diff --git a/2019/10xxx/CVE-2019-10401.json b/2019/10xxx/CVE-2019-10401.json index 8a705893c58..8e8ee134d6e 100644 --- a/2019/10xxx/CVE-2019-10401.json +++ b/2019/10xxx/CVE-2019-10401.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10401", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10402.json b/2019/10xxx/CVE-2019-10402.json index 640945e2de6..68bc76a853f 100644 --- a/2019/10xxx/CVE-2019-10402.json +++ b/2019/10xxx/CVE-2019-10402.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10402", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10403.json b/2019/10xxx/CVE-2019-10403.json index 5b769f623c8..c788af6bece 100644 --- a/2019/10xxx/CVE-2019-10403.json +++ b/2019/10xxx/CVE-2019-10403.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10403", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10404.json b/2019/10xxx/CVE-2019-10404.json index 60e521e92b4..7710bae22d9 100644 --- a/2019/10xxx/CVE-2019-10404.json +++ b/2019/10xxx/CVE-2019-10404.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10404", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10405.json b/2019/10xxx/CVE-2019-10405.json index 94de754994c..7fa9ffc2d3a 100644 --- a/2019/10xxx/CVE-2019-10405.json +++ b/2019/10xxx/CVE-2019-10405.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10405", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10406.json b/2019/10xxx/CVE-2019-10406.json index f27ca7d9d4a..d97a7d90390 100644 --- a/2019/10xxx/CVE-2019-10406.json +++ b/2019/10xxx/CVE-2019-10406.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10406", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10407.json b/2019/10xxx/CVE-2019-10407.json index 1bd5bd547ec..04a9b986a81 100644 --- a/2019/10xxx/CVE-2019-10407.json +++ b/2019/10xxx/CVE-2019-10407.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10407", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10408.json b/2019/10xxx/CVE-2019-10408.json index 71e8e38d90c..cd91c0dcf79 100644 --- a/2019/10xxx/CVE-2019-10408.json +++ b/2019/10xxx/CVE-2019-10408.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10408", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10409.json b/2019/10xxx/CVE-2019-10409.json index 45ae5730b7c..a5e2089ee9a 100644 --- a/2019/10xxx/CVE-2019-10409.json +++ b/2019/10xxx/CVE-2019-10409.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10409", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10410.json b/2019/10xxx/CVE-2019-10410.json index ff17351850e..4cb497bf67f 100644 --- a/2019/10xxx/CVE-2019-10410.json +++ b/2019/10xxx/CVE-2019-10410.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10410", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10411.json b/2019/10xxx/CVE-2019-10411.json index f38df72cce5..9fb4b303588 100644 --- a/2019/10xxx/CVE-2019-10411.json +++ b/2019/10xxx/CVE-2019-10411.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10411", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10412.json b/2019/10xxx/CVE-2019-10412.json index 8f2cf21f28d..06462b0e6ac 100644 --- a/2019/10xxx/CVE-2019-10412.json +++ b/2019/10xxx/CVE-2019-10412.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10412", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10413.json b/2019/10xxx/CVE-2019-10413.json index 8049c09e638..7ef10ce6e66 100644 --- a/2019/10xxx/CVE-2019-10413.json +++ b/2019/10xxx/CVE-2019-10413.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10413", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10414.json b/2019/10xxx/CVE-2019-10414.json index 17f9954c686..878236c27ee 100644 --- a/2019/10xxx/CVE-2019-10414.json +++ b/2019/10xxx/CVE-2019-10414.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10414", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10415.json b/2019/10xxx/CVE-2019-10415.json index a41c0feafb7..7e1f8ffaeea 100644 --- a/2019/10xxx/CVE-2019-10415.json +++ b/2019/10xxx/CVE-2019-10415.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10415", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10416.json b/2019/10xxx/CVE-2019-10416.json index a93727fc670..8694d04086c 100644 --- a/2019/10xxx/CVE-2019-10416.json +++ b/2019/10xxx/CVE-2019-10416.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10416", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10417.json b/2019/10xxx/CVE-2019-10417.json index ffa8f35b2c1..402071621fe 100644 --- a/2019/10xxx/CVE-2019-10417.json +++ b/2019/10xxx/CVE-2019-10417.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10417", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10418.json b/2019/10xxx/CVE-2019-10418.json index 74b9e358870..c49871782c9 100644 --- a/2019/10xxx/CVE-2019-10418.json +++ b/2019/10xxx/CVE-2019-10418.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10418", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10419.json b/2019/10xxx/CVE-2019-10419.json index 2e745ebc91d..47257db32d1 100644 --- a/2019/10xxx/CVE-2019-10419.json +++ b/2019/10xxx/CVE-2019-10419.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10419", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10420.json b/2019/10xxx/CVE-2019-10420.json index 1963ca70d61..bcf3b26dd1c 100644 --- a/2019/10xxx/CVE-2019-10420.json +++ b/2019/10xxx/CVE-2019-10420.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10420", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10421.json b/2019/10xxx/CVE-2019-10421.json index 5a99fb99632..f20e15800cc 100644 --- a/2019/10xxx/CVE-2019-10421.json +++ b/2019/10xxx/CVE-2019-10421.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10421", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10422.json b/2019/10xxx/CVE-2019-10422.json index afbc5cc4791..7ab964e4d3f 100644 --- a/2019/10xxx/CVE-2019-10422.json +++ b/2019/10xxx/CVE-2019-10422.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10422", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10423.json b/2019/10xxx/CVE-2019-10423.json index 128edce0f6b..8251b122604 100644 --- a/2019/10xxx/CVE-2019-10423.json +++ b/2019/10xxx/CVE-2019-10423.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10423", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10424.json b/2019/10xxx/CVE-2019-10424.json index 366c912f648..a59f39de3b2 100644 --- a/2019/10xxx/CVE-2019-10424.json +++ b/2019/10xxx/CVE-2019-10424.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10424", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10425.json b/2019/10xxx/CVE-2019-10425.json index 3fea55a2597..7e964e25145 100644 --- a/2019/10xxx/CVE-2019-10425.json +++ b/2019/10xxx/CVE-2019-10425.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10425", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10426.json b/2019/10xxx/CVE-2019-10426.json index 38ca9a2caaf..5d2215d66e5 100644 --- a/2019/10xxx/CVE-2019-10426.json +++ b/2019/10xxx/CVE-2019-10426.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10426", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10427.json b/2019/10xxx/CVE-2019-10427.json index eee7ea3dd26..eb852bd7284 100644 --- a/2019/10xxx/CVE-2019-10427.json +++ b/2019/10xxx/CVE-2019-10427.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10427", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10428.json b/2019/10xxx/CVE-2019-10428.json index 19073e7d60a..743be51b39f 100644 --- a/2019/10xxx/CVE-2019-10428.json +++ b/2019/10xxx/CVE-2019-10428.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10428", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10429.json b/2019/10xxx/CVE-2019-10429.json index 485e0bd1775..499fab62d29 100644 --- a/2019/10xxx/CVE-2019-10429.json +++ b/2019/10xxx/CVE-2019-10429.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10429", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/10xxx/CVE-2019-10430.json b/2019/10xxx/CVE-2019-10430.json index fa530fac408..01a4e2e1a72 100644 --- a/2019/10xxx/CVE-2019-10430.json +++ b/2019/10xxx/CVE-2019-10430.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10430", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { diff --git a/2019/16xxx/CVE-2019-16194.json b/2019/16xxx/CVE-2019-16194.json new file mode 100644 index 00000000000..1c181ba4e45 --- /dev/null +++ b/2019/16xxx/CVE-2019-16194.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16194", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SQL injection vulnerabilities in Centreon through 19.04 allow attacks via the svc_id parameter in include/monitoring/status/Services/xml/makeXMLForOneService.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/centreon/centreon/pull/7862", + "url": "https://github.com/centreon/centreon/pull/7862" + }, + { + "refsource": "MISC", + "name": "https://github.com/centreon/centreon/releases", + "url": "https://github.com/centreon/centreon/releases" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16701.json b/2019/16xxx/CVE-2019-16701.json new file mode 100644 index 00000000000..784dabfd822 --- /dev/null +++ b/2019/16xxx/CVE-2019-16701.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16701", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "pfSense through 2.3.4 through 2.4.4-p3 allows Remote Code Injection via a methodCall XML document with a pfsense.exec_php call containing shell metacharacters in a parameter value." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pfsense/pfsense/commits/master", + "refsource": "MISC", + "name": "https://github.com/pfsense/pfsense/commits/master" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/154587/pfSense-2.3.4-2.4.4-p3-Remote-Code-Injection.html", + "url": "http://packetstormsecurity.com/files/154587/pfSense-2.3.4-2.4.4-p3-Remote-Code-Injection.html" + }, + { + "refsource": "MISC", + "name": "https://hackernews.blog/pfsense-2-3-4-2-4-4-p3-remote-code-injection/#more", + "url": "https://hackernews.blog/pfsense-2-3-4-2-4-4-p3-remote-code-injection/#more" + } + ] + } +} \ No newline at end of file