From abb9bdc268ce68253453c32162824dc6f415237a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 20 Nov 2019 22:01:54 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/0xxx/CVE-2018-0577.json | 5 +++ 2018/0xxx/CVE-2018-0585.json | 5 +++ 2018/0xxx/CVE-2018-0586.json | 5 +++ 2018/0xxx/CVE-2018-0587.json | 5 +++ 2018/0xxx/CVE-2018-0588.json | 5 +++ 2018/0xxx/CVE-2018-0589.json | 5 +++ 2018/0xxx/CVE-2018-0590.json | 5 +++ 2018/20xxx/CVE-2018-20965.json | 5 +++ 2019/19xxx/CVE-2019-19127.json | 18 ++++++++ 2019/19xxx/CVE-2019-19128.json | 18 ++++++++ 2019/19xxx/CVE-2019-19129.json | 18 ++++++++ 2019/19xxx/CVE-2019-19130.json | 18 ++++++++ 2019/2xxx/CVE-2019-2938.json | 5 +++ 2019/2xxx/CVE-2019-2974.json | 5 +++ 2019/6xxx/CVE-2019-6852.json | 73 ++++++++++++++++++++++++++++---- 2019/6xxx/CVE-2019-6853.json | 76 ++++++++++++++++++++++++++++++---- 16 files changed, 257 insertions(+), 14 deletions(-) create mode 100644 2019/19xxx/CVE-2019-19127.json create mode 100644 2019/19xxx/CVE-2019-19128.json create mode 100644 2019/19xxx/CVE-2019-19129.json create mode 100644 2019/19xxx/CVE-2019-19130.json diff --git a/2018/0xxx/CVE-2018-0577.json b/2018/0xxx/CVE-2018-0577.json index 9d261ed57a8..38252d2abaa 100644 --- a/2018/0xxx/CVE-2018-0577.json +++ b/2018/0xxx/CVE-2018-0577.json @@ -61,6 +61,11 @@ "name": "JVN#01040170", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN01040170/index.html" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9610", + "url": "https://wpvulndb.com/vulnerabilities/9610" } ] } diff --git a/2018/0xxx/CVE-2018-0585.json b/2018/0xxx/CVE-2018-0585.json index bd1b5e9a963..e7e85929db1 100644 --- a/2018/0xxx/CVE-2018-0585.json +++ b/2018/0xxx/CVE-2018-0585.json @@ -61,6 +61,11 @@ "name": "https://wordpress.org/plugins/ultimate-member/#developers", "refsource": "CONFIRM", "url": "https://wordpress.org/plugins/ultimate-member/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9608", + "url": "https://wpvulndb.com/vulnerabilities/9608" } ] } diff --git a/2018/0xxx/CVE-2018-0586.json b/2018/0xxx/CVE-2018-0586.json index dfe7d319a77..a142befbaab 100644 --- a/2018/0xxx/CVE-2018-0586.json +++ b/2018/0xxx/CVE-2018-0586.json @@ -61,6 +61,11 @@ "name": "https://wordpress.org/plugins/ultimate-member/#developers", "refsource": "CONFIRM", "url": "https://wordpress.org/plugins/ultimate-member/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9608", + "url": "https://wpvulndb.com/vulnerabilities/9608" } ] } diff --git a/2018/0xxx/CVE-2018-0587.json b/2018/0xxx/CVE-2018-0587.json index da22a1b65ff..31723bddf28 100644 --- a/2018/0xxx/CVE-2018-0587.json +++ b/2018/0xxx/CVE-2018-0587.json @@ -61,6 +61,11 @@ "name": "https://wordpress.org/plugins/ultimate-member/#developers", "refsource": "CONFIRM", "url": "https://wordpress.org/plugins/ultimate-member/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9608", + "url": "https://wpvulndb.com/vulnerabilities/9608" } ] } diff --git a/2018/0xxx/CVE-2018-0588.json b/2018/0xxx/CVE-2018-0588.json index b109e0ad9e9..c8be68bed32 100644 --- a/2018/0xxx/CVE-2018-0588.json +++ b/2018/0xxx/CVE-2018-0588.json @@ -61,6 +61,11 @@ "name": "https://wordpress.org/plugins/ultimate-member/#developers", "refsource": "CONFIRM", "url": "https://wordpress.org/plugins/ultimate-member/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9608", + "url": "https://wpvulndb.com/vulnerabilities/9608" } ] } diff --git a/2018/0xxx/CVE-2018-0589.json b/2018/0xxx/CVE-2018-0589.json index 100ff4b496b..fc7121cd5aa 100644 --- a/2018/0xxx/CVE-2018-0589.json +++ b/2018/0xxx/CVE-2018-0589.json @@ -61,6 +61,11 @@ "name": "https://wordpress.org/plugins/ultimate-member/#developers", "refsource": "CONFIRM", "url": "https://wordpress.org/plugins/ultimate-member/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9608", + "url": "https://wpvulndb.com/vulnerabilities/9608" } ] } diff --git a/2018/0xxx/CVE-2018-0590.json b/2018/0xxx/CVE-2018-0590.json index 5dfaa833690..d0b81d5ad03 100644 --- a/2018/0xxx/CVE-2018-0590.json +++ b/2018/0xxx/CVE-2018-0590.json @@ -61,6 +61,11 @@ "name": "https://wordpress.org/plugins/ultimate-member/#developers", "refsource": "CONFIRM", "url": "https://wordpress.org/plugins/ultimate-member/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9608", + "url": "https://wpvulndb.com/vulnerabilities/9608" } ] } diff --git a/2018/20xxx/CVE-2018-20965.json b/2018/20xxx/CVE-2018-20965.json index e77694d8b64..b9dca8f9d05 