From d71f2ce1708698a45b558a992119c0b5b32dbaef Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 21 Feb 2019 00:07:44 -0500 Subject: [PATCH] - Synchronized data. --- 2