From 9b8c6aebf7e56887de2c919ed9d88f2f511277a2 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 16 Jul 2019 22:00:49 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/12xxx/CVE-2018-12897.json | 5 +++++ 2018/8xxx/CVE-2018-8453.json | 5 +++++ 2019/0xxx/CVE-2019-0319.json | 5 +++++ 2019/1010xxx/CVE-2019-1010006.json | 2 +- 2019/13xxx/CVE-2019-13359.json | 5 +++++ 2019/13xxx/CVE-2019-13360.json | 5 +++++ 2019/13xxx/CVE-2019-13383.json | 5 +++++ 2019/13xxx/CVE-2019-13605.json | 5 +++++ 8 files changed, 36 insertions(+), 1 deletion(-) diff --git a/2018/12xxx/CVE-2018-12897.json b/2018/12xxx/CVE-2018-12897.json index 81db007395e..233902df087 100644 --- a/2018/12xxx/CVE-2018-12897.json +++ b/2018/12xxx/CVE-2018-12897.json @@ -56,6 +56,11 @@ "name": "https://labs.nettitude.com/blog/solarwinds-cve-2018-12897-dameware-mini-remote-control-local-seh-buffer-overflow/", "refsource": "MISC", "url": "https://labs.nettitude.com/blog/solarwinds-cve-2018-12897-dameware-mini-remote-control-local-seh-buffer-overflow/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153668/DameWare-Remote-Support-12.0.0.509-Buffer-Overflow.html", + "url": "http://packetstormsecurity.com/files/153668/DameWare-Remote-Support-12.0.0.509-Buffer-Overflow.html" } ] } diff --git a/2018/8xxx/CVE-2018-8453.json b/2018/8xxx/CVE-2018-8453.json index 231cac6c57a..267aa51ee8c 100644 --- a/2018/8xxx/CVE-2018-8453.json +++ b/2018/8xxx/CVE-2018-8453.json @@ -231,6 +231,11 @@ "name": "105467", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105467" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html", + "url": "http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html" } ] } diff --git a/2019/0xxx/CVE-2019-0319.json b/2019/0xxx/CVE-2019-0319.json index b9e3d2ec594..a2d46993cd9 100644 --- a/2019/0xxx/CVE-2019-0319.json +++ b/2019/0xxx/CVE-2019-0319.json @@ -89,6 +89,11 @@ "refsource": "MISC", "name": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f", "url": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html", + "url": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html" } ] } diff --git a/2019/1010xxx/CVE-2019-1010006.json b/2019/1010xxx/CVE-2019-1010006.json index 86a74f9af05..9287bf116da 100644 --- a/2019/1010xxx/CVE-2019-1010006.json +++ b/2019/1010xxx/CVE-2019-1010006.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victin must open a crafted PDF file." + "value": "Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail." } ] }, diff --git a/2019/13xxx/CVE-2019-13359.json b/2019/13xxx/CVE-2019-13359.json index c62582d9071..e98c549993d 100644 --- a/2019/13xxx/CVE-2019-13359.json +++ b/2019/13xxx/CVE-2019-13359.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13359.md", "url": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13359.md" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153666/CentOS-Control-Web-Panel-0.9.8.836-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/153666/CentOS-Control-Web-Panel-0.9.8.836-Privilege-Escalation.html" } ] } diff --git a/2019/13xxx/CVE-2019-13360.json b/2019/13xxx/CVE-2019-13360.json index b470175f041..08698a82e78 100644 --- a/2019/13xxx/CVE-2019-13360.json +++ b/2019/13xxx/CVE-2019-13360.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13360.md", "url": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13360.md" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html" } ] } diff --git a/2019/13xxx/CVE-2019-13383.json b/2019/13xxx/CVE-2019-13383.json index 766e3579466..dc14662e089 100644 --- a/2019/13xxx/CVE-2019-13383.json +++ b/2019/13xxx/CVE-2019-13383.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13383.md", "url": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13383.md" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153667/CentOS-Control-Web-Panel-0.9.8.838-User-Enumeration.html", + "url": "http://packetstormsecurity.com/files/153667/CentOS-Control-Web-Panel-0.9.8.838-User-Enumeration.html" } ] } diff --git a/2019/13xxx/CVE-2019-13605.json b/2019/13xxx/CVE-2019-13605.json index 690a494dedd..b3860faaef0 100644 --- a/2019/13xxx/CVE-2019-13605.json +++ b/2019/13xxx/CVE-2019-13605.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13605.md", "url": "https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-2019-13605.md" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/153665/CentOS-Control-Web-Panel-0.9.8.836-Authentication-Bypass.html" } ] }