diff --git a/2017/18xxx/CVE-2017-18107.json b/2017/18xxx/CVE-2017-18107.json index bcd822582c3..e3616747f62 100644 --- a/2017/18xxx/CVE-2017-18107.json +++ b/2017/18xxx/CVE-2017-18107.json @@ -1,62 +1,64 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2019-02-07T00:00:00", - "ID": "CVE-2017-18107", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Crowd", - "version": { - "version_data": [ - { - "version_value": "3.1.1", - "version_affected": "<" - } - ] - } - } - ] - }, - "vendor_name": "Atlassian" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Various resources in the Crowd Demo application of Atlassian Crowd before version 3.1.1 allow remote attackers to modify add, modify and delete users & groups via a Cross-site request forgery (CSRF) vulnerability. Please be aware that the Demo application is not enabled by default." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Cross-Site Request Forgery (CSRF)" - } + "CVE_data_meta": { + "ASSIGNER": "security@atlassian.com", + "DATE_PUBLIC": "2019-02-07T00:00:00", + "ID": "CVE-2017-18107", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Crowd", + "version": { + "version_data": [ + { + "version_value": "3.1.1", + "version_affected": "<" + } + ] + } + } + ] + }, + "vendor_name": "Atlassian" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://jira.atlassian.com/browse/CWD-5091" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Various resources in the Crowd Demo application of Atlassian Crowd before version 3.1.1 allow remote attackers to modify add, modify and delete users & groups via a Cross-site request forgery (CSRF) vulnerability. Please be aware that the Demo application is not enabled by default." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://jira.atlassian.com/browse/CWD-5091", + "refsource": "MISC", + "name": "https://jira.atlassian.com/browse/CWD-5091" + } + ] + } +} \ No newline at end of file diff --git a/2019/11xxx/CVE-2019-11157.json b/2019/11xxx/CVE-2019-11157.json index c3955d9da80..beda643b1b3 100644 --- a/2019/11xxx/CVE-2019-11157.json +++ b/2019/11xxx/CVE-2019-11157.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20191217-0001/", + "url": "https://security.netapp.com/advisory/ntap-20191217-0001/" } ] }, diff --git a/2019/14xxx/CVE-2019-14607.json b/2019/14xxx/CVE-2019-14607.json index 0bfc291ad32..b1e3f3fe124 100644 --- a/2019/14xxx/CVE-2019-14607.json +++ b/2019/14xxx/CVE-2019-14607.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00317.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00317.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20191217-0002/", + "url": "https://security.netapp.com/advisory/ntap-20191217-0002/" } ] }, diff --git a/2019/15xxx/CVE-2019-15011.json b/2019/15xxx/CVE-2019-15011.json index 32434ea961b..d84f9bc2355 100644 --- a/2019/15xxx/CVE-2019-15011.json +++ b/2019/15xxx/CVE-2019-15011.json @@ -1,94 +1,96 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2019-12-17T00:00:00", - "ID": "CVE-2019-15011", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Application Links", - "version": { - "version_data": [ - { - "version_value": "5.0.12", - "version_affected": "<" - }, - { - "version_value": "5.1.0", - "version_affected": ">=" - }, - { - "version_value": "5.2.11", - "version_affected": "<" - }, - { - "version_value": "5.3.0", - "version_affected": ">=" - }, - { - "version_value": "5.3.7", - "version_affected": "<" - }, - { - "version_value": "5.4.0", - "version_affected": ">=" - }, - { - "version_value": "5.4.13", - "version_affected": "<" - }, - { - "version_value": "6.0.0", - "version_affected": ">=" - }, - { - "version_value": "6.0.5", - "version_affected": "<" - } - ] - } - } - ] - }, - "vendor_name": "Atlassian" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The ListEntityLinksServlet resource in Application Links before version 5.0.12, from version 5.1.0 before version 5.2.11, from version 5.3.0 before version 5.3.7, from version 5.4.0 before 5.4.13, and from version 6.0.0 before 6.0.5 disclosed application link information to non-admin users via a missing permissions check." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Exposure" - } + "CVE_data_meta": { + "ASSIGNER": "security@atlassian.com", + "DATE_PUBLIC": "2019-12-17T00:00:00", + "ID": "CVE-2019-15011", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Application Links", + "version": { + "version_data": [ + { + "version_value": "5.0.12", + "version_affected": "<" + }, + { + "version_value": "5.1.0", + "version_affected": ">=" + }, + { + "version_value": "5.2.11", + "version_affected": "<" + }, + { + "version_value": "5.3.0", + "version_affected": ">=" + }, + { + "version_value": "5.3.7", + "version_affected": "<" + }, + { + "version_value": "5.4.0", + "version_affected": ">=" + }, + { + "version_value": "5.4.13", + "version_affected": "<" + }, + { + "version_value": "6.0.0", + "version_affected": ">=" + }, + { + "version_value": "6.0.5", + "version_affected": "<" + } + ] + } + } + ] + }, + "vendor_name": "Atlassian" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://ecosystem.atlassian.net/browse/APL-1386" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The ListEntityLinksServlet resource in Application Links before version 5.0.12, from version 5.1.0 before version 5.2.11, from version 5.3.0 before version 5.3.7, from version 5.4.0 before 5.4.13, and from version 6.0.0 before 6.0.5 disclosed application link information to non-admin users via a missing permissions check." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Exposure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://ecosystem.atlassian.net/browse/APL-1386", + "refsource": "MISC", + "name": "https://ecosystem.atlassian.net/browse/APL-1386" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19118.json b/2019/19xxx/CVE-2019-19118.json index 6db03471385..86167f4da55 100644 --- a/2019/19xxx/CVE-2019-19118.json +++ b/2019/19xxx/CVE-2019-19118.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/", "url": "https://www.djangoproject.com/weblog/2019/dec/02/security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20191217-0003/", + "url": "https://security.netapp.com/advisory/ntap-20191217-0003/" } ] }