0 via the protect/config.htm addr parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://drive.google.com/open?id=1X42Rdb_u4YVieXRqs0jOjyJZOb7DCJT6", + "refsource": "MISC", + "name": "https://drive.google.com/open?id=1X42Rdb_u4YVieXRqs0jOjyJZOb7DCJT6" + }, + { + "refsource": "MISC", + "name": "https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11368", + "url": "https://github.com/nepenthe0320/cve_poc/blob/master/CVE-2019-11368" } ] } diff --git a/2019/12xxx/CVE-2019-12097.json b/2019/12xxx/CVE-2019-12097.json index 27cd8c94536..3482b176270 100644 --- a/2019/12xxx/CVE-2019-12097.json +++ b/2019/12xxx/CVE-2019-12097.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12097", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12097", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Telerik Fiddler v5.0.20182.28034 doesn't verify the hash of EnableLoopback.exe before running it, which could lead to code execution or local privilege escalation by replacing the original EnableLoopback.exe." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://vuldb.com/?id.135671", + "url": "https://vuldb.com/?id.135671" } ] } diff --git a/2019/12xxx/CVE-2019-12548.json b/2019/12xxx/CVE-2019-12548.json index 8630a002250..e2e4d879211 100644 --- a/2019/12xxx/CVE-2019-12548.json +++ b/2019/12xxx/CVE-2019-12548.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12548", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12548", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Bludit before 3.9.0 allows remote code execution for an authenticated user by uploading a php file while changing the logo through /admin/ajax/upload-logo." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bludit/bludit/compare/5e5957c...77e85e7", + "refsource": "MISC", + "name": "https://github.com/bludit/bludit/compare/5e5957c...77e85e7" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/bludit/bludit/releases/tag/3.9.0", + "url": "https://github.com/bludit/bludit/releases/tag/3.9.0" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/bludit/bludit/commit/d0843a4070c7d7fa596a7eb2130be15383013487", + "url": "https://github.com/bludit/bludit/commit/d0843a4070c7d7fa596a7eb2130be15383013487" } ] } diff --git a/2019/9xxx/CVE-2019-9824.json b/2019/9xxx/CVE-2019-9824.json index 1f1c7b59b14..61a78d13050 100644 --- a/2019/9xxx/CVE-2019-9824.json +++ b/2019/9xxx/CVE-2019-9824.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9824", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00400.html", + "refsource": "MISC", + "name": "https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00400.html" } ] } diff --git a/2019/9xxx/CVE-2019-9838.json b/2019/9xxx/CVE-2019-9838.json index 739ce0773ef..47d12f49c41 100644 --- a/2019/9xxx/CVE-2019-9838.json +++ b/2019/9xxx/CVE-2019-9838.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9838", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VFront 0.99.5 has stored XSS via the admin/sync_reg_tab.php azzera parameter, which is mishandled during admin/error_log.php rendering." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netsparker.com/web-applications-advisories/", + "refsource": "MISC", + "name": "https://www.netsparker.com/web-applications-advisories/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153104/VFront-0.99.5-Persistent-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/153104/VFront-0.99.5-Persistent-Cross-Site-Scripting.html" } ] } diff --git a/2019/9xxx/CVE-2019-9839.json b/2019/9xxx/CVE-2019-9839.json index 8494d4627af..76d403db708 100644 --- a/2019/9xxx/CVE-2019-9839.json +++ b/2019/9xxx/CVE-2019-9839.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9839", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VFront 0.99.5 has Reflected XSS via the admin/menu_registri.php descrizione_g parameter or the admin/sync_reg_tab.php azzera parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netsparker.com/web-applications-advisories/", + "refsource": "MISC", + "name": "https://www.netsparker.com/web-applications-advisories/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153103/VFront-0.99.5-Reflective-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/153103/VFront-0.99.5-Reflective-Cross-Site-Scripting.html" } ] }