"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-12-05 18:01:02 +00:00
parent 0569817297
commit 87f2113697
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
25 changed files with 628 additions and 16 deletions

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-1104",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "jasig project",
"product": {
"product_data": [
{
"product_name": "phpCAS",
"version": {
"version_data": [
{
"version_value": "1.2.2"
}
]
}
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,48 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper management of service proxying"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2012-1104",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2012-1104"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1104",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1104"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2012/03/05/7",
"url": "http://www.openwall.com/lists/oss-security/2012/03/05/7"
},
{
"refsource": "MISC",
"name": "https://www.securityfocus.com/bid/52279",
"url": "https://www.securityfocus.com/bid/52279"
},
{
"refsource": "CONFIRM",
"name": "https://gitlab.vsb.cz/kal0178/sixmon/blob/b18bcde090dc38fc968a0b1e38d1dab08b8c369e/web/lib/CAS/CAS-1.3.5/docs/ChangeLog",
"url": "https://gitlab.vsb.cz/kal0178/sixmon/blob/b18bcde090dc38fc968a0b1e38d1dab08b8c369e/web/lib/CAS/CAS-1.3.5/docs/ChangeLog"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-17387",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An authentication flaw in the AVPNC_RP service in Aviatrix VPN Client through 2.2.10 allows an attacker to gain elevated privileges through arbitrary code execution on Windows, Linux, and macOS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html",
"refsource": "MISC",
"name": "https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html"
},
{
"url": "https://immersivelabs.com/blog/",
"refsource": "MISC",
"name": "https://immersivelabs.com/blog/"
},
{
"refsource": "MISC",
"name": "https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/",
"url": "https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-17388",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Weak file permissions applied to the Aviatrix VPN Client through 2.2.10 installation directory on Windows and Linux allow a local attacker to execute arbitrary code by gaining elevated privileges through file modifications."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html",
"refsource": "MISC",
"name": "https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html"
},
{
"url": "https://immersivelabs.com/blog/",
"refsource": "MISC",
"name": "https://immersivelabs.com/blog/"
},
{
"refsource": "MISC",
"name": "https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/",
"url": "https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-18381",
"ASSIGNER": "secure@symantec.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Norton Password Manager",
"version": {
"version_data": [
{
"version_value": "prior to 6.6.2.5"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CORS"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.symantec.com/us/en/article.SYMSA1499.html",
"url": "https://support.symantec.com/us/en/article.SYMSA1499.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Norton Password Manager, prior to 6.6.2.5, may be susceptible to a cross origin resource sharing (CORS) vulnerability, which is a type of issue that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served."
}
]
}
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "https://news.ycombinator.com/item?id=21681976",
"url": "https://news.ycombinator.com/item?id=21681976"
},
{
"refsource": "UBUNTU",
"name": "USN-4214-1",
"url": "https://usn.ubuntu.com/4214-1/"
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19545",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@symantec.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Norton Password Manager",
"version": {
"version_data": [
{
"version_value": "prior to 6.6.2.5"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CORS"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.symantec.com/us/en/article.SYMSA1499.html",
"url": "https://support.symantec.com/us/en/article.SYMSA1499.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Norton Password Manager, prior to 6.6.2.5, may be susceptible to a cross origin resource sharing (CORS) vulnerability, which is a type of issue that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served."
}
]
}

View File

@ -4,14 +4,58 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19546",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@symantec.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Norton Password Manager",
"version": {
"version_data": [
{
"version_value": "prior to 6.6.2.5"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://support.symantec.com/us/en/article.SYMSA1499.html",
"url": "https://support.symantec.com/us/en/article.SYMSA1499.html"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Norton Password Manager, prior to 6.6.2.5, may be susceptible to an information disclosure issue, which is a type of vulnerability whereby there is an unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information."
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://xenbits.xen.org/xsa/advisory-306.html",
"url": "http://xenbits.xen.org/xsa/advisory-306.html"
},
{
"url": "https://xenbits.xen.org/xsa/advisory-306.html",
"refsource": "MISC",

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19604",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19605",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19606",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19607",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19608",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -121,6 +121,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -117,6 +117,16 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2565",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4110",
"url": "https://access.redhat.com/errata/RHSA-2019:4110"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:4109",
"url": "https://access.redhat.com/errata/RHSA-2019:4109"
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-5098",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-5098",
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "AMD ATI",
"version": {
"version_data": [
{
"version_value": "AMD ATIDXX64.DLL (26.20.13001.29010) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.1.0 build-13591040) with Windows 10 x64 as guestVM"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out of bounds read"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0890",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0890"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.29010. A specially crafted pixel shader can cause out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host."
}
]
}