100644 --- a/2018/20xxx/CVE-2018-20965.json +++ b/2018/20xxx/CVE-2018-20965.json @@ -56,6 +56,11 @@ "url": "https://wordpress.org/plugins/ultimate-member/#developers", "refsource": "MISC", "name": "https://wordpress.org/plugins/ultimate-member/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9608", + "url": "https://wpvulndb.com/vulnerabilities/9608" } ] } diff --git a/2019/19xxx/CVE-2019-19127.json b/2019/19xxx/CVE-2019-19127.json new file mode 100644 index 00000000000..dc43a6cfe54 --- /dev/null +++ b/2019/19xxx/CVE-2019-19127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19128.json b/2019/19xxx/CVE-2019-19128.json new file mode 100644 index 00000000000..2d750d13af3 --- /dev/null +++ b/2019/19xxx/CVE-2019-19128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19129.json b/2019/19xxx/CVE-2019-19129.json new file mode 100644 index 00000000000..f3a4557363d --- /dev/null +++ b/2019/19xxx/CVE-2019-19129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19130.json b/2019/19xxx/CVE-2019-19130.json new file mode 100644 index 00000000000..94d364412f6 --- /dev/null +++ b/2019/19xxx/CVE-2019-19130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/2xxx/CVE-2019-2938.json b/2019/2xxx/CVE-2019-2938.json index bda3ad9de40..aeea6eec917 100644 --- a/2019/2xxx/CVE-2019-2938.json +++ b/2019/2xxx/CVE-2019-2938.json @@ -86,6 +86,11 @@ "refsource": "UBUNTU", "name": "USN-4195-1", "url": "https://usn.ubuntu.com/4195-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4195-2", + "url": "https://usn.ubuntu.com/4195-2/" } ] } diff --git a/2019/2xxx/CVE-2019-2974.json b/2019/2xxx/CVE-2019-2974.json index 32685d16074..6cac294184e 100644 --- a/2019/2xxx/CVE-2019-2974.json +++ b/2019/2xxx/CVE-2019-2974.json @@ -90,6 +90,11 @@ "refsource": "UBUNTU", "name": "USN-4195-1", "url": "https://usn.ubuntu.com/4195-1/" + }, + { + "refsource": "UBUNTU", + "name": "USN-4195-2", + "url": "https://usn.ubuntu.com/4195-2/" } ] } diff --git a/2019/6xxx/CVE-2019-6852.json b/2019/6xxx/CVE-2019-6852.json index b40519ecef9..ce4bd4daa84 100644 --- a/2019/6xxx/CVE-2019-6852.json +++ b/2019/6xxx/CVE-2019-6852.json @@ -1,17 +1,76 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6852", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6852", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric", + "product": { + "product_data": [ + { + "product_name": "Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions)", + "version": { + "version_data": [ + { + "version_value": "Modicon Controllers (M340 CPUs" + }, + { + "version_value": "M340 communication modules" + }, + { + "version_value": "Premium CPUs" + }, + { + "version_value": "Premium communication modules" + }, + { + "version_value": "Quantum CPUs" + }, + { + "version_value": "Quantum communication modules - see security notification for specific versions)" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200: Information Exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-281-02/", + "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-281-02/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP hardcoded credentials when using the Web server of the controller on an unsecure network." } ] } diff --git a/2019/6xxx/CVE-2019-6853.json b/2019/6xxx/CVE-2019-6853.json index a3572f1322f..272363b9c63 100644 --- a/2019/6xxx/CVE-2019-6853.json +++ b/2019/6xxx/CVE-2019-6853.json @@ -1,17 +1,79 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-6853", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-6853", + "ASSIGNER": "cybersecurity@schneider-electric.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Schneider Electric", + "product": { + "product_data": [ + { + "product_name": "Andover Continuum models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702", + "version": { + "version_data": [ + { + "version_value": "Andover Continuum models 9680" + }, + { + "version_value": "5740 and 5720" + }, + { + "version_value": "bCX4040" + }, + { + "version_value": "bCX9640" + }, + { + "version_value": "9900" + }, + { + "version_value": "9940" + }, + { + "version_value": "9924 and 9702" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Failure to Preserve Web Page Structure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.se.com/ww/en/download/document/SEVD-2019-316-01/", + "url": "https://www.se.com/ww/en/download/document/SEVD-2019-316-01/" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server." } ] }