From 856e9b25e7cdf450133ac12baf5d8a45b87d8032 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 12 Nov 2019 18:01:45 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/4xxx/CVE-2016-4970.json | 5 +++ 2018/12xxx/CVE-2018-12234.json | 5 +++ 2018/12xxx/CVE-2018-12650.json | 5 +++ 2018/12xxx/CVE-2018-12653.json | 5 +++ 2018/21xxx/CVE-2018-21026.json | 67 ++++++++++++++++++++++++++++++++++ 2019/10xxx/CVE-2019-10847.json | 5 +++ 2019/10xxx/CVE-2019-10849.json | 5 +++ 2019/15xxx/CVE-2019-15815.json | 62 +++++++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17360.json | 67 ++++++++++++++++++++++++++++++++++ 2019/3xxx/CVE-2019-3398.json | 10 +++++ 10 files changed, 236 insertions(+) create mode 100644 2018/21xxx/CVE-2018-21026.json create mode 100644 2019/15xxx/CVE-2019-15815.json create mode 100644 2019/17xxx/CVE-2019-17360.json diff --git a/2016/4xxx/CVE-2016-4970.json b/2016/4xxx/CVE-2016-4970.json index 483c0add619..760f5b2f726 100644 --- a/2016/4xxx/CVE-2016-4970.json +++ b/2016/4xxx/CVE-2016-4970.json @@ -91,6 +91,11 @@ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343616", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343616" + }, + { + "refsource": "MLIST", + "name": "[cassandra-commits] 20191112 [jira] [Created] (CASSANDRA-15412) Security vulnerability CVE-2016-4970 for Netty", + "url": "https://lists.apache.org/thread.html/afaa5860e3a6d327eb96c3d82cbd2f5996de815a16854ed1ad310144@%3Ccommits.cassandra.apache.org%3E" } ] } diff --git a/2018/12xxx/CVE-2018-12234.json b/2018/12xxx/CVE-2018-12234.json index 2432144ac96..77e4699f388 100644 --- a/2018/12xxx/CVE-2018-12234.json +++ b/2018/12xxx/CVE-2018-12234.json @@ -56,6 +56,11 @@ "name": "https://www.knowcybersec.com/2018/09/first-cve-2018-12234-reflected-XSS.html", "refsource": "MISC", "url": "https://www.knowcybersec.com/2018/09/first-cve-2018-12234-reflected-XSS.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155231/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/155231/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html" } ] } diff --git a/2018/12xxx/CVE-2018-12650.json b/2018/12xxx/CVE-2018-12650.json index 32bdd59d779..fb3c74b5dc5 100644 --- a/2018/12xxx/CVE-2018-12650.json +++ b/2018/12xxx/CVE-2018-12650.json @@ -56,6 +56,11 @@ "name": "https://www.knowcybersec.com/2018/10/CVE-2018-12650-reflected-XSS.html", "refsource": "MISC", "url": "https://www.knowcybersec.com/2018/10/CVE-2018-12650-reflected-XSS.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155232/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/155232/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html" } ] } diff --git a/2018/12xxx/CVE-2018-12653.json b/2018/12xxx/CVE-2018-12653.json index bd4b51b6d00..3c78035a90b 100644 --- a/2018/12xxx/CVE-2018-12653.json +++ b/2018/12xxx/CVE-2018-12653.json @@ -33,6 +33,11 @@ "refsource": "MISC", "name": "https://www.knowcybersec.com/2019/02/CVE-2018-12653-reflected-XSS.html", "url": "https://www.knowcybersec.com/2019/02/CVE-2018-12653-reflected-XSS.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155244/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/155244/Adrenalin-Core-HCM-5.4.0-Cross-Site-Scripting.html" } ] }, diff --git a/2018/21xxx/CVE-2018-21026.json b/2018/21xxx/CVE-2018-21026.json new file mode 100644 index 00000000000..942bd99ed8e --- /dev/null +++ b/2018/21xxx/CVE-2018-21026.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-21026", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability in Hitachi Command Suite 7.x and 8.x before 8.6.5-00 allows an unauthenticated remote user to read internal information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/index.html", + "refsource": "MISC", + "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/index.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2019-124/", + "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2019-124/" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10847.json b/2019/10xxx/CVE-2019-10847.json index 789cda0465b..eb9ba633534 100644 --- a/2019/10xxx/CVE-2019-10847.json +++ b/2019/10xxx/CVE-2019-10847.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://applied-risk.com/index.php/download_file/view/196/165", "url": "https://applied-risk.com/index.php/download_file/view/196/165" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155247/Computrols-CBAS-Web-19.0.0-Cross-Site-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/155247/Computrols-CBAS-Web-19.0.0-Cross-Site-Request-Forgery.html" } ] } diff --git a/2019/10xxx/CVE-2019-10849.json b/2019/10xxx/CVE-2019-10849.json index ba3fbe5a773..165d4ef46f6 100644 --- a/2019/10xxx/CVE-2019-10849.json +++ b/2019/10xxx/CVE-2019-10849.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://applied-risk.com/index.php/download_file/view/196/165", "url": "https://applied-risk.com/index.php/download_file/view/196/165" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155248/Computrols-CBAS-Web-19.0.0-Information-Disclosure.html", + "url": "http://packetstormsecurity.com/files/155248/Computrols-CBAS-Web-19.0.0-Information-Disclosure.html" } ] } diff --git a/2019/15xxx/CVE-2019-15815.json b/2019/15xxx/CVE-2019-15815.json new file mode 100644 index 00000000000..8eaf7ba75c2 --- /dev/null +++ b/2019/15xxx/CVE-2019-15815.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15815", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "ZyXEL P-1302-T10D v3 devices with firmware version 2.00(ABBX.3) and earlier do not properly enforce access control and could allow an unauthorized user to access certain pages that require admin privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.zyxel.com/support/P1302-T10D-v3-modem-insecure-direct-object-reference-vulnerability.shtml", + "url": "https://www.zyxel.com/support/P1302-T10D-v3-modem-insecure-direct-object-reference-vulnerability.shtml" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17360.json b/2019/17xxx/CVE-2019-17360.json new file mode 100644 index 00000000000..12e245a1f85 --- /dev/null +++ b/2019/17xxx/CVE-2019-17360.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17360", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability in Hitachi Command Suite 7.x and 8.x before 8.7.0-00 allows an unauthenticated remote user to trigger a denial of service (DoS) condition because of Uncontrolled Resource Consumption." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/index.html", + "refsource": "MISC", + "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/index.html" + }, + { + "refsource": "CONFIRM", + "name": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2019-125/", + "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2019-125/" + } + ] + } +} \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3398.json b/2019/3xxx/CVE-2019-3398.json index 28f0e4f5690..7815d862e3c 100644 --- a/2019/3xxx/CVE-2019-3398.json +++ b/2019/3xxx/CVE-2019-3398.json @@ -109,6 +109,16 @@ "refsource": "BID", "name": "108067", "url": "http://www.securityfocus.com/bid/108067" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html", + "url": "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html", + "url": "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html" } ] }