diff --git a/2019/10xxx/CVE-2019-10340.json b/2019/10xxx/CVE-2019-10340.json index 876b3fc3bd5..947c4896631 100644 --- a/2019/10xxx/CVE-2019-10340.json +++ b/2019/10xxx/CVE-2019-10340.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10341.json b/2019/10xxx/CVE-2019-10341.json index fa0f91cf22f..63b8f457b16 100644 --- a/2019/10xxx/CVE-2019-10341.json +++ b/2019/10xxx/CVE-2019-10341.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1010" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10342.json b/2019/10xxx/CVE-2019-10342.json index 847bcf0fa9d..12a5f5d6ef1 100644 --- a/2019/10xxx/CVE-2019-10342.json +++ b/2019/10xxx/CVE-2019-10342.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1400" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10346.json b/2019/10xxx/CVE-2019-10346.json index 64e5aec0028..c0a884aab5c 100644 --- a/2019/10xxx/CVE-2019-10346.json +++ b/2019/10xxx/CVE-2019-10346.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1419" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10347.json b/2019/10xxx/CVE-2019-10347.json index 5e1144600dd..5c7ea3153f8 100644 --- a/2019/10xxx/CVE-2019-10347.json +++ b/2019/10xxx/CVE-2019-10347.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-775" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10348.json b/2019/10xxx/CVE-2019-10348.json index 8f7764bcbf8..7d8fa9c779c 100644 --- a/2019/10xxx/CVE-2019-10348.json +++ b/2019/10xxx/CVE-2019-10348.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1438" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10349.json b/2019/10xxx/CVE-2019-10349.json index bf4b13f56b2..97be89012b1 100644 --- a/2019/10xxx/CVE-2019-10349.json +++ b/2019/10xxx/CVE-2019-10349.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1177" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10350.json b/2019/10xxx/CVE-2019-10350.json index 2fded9ddd03..12e1c1a5037 100644 --- a/2019/10xxx/CVE-2019-10350.json +++ b/2019/10xxx/CVE-2019-10350.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1441" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10351.json b/2019/10xxx/CVE-2019-10351.json index f389ab0d798..8a991325892 100644 --- a/2019/10xxx/CVE-2019-10351.json +++ b/2019/10xxx/CVE-2019-10351.json @@ -56,6 +56,11 @@ "url": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437", "refsource": "MISC", "name": "https://jenkins.io/security/advisory/2019-07-11/#SECURITY-1437" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190711 Multiple vulnerabilities in Jenkins plugins", + "url": "http://www.openwall.com/lists/oss-security/2019/07/11/4" } ] } diff --git a/2019/10xxx/CVE-2019-10651.json b/2019/10xxx/CVE-2019-10651.json index 06fcbbf185a..8ba76a6618b 100644 --- a/2019/10xxx/CVE-2019-10651.json +++ b/2019/10xxx/CVE-2019-10651.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-10651", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-10651", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Core Server in Ivanti Endpoint Manager (EPM) 2017.3 before SU7 and 2018.x before 2018.3 SU3, with remote code execution. In other words, the issue affects 2017.3, 2018.1, and 2018.3 installations that lack the April 2019 update." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019", + "url": "https://forums.ivanti.com/s/article/Security-Alert-Ivanti-Endpoint-Manager-April-2019" } ] } diff --git a/2019/13xxx/CVE-2019-13564.json b/2019/13xxx/CVE-2019-13564.json new file mode 100644 index 00000000000..3dca6be6b71 --- /dev/null +++ b/2019/13xxx/CVE-2019-13564.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13564", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "XSS exists in Ping Identity Agentless Integration Kit before 1.5." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.pingidentity.com/s/document-item?bundleId=integrations&topicId=Integration_Kits%2FAgentless%2FagentlessIK_c_changelog.html", + "url": "https://support.pingidentity.com/s/document-item?bundleId=integrations&topicId=Integration_Kits%2FAgentless%2FagentlessIK_c_changelog.html" + } + ] + } +} \ No newline at end of file