diff --git a/2016/3xxx/CVE-2016-3189.json b/2016/3xxx/CVE-2016-3189.json index d3b4ac29527..caacc3222a8 100644 --- a/2016/3xxx/CVE-2016-3189.json +++ b/2016/3xxx/CVE-2016-3189.json @@ -116,6 +116,11 @@ "refsource": "BUGTRAQ", "name": "20190806 FreeBSD Security Advisory FreeBSD-SA-19:18.bzip2", "url": "https://seclists.org/bugtraq/2019/Aug/4" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html", + "url": "http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html" } ] } diff --git a/2019/12xxx/CVE-2019-12900.json b/2019/12xxx/CVE-2019-12900.json index 7e6ad2ad05d..2ed464aa6cb 100644 --- a/2019/12xxx/CVE-2019-12900.json +++ b/2019/12xxx/CVE-2019-12900.json @@ -101,6 +101,11 @@ "refsource": "BUGTRAQ", "name": "20190806 FreeBSD Security Advisory FreeBSD-SA-19:18.bzip2", "url": "https://seclists.org/bugtraq/2019/Aug/4" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html", + "url": "http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html" } ] } diff --git a/2019/14xxx/CVE-2019-14698.json b/2019/14xxx/CVE-2019-14698.json new file mode 100644 index 00000000000..aa4ba14982c --- /dev/null +++ b/2019/14xxx/CVE-2019-14698.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14698", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. In a CGI program running under the HTTPD web server, a buffer overflow in the param parameter leads to remote code execution in the context of the nobody account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14699.json b/2019/14xxx/CVE-2019-14699.json new file mode 100644 index 00000000000..08db0cbc68e --- /dev/null +++ b/2019/14xxx/CVE-2019-14699.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14699", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. An attacker can exploit OS Command Injection in the filename parameter for remote code execution as root. This occurs in the Mainproc executable file, which can be run from the HTTPD web server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14700.json b/2019/14xxx/CVE-2019-14700.json new file mode 100644 index 00000000000..6c2a260dd57 --- /dev/null +++ b/2019/14xxx/CVE-2019-14700.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14700", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. There is disclosure of the existence of arbitrary files via Path Traversal in HTTPD. This occurs because the filename specified in the TZ parameter is accessed with a substantial delay if that file exists." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14701.json b/2019/14xxx/CVE-2019-14701.json new file mode 100644 index 00000000000..942ce6228a1 --- /dev/null +++ b/2019/14xxx/CVE-2019-14701.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14701", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. An attacker can trigger read operations on an arbitrary file via Path Traversal in the TZ parameter, but cannot retrieve the data that is read. This causes a denial of service if the filename is, for example, /dev/random." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14702.json b/2019/14xxx/CVE-2019-14702.json new file mode 100644 index 00000000000..6b09ef4128b --- /dev/null +++ b/2019/14xxx/CVE-2019-14702.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14702", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. SQL injection vulnerabilities exist in 13 forms that are reachable through HTTPD. An attacker can, for example, create an admin account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14703.json b/2019/14xxx/CVE-2019-14703.json new file mode 100644 index 00000000000..f389915222d --- /dev/null +++ b/2019/14xxx/CVE-2019-14703.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14703", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A CSRF issue was discovered in webparam?user&action=set¶m=add in HTTPD on MicroDigital N-series cameras with firmware through 6400.0.8.5 to create an admin account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14704.json b/2019/14xxx/CVE-2019-14704.json new file mode 100644 index 00000000000..87007aedbc6 --- /dev/null +++ b/2019/14xxx/CVE-2019-14704.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14704", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An SSRF issue was discovered in HTTPD on MicroDigital N-series cameras with firmware through 6400.0.8.5 via FTP commands following a newline character in the uploadfile field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14705.json b/2019/14xxx/CVE-2019-14705.json new file mode 100644 index 00000000000..0a58623dbb3 --- /dev/null +++ b/2019/14xxx/CVE-2019-14705.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14705", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An Incorrect Access Control issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5 because any valid cookie can be used to make requests as an admin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14706.json b/2019/14xxx/CVE-2019-14706.json new file mode 100644 index 00000000000..16a66473fe1 --- /dev/null +++ b/2019/14xxx/CVE-2019-14706.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14706", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A denial of service issue in HTTPD was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. An attacker without authorization can upload a file to upload.php with a filename longer than 256 bytes. This will be placed in the updownload area. It will not be deleted, because of a buffer overflow in a Bash command string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14707.json b/2019/14xxx/CVE-2019-14707.json new file mode 100644 index 00000000000..1adefb6c9c2 --- /dev/null +++ b/2019/14xxx/CVE-2019-14707.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14707", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. The firmware update process is insecure, leading to remote code execution. The attacker can provide arbitrary firmware in a .dat file via a webparam?system&action=set&upgrade URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14708.json b/2019/14xxx/CVE-2019-14708.json new file mode 100644 index 00000000000..ade0c63305b --- /dev/null +++ b/2019/14xxx/CVE-2019-14708.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14708", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. A buffer overflow in the action parameter leads to remote code execution in the context of the nobody account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14709.json b/2019/14xxx/CVE-2019-14709.json new file mode 100644 index 00000000000..6c280d709d4 --- /dev/null +++ b/2019/14xxx/CVE-2019-14709.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14709", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A cleartext password storage issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. The file in question is /usr/local/ipsca/mipsca.db. If a camera is compromised, the attacker can gain access to passwords and abuse them to compromise further systems." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.microdigital.ru/", + "refsource": "MISC", + "name": "https://www.microdigital.ru/" + }, + { + "url": "http://www.microdigital.co.kr/", + "refsource": "MISC", + "name": "http://www.microdigital.co.kr/" + }, + { + "url": "https://pastebin.com/PSyqqs1g", + "refsource": "MISC", + "name": "https://pastebin.com/PSyqqs1g" + } + ] + } +} \ No newline at end of file