From d6b2734bfba607a74e8457782be9eeb976ab9a40 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 21 Mar 2019 20:00:47 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2015/6xxx/CVE-2015-6457.json | 58 ++++++++++++++++++++++++++++++---- 2015/6xxx/CVE-2015-6458.json | 58 ++++++++++++++++++++++++++++++---- 2016/2xxx/CVE-2016-2335.json | 5 +++ 2017/17xxx/CVE-2017-17969.json | 5 +++ 2018/19xxx/CVE-2018-19591.json | 5 +++ 2018/20xxx/CVE-2018-20483.json | 5 +++ 2019/7xxx/CVE-2019-7537.json | 53 +++++++++++++++++++++++++++++-- 2019/9xxx/CVE-2019-9020.json | 5 +++ 2019/9xxx/CVE-2019-9021.json | 5 +++ 2019/9xxx/CVE-2019-9022.json | 5 +++ 2019/9xxx/CVE-2019-9023.json | 5 +++ 2019/9xxx/CVE-2019-9024.json | 5 +++ 2019/9xxx/CVE-2019-9025.json | 5 +++ 13 files changed, 203 insertions(+), 16 deletions(-) diff --git a/2015/6xxx/CVE-2015-6457.json b/2015/6xxx/CVE-2015-6457.json index 9a979ff5ce0..d2f062ad10a 100644 --- a/2015/6xxx/CVE-2015-6457.json +++ b/2015/6xxx/CVE-2015-6457.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2015-6457", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2015-6457", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Moxa", + "product": { + "product_data": [ + { + "product_name": "SoftCMS", + "version": { + "version_data": [ + { + "version_value": "<= 1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Heap-based buffer overflow CWE-122" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-01", + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow remote code execution. Moxa released SoftCMS version 1.4 on June 1, 2015, to address the vulnerability." } ] } diff --git a/2015/6xxx/CVE-2015-6458.json b/2015/6xxx/CVE-2015-6458.json index f36ac700f1d..02bed43e966 100644 --- a/2015/6xxx/CVE-2015-6458.json +++ b/2015/6xxx/CVE-2015-6458.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2015-6458", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2015-6458", + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Moxa", + "product": { + "product_data": [ + { + "product_name": "SoftCMS", + "version": { + "version_data": [ + { + "version_value": "<= 1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Classic buffer overflow CWE-120" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-01", + "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-01" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow remote code execution. Moxa released SoftCMS version 1.4 on June 1, 2015, to address the vulnerability." } ] } diff --git a/2016/2xxx/CVE-2016-2335.json b/2016/2xxx/CVE-2016-2335.json index 0095f01ceb5..1bee11491d8 100644 --- a/2016/2xxx/CVE-2016-2335.json +++ b/2016/2xxx/CVE-2016-2335.json @@ -111,6 +111,11 @@ "name": "FEDORA-2016-430bc0f808", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNYIQAU3FKFBNFPK6GKYTSVRHQA7PTYT/" + }, + { + "refsource": "UBUNTU", + "name": "USN-3913-1", + "url": "https://usn.ubuntu.com/3913-1/" } ] } diff --git a/2017/17xxx/CVE-2017-17969.json b/2017/17xxx/CVE-2017-17969.json index e5ef7be16ae..85fc93ed382 100644 --- a/2017/17xxx/CVE-2017-17969.json +++ b/2017/17xxx/CVE-2017-17969.json @@ -76,6 +76,11 @@ "name": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html", "refsource": "MISC", "url": "https://0patch.blogspot.si/2018/02/two-interesting-micropatches-for-7-zip.html" + }, + { + "refsource": "UBUNTU", + "name": "USN-3913-1", + "url": "https://usn.ubuntu.com/3913-1/" } ] } diff --git a/2018/19xxx/CVE-2018-19591.json b/2018/19xxx/CVE-2018-19591.json index 9440bbbac7b..423892590da 100644 --- a/2018/19xxx/CVE-2018-19591.json +++ b/2018/19xxx/CVE-2018-19591.json @@ -91,6 +91,11 @@ "name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=d527c860f5a3f0ed687bd03f0cb464612dc23408", "refsource": "CONFIRM", "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=d527c860f5a3f0ed687bd03f0cb464612dc23408" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0003/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0003/" } ] } diff --git a/2018/20xxx/CVE-2018-20483.json b/2018/20xxx/CVE-2018-20483.json index 0f97108fb38..03befb3eff1 100644 --- a/2018/20xxx/CVE-2018-20483.json +++ b/2018/20xxx/CVE-2018-20483.json @@ -71,6 +71,11 @@ "name": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS", "refsource": "MISC", "url": "http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0002/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0002/" } ] } diff --git a/2019/7xxx/CVE-2019-7537.json b/2019/7xxx/CVE-2019-7537.json index 322f1aa4d09..d39045267a6 100644 --- a/2019/7xxx/CVE-2019-7537.json +++ b/2019/7xxx/CVE-2019-7537.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7537", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Donfig 0.3.0. There is a vulnerability in the collect_yaml method in config_obj.py. It can execute arbitrary Python commands, resulting in command execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pytroll/donfig/issues/5", + "refsource": "MISC", + "name": "https://github.com/pytroll/donfig/issues/5" + }, + { + "url": "https://github.com/pytroll/donfig/commits/master", + "refsource": "MISC", + "name": "https://github.com/pytroll/donfig/commits/master" } ] } diff --git a/2019/9xxx/CVE-2019-9020.json b/2019/9xxx/CVE-2019-9020.json index 726bc3007ac..8a6d4d78f66 100644 --- a/2019/9xxx/CVE-2019-9020.json +++ b/2019/9xxx/CVE-2019-9020.json @@ -81,6 +81,11 @@ "name": "https://bugs.php.net/bug.php?id=77242", "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=77242" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0001/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0001/" } ] } diff --git a/2019/9xxx/CVE-2019-9021.json b/2019/9xxx/CVE-2019-9021.json index 11e750359c8..ea8258d20e0 100644 --- a/2019/9xxx/CVE-2019-9021.json +++ b/2019/9xxx/CVE-2019-9021.json @@ -81,6 +81,11 @@ "name": "106747", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106747" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0001/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0001/" } ] } diff --git a/2019/9xxx/CVE-2019-9022.json b/2019/9xxx/CVE-2019-9022.json index 3225e2b0776..c44696fbd33 100644 --- a/2019/9xxx/CVE-2019-9022.json +++ b/2019/9xxx/CVE-2019-9022.json @@ -66,6 +66,11 @@ "name": "https://bugs.php.net/bug.php?id=77369", "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=77369" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0001/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0001/" } ] } diff --git a/2019/9xxx/CVE-2019-9023.json b/2019/9xxx/CVE-2019-9023.json index e42a9862ad5..78b0ad91331 100644 --- a/2019/9xxx/CVE-2019-9023.json +++ b/2019/9xxx/CVE-2019-9023.json @@ -106,6 +106,11 @@ "name": "https://bugs.php.net/bug.php?id=77381", "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=77381" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0001/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0001/" } ] } diff --git a/2019/9xxx/CVE-2019-9024.json b/2019/9xxx/CVE-2019-9024.json index b0cc0f94576..75acffe142d 100644 --- a/2019/9xxx/CVE-2019-9024.json +++ b/2019/9xxx/CVE-2019-9024.json @@ -76,6 +76,11 @@ "name": "https://bugs.php.net/bug.php?id=77380", "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=77380" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0001/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0001/" } ] } diff --git a/2019/9xxx/CVE-2019-9025.json b/2019/9xxx/CVE-2019-9025.json index 36b5e5c1694..154d458ee20 100644 --- a/2019/9xxx/CVE-2019-9025.json +++ b/2019/9xxx/CVE-2019-9025.json @@ -56,6 +56,11 @@ "name": "https://bugs.php.net/bug.php?id=77367", "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=77367" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20190321-0001/", + "url": "https://security.netapp.com/advisory/ntap-20190321-0001/" } ] }