mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-21 05:40:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
42de01d933
commit
93e89bba82
@ -231,6 +231,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3292",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3297",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -291,6 +291,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3292",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3297",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -281,6 +281,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3292",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3297",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
72
2019/16xxx/CVE-2019-16675.json
Normal file
72
2019/16xxx/CVE-2019-16675.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16675",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://cert.vde.com/en-us/advisories",
|
||||
"refsource": "MISC",
|
||||
"name": "https://cert.vde.com/en-us/advisories"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-922/",
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-922/"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-302-01",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-302-01"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/16xxx/CVE-2019-16906.json
Normal file
62
2019/16xxx/CVE-2019-16906.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16906",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in the Infosysta \"In-App & Desktop Notifications\" app 1.6.13_J8 for Jira. By using plugins/servlet/nfj/PushNotification?username= with a modified username, a different user's notifications can be read without authentication/authorization. These notifications are then no longer displayed to the normal user."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/154991/Infosysta-Jira-1.6.13_J8-Push-Notification-Authentication-Bypass.html",
|
||||
"url": "http://packetstormsecurity.com/files/154991/Infosysta-Jira-1.6.13_J8-Push-Notification-Authentication-Bypass.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/16xxx/CVE-2019-16907.json
Normal file
62
2019/16xxx/CVE-2019-16907.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-16907",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue was discovered in the Infosysta \"In-App & Desktop Notifications\" app 1.6.13_J8 for Jira. It is possible to obtain a list of all valid Jira usernames without authentication/authorization via the plugins/servlet/nfj/UserFilter?searchQuery=@ URI."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/154993/Infosysta-Jira-1.6.13_J8-User-Name-Disclosure.html",
|
||||
"url": "http://packetstormsecurity.com/files/154993/Infosysta-Jira-1.6.13_J8-User-Name-Disclosure.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/18xxx/CVE-2019-18226.json
Normal file
62
2019/18xxx/CVE-2019-18226.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-18226",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Honeywell equIP series and Performance series IP cameras and recorders",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "equIP Series Cameras Model Vulnerability fixed from versions, multiple versions, and Performance Series Cameras Model Vulnerability fixed from version, multiple versions, and Recorders Vulnerability fixed from version, multiple versions."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-04",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-04"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/18xxx/CVE-2019-18227.json
Normal file
62
2019/18xxx/CVE-2019-18227.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-18227",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Advantech WISE-PaaS/RMM",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Versions 3.3.29 and prior"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/18xxx/CVE-2019-18228.json
Normal file
62
2019/18xxx/CVE-2019-18228.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-18228",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Honeywell equIP series IP cameras",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "H4L2GR1 prior to 2.420.HW01.33.20190812, HBL2GR1 prior to 2.420.HW01.33.20190812, HCL2G prior to 2.420.HW01.33.20190812, H4W2GR1 prior to 1.000.HW00.21.20190812, H4W2GR2 prior to 1.000.HW00.21.20190812, H4W4GR1 prior to 1.000.HW00.21.20190812, H3W2GR1 prior to 1.000.HW00.21.20190812, H3W2GR2 prior to 1.000.HW00.21.20190812, H3W4GR1 prior to 1.000.HW00.21.20190812, HBW2GR1 prior to 1.000.HW00.21.20190812, HBW4GR1 prior to 1.000.HW00.21.20190812, HBW2GR3 prior to 1.000.HW00.21.20190812, HCW2G prior to 1.000.HW00.21.20190812, HCW4G prior to 1.000.HW00.21.20190812"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "IMPROPER INPUT VALIDATION CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/18xxx/CVE-2019-18229.json
Normal file
62
2019/18xxx/CVE-2019-18229.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-18229",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Advantech WISE-PaaS/RMM",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Versions 3.3.29 and prior"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
62
2019/18xxx/CVE-2019-18230.json
Normal file
62
2019/18xxx/CVE-2019-18230.json
Normal file
@ -0,0 +1,62 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-18230",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Honeywell equIP & Performance series IP cameras",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "equIP Camera,Vulnability fixed from version,H2W2GR1 1.000.0000.18.20190409,H3W2GR1 1.000.HW00.21.20190812,H3W2GR1V 1.000.0000.18.20190409,H3W2GR2 1.000.HW00.21.20190812,H3W4GR1 1.000.HW00.21.20190812,H3W4GR1V 1.000.0000.18.20190409,H4D8GR1 2.420.HW00.9.20180510,H4L2GR1 1.000.0000.18.20190423,H4L2GR1V 1.000.0000.18.20190423,H4L6GR2 1.000.HW02.8.20190813,H4LGGR2 .000.HW04.3.20190813,H4W2GR1 1.000.HW00.21.20190812,H4W2GR1V 1.000.0000.18.20190409,H4W2GR2 1.000.HW00.21.20190812,H4W4GR1 1.000.HW00.21.20190812,H4W4GR1V 1.000.0000.18.20190409,HBD8GR1 2.420.HW00.9.20180510,HBL2GR1 2.420.HW01.33.20190812,HBL2GR1V 1.000.0000.18.20190423,HBL6GR2 1.000.HW04.3.20190813,HBL6GR2 1.000.HW02.8.20190813,HBW2GR1 1.000.HW00.21.20190812, HBW2GR1V 1.000.0000.18.20190409,HBW2GR3 1.000.HW00.21.20190812,HBW2GR3V 1.000.0000.18.20190409,HBW4GR1 1.000.HW00.21.20190812, HBW4GR1V 1.000.0000.18.20190409,HCD8G 2.420.HW00.9.20180510,HCL2G 1.000.0000.18.20190423,HCL2GV 1.000.0000.18.20190423,HCW2G 1.000.HW00.21.20190812,HCW2GV 1.000.0000.18.20190409,HCW4G 1.000.HW00.21.20190812,HDZ302D 1.000.0041.20180530,HDZ302DE 1.000.0041.20180530,HDZ302DIN 1.000.0041.20180530,HDZ302DIN-C1 1.000.0041.20180530,HDZ302DIN-S1 1.000.0041.20180530,HDZ302LIK 1.000.61.1.20180607,HDZ302LIW 1.000.61.1.20180607,HFD6GR1 1.000.HW00.9.20180510,HFD8GR1 1.000.HW00.9.20180510,HM4L8GR1 1.000.HW02.8.20190813,HMBL8GR1 1.000.HW02.8.20190813,Performance Series Vulnability fixed from version,H4D8PR1 1.000.HW01.3.20190820,HFD5PR1 1.000.HW01.1.20190822,HPW2P1 1.000.HW01.3.20190820,HDZP304DI 1.000.HW10.5.20190812,HDZP252DI 1.000.HW02.3.20181109"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03",
|
||||
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user