From 9e0ef30f1096a8984e6c940b03edd7c398df548b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 4 Oct 2019 12:01:06 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/17xxx/CVE-2019-17130.json | 62 ++++++++++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17131.json | 62 ++++++++++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17132.json | 62 ++++++++++++++++++++++++++++++++++ 2019/17xxx/CVE-2019-17133.json | 62 ++++++++++++++++++++++++++++++++++ 4 files changed, 248 insertions(+) create mode 100644 2019/17xxx/CVE-2019-17130.json create mode 100644 2019/17xxx/CVE-2019-17131.json create mode 100644 2019/17xxx/CVE-2019-17132.json create mode 100644 2019/17xxx/CVE-2019-17133.json diff --git a/2019/17xxx/CVE-2019-17130.json b/2019/17xxx/CVE-2019-17130.json new file mode 100644 index 00000000000..ae8190a4b57 --- /dev/null +++ b/2019/17xxx/CVE-2019-17130.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17130", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "vBulletin through 5.5.4 mishandles external URLs within the /core/vb/vurl.php file and the /core/vb/vurl directories." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4423391-vbulletin-5-5-5-alpha-4-available-for-download", + "refsource": "MISC", + "name": "https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4423391-vbulletin-5-5-5-alpha-4-available-for-download" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17131.json b/2019/17xxx/CVE-2019-17131.json new file mode 100644 index 00000000000..e305ba785c1 --- /dev/null +++ b/2019/17xxx/CVE-2019-17131.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17131", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "vBulletin before 5.5.4 allows clickjacking." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4421373-vbulletin-connect-5-5-4-is-now-available-for-download", + "refsource": "MISC", + "name": "https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4421373-vbulletin-connect-5-5-4-is-now-available-for-download" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17132.json b/2019/17xxx/CVE-2019-17132.json new file mode 100644 index 00000000000..987820ecdee --- /dev/null +++ b/2019/17xxx/CVE-2019-17132.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17132", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "vBulletin through 5.5.4 mishandles custom avatars." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4423646-vbulletin-5-5-x-5-5-2-5-5-3-and-5-5-4-security-patch-level-2", + "refsource": "MISC", + "name": "https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4423646-vbulletin-5-5-x-5-5-2-5-5-3-and-5-5-4-security-patch-level-2" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17133.json b/2019/17xxx/CVE-2019-17133.json new file mode 100644 index 00000000000..e35d6934678 --- /dev/null +++ b/2019/17xxx/CVE-2019-17133.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17133", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://marc.info/?l=linux-wireless&m=157018270915487&w=2", + "refsource": "MISC", + "name": "https://marc.info/?l=linux-wireless&m=157018270915487&w=2" + } + ] + } +} \ No newline at end of file