From c5a4022d0704d69207f4435b99565473d4924fb0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 1 Oct 2019 18:01:03 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/13xxx/CVE-2019-13104.json | 5 ++ 2019/13xxx/CVE-2019-13106.json | 5 ++ 2019/7xxx/CVE-2019-7618.json | 118 +++++++++++++++++---------------- 2019/9xxx/CVE-2019-9511.json | 5 ++ 2019/9xxx/CVE-2019-9513.json | 5 ++ 5 files changed, 81 insertions(+), 57 deletions(-) diff --git a/2019/13xxx/CVE-2019-13104.json b/2019/13xxx/CVE-2019-13104.json index 0008f3ba009..21bacfbb43f 100644 --- a/2019/13xxx/CVE-2019-13104.json +++ b/2019/13xxx/CVE-2019-13104.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75", "url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:2233", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html" } ] } diff --git a/2019/13xxx/CVE-2019-13106.json b/2019/13xxx/CVE-2019-13106.json index ff6410cf85e..9db98c39e88 100644 --- a/2019/13xxx/CVE-2019-13106.json +++ b/2019/13xxx/CVE-2019-13106.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75", "url": "https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:2233", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html" } ] } diff --git a/2019/7xxx/CVE-2019-7618.json b/2019/7xxx/CVE-2019-7618.json index f69b40496a7..7f3b8d30e56 100644 --- a/2019/7xxx/CVE-2019-7618.json +++ b/2019/7xxx/CVE-2019-7618.json @@ -1,63 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ASSIGNER": "bressers@elastic.co", - "ID": "CVE-2019-7618", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Elastic", - "product": { - "product_data": [ - { - "product_name": "Elastic Code", - "version": { - "version_data": [ - { - "version_value": "7.3.0, 7.3.1, and 7.3.2" + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ASSIGNER": "security@elastic.co", + "ID": "CVE-2019-7618", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Elastic", + "product": { + "product_data": [ + { + "product_name": "Elastic Code", + "version": { + "version_data": [ + { + "version_value": "7.3.0, 7.3.1, and 7.3.2" + } + ] + } + } + ] } - ] } - } ] - } } - ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-538: File and Directory Information Exposure" - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-538: File and Directory Information Exposure" + } + ] + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://staging-website.elastic.co/community/security" - }, - { - "url": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user." - } - ] - } -} + }, + "references": { + "reference_data": [ + { + "url": "https://staging-website.elastic.co/community/security", + "refsource": "MISC", + "name": "https://staging-website.elastic.co/community/security" + }, + { + "url": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831", + "refsource": "MISC", + "name": "https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A local file disclosure flaw was found in Elastic Code versions 7.3.0, 7.3.1, and 7.3.2. If a malicious code repository is imported into Code it is possible to read arbitrary files from the local filesystem of the Kibana instance running Code with the permission of the Kibana system user." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9511.json b/2019/9xxx/CVE-2019-9511.json index 94f2d20e882..43ca47032e3 100644 --- a/2019/9xxx/CVE-2019-9511.json +++ b/2019/9xxx/CVE-2019-9511.json @@ -223,6 +223,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2949", "url": "https://access.redhat.com/errata/RHSA-2019:2949" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:2232", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9513.json b/2019/9xxx/CVE-2019-9513.json index bc2cc1e2067..6e8529062c7 100644 --- a/2019/9xxx/CVE-2019-9513.json +++ b/2019/9xxx/CVE-2019-9513.json @@ -223,6 +223,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2949", "url": "https://access.redhat.com/errata/RHSA-2019:2949" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:2232", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" } ] },