"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-31 22:01:14 +00:00
parent 42de01d933
commit 93e89bba82
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
11 changed files with 521 additions and 0 deletions

View File

@ -231,6 +231,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3292",
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3297",
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
}
]
}

View File

@ -291,6 +291,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3292",
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3297",
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
}
]
}

View File

@ -281,6 +281,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:3292",
"url": "https://access.redhat.com/errata/RHSA-2019:3292"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3297",
"url": "https://access.redhat.com/errata/RHSA-2019:3297"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16675",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://cert.vde.com/en-us/advisories",
"refsource": "MISC",
"name": "https://cert.vde.com/en-us/advisories"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-19-922/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-19-922/"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-302-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-302-01"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16906",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Infosysta \"In-App & Desktop Notifications\" app 1.6.13_J8 for Jira. By using plugins/servlet/nfj/PushNotification?username= with a modified username, a different user's notifications can be read without authentication/authorization. These notifications are then no longer displayed to the normal user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154991/Infosysta-Jira-1.6.13_J8-Push-Notification-Authentication-Bypass.html",
"url": "http://packetstormsecurity.com/files/154991/Infosysta-Jira-1.6.13_J8-Push-Notification-Authentication-Bypass.html"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16907",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Infosysta \"In-App & Desktop Notifications\" app 1.6.13_J8 for Jira. It is possible to obtain a list of all valid Jira usernames without authentication/authorization via the plugins/servlet/nfj/UserFilter?searchQuery=@ URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154993/Infosysta-Jira-1.6.13_J8-User-Name-Disclosure.html",
"url": "http://packetstormsecurity.com/files/154993/Infosysta-Jira-1.6.13_J8-User-Name-Disclosure.html"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-18226",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Honeywell equIP series and Performance series IP cameras and recorders",
"version": {
"version_data": [
{
"version_value": "equIP Series Cameras Model Vulnerability fixed from versions, multiple versions, and Performance Series Cameras Model Vulnerability fixed from version, multiple versions, and Recorders Vulnerability fixed from version, multiple versions."
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-04",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-04"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-18227",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Advantech WISE-PaaS/RMM",
"version": {
"version_data": [
{
"version_value": "Versions 3.3.29 and prior"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-18228",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Honeywell equIP series IP cameras",
"version": {
"version_data": [
{
"version_value": "H4L2GR1 prior to 2.420.HW01.33.20190812, HBL2GR1 prior to 2.420.HW01.33.20190812, HCL2G prior to 2.420.HW01.33.20190812, H4W2GR1 prior to 1.000.HW00.21.20190812, H4W2GR2 prior to 1.000.HW00.21.20190812, H4W4GR1 prior to 1.000.HW00.21.20190812, H3W2GR1 prior to 1.000.HW00.21.20190812, H3W2GR2 prior to 1.000.HW00.21.20190812, H3W4GR1 prior to 1.000.HW00.21.20190812, HBW2GR1 prior to 1.000.HW00.21.20190812, HBW4GR1 prior to 1.000.HW00.21.20190812, HBW2GR3 prior to 1.000.HW00.21.20190812, HCW2G prior to 1.000.HW00.21.20190812, HCW4G prior to 1.000.HW00.21.20190812"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER INPUT VALIDATION CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-02"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-18229",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Advantech WISE-PaaS/RMM",
"version": {
"version_data": [
{
"version_value": "Versions 3.3.29 and prior"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-01"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-18230",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Honeywell equIP & Performance series IP cameras",
"version": {
"version_data": [
{
"version_value": "equIP Camera,Vulnability fixed from version,H2W2GR1 1.000.0000.18.20190409,H3W2GR1 1.000.HW00.21.20190812,H3W2GR1V 1.000.0000.18.20190409,H3W2GR2 1.000.HW00.21.20190812,H3W4GR1 1.000.HW00.21.20190812,H3W4GR1V 1.000.0000.18.20190409,H4D8GR1 2.420.HW00.9.20180510,H4L2GR1 1.000.0000.18.20190423,H4L2GR1V 1.000.0000.18.20190423,H4L6GR2 1.000.HW02.8.20190813,H4LGGR2 .000.HW04.3.20190813,H4W2GR1 1.000.HW00.21.20190812,H4W2GR1V 1.000.0000.18.20190409,H4W2GR2 1.000.HW00.21.20190812,H4W4GR1 1.000.HW00.21.20190812,H4W4GR1V 1.000.0000.18.20190409,HBD8GR1 2.420.HW00.9.20180510,HBL2GR1 2.420.HW01.33.20190812,HBL2GR1V 1.000.0000.18.20190423,HBL6GR2 1.000.HW04.3.20190813,HBL6GR2 1.000.HW02.8.20190813,HBW2GR1 1.000.HW00.21.20190812, HBW2GR1V 1.000.0000.18.20190409,HBW2GR3 1.000.HW00.21.20190812,HBW2GR3V 1.000.0000.18.20190409,HBW4GR1 1.000.HW00.21.20190812, HBW4GR1V 1.000.0000.18.20190409,HCD8G 2.420.HW00.9.20180510,HCL2G 1.000.0000.18.20190423,HCL2GV 1.000.0000.18.20190423,HCW2G 1.000.HW00.21.20190812,HCW2GV 1.000.0000.18.20190409,HCW4G 1.000.HW00.21.20190812,HDZ302D 1.000.0041.20180530,HDZ302DE 1.000.0041.20180530,HDZ302DIN 1.000.0041.20180530,HDZ302DIN-C1 1.000.0041.20180530,HDZ302DIN-S1 1.000.0041.20180530,HDZ302LIK 1.000.61.1.20180607,HDZ302LIW 1.000.61.1.20180607,HFD6GR1 1.000.HW00.9.20180510,HFD8GR1 1.000.HW00.9.20180510,HM4L8GR1 1.000.HW02.8.20190813,HMBL8GR1 1.000.HW02.8.20190813,Performance Series Vulnability fixed from version,H4D8PR1 1.000.HW01.3.20190820,HFD5PR1 1.000.HW01.1.20190822,HPW2P1 1.000.HW01.3.20190820,HDZP304DI 1.000.HW10.5.20190812,HDZP252DI 1.000.HW02.3.20181109"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-306"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-304-03"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP."
}
]
}
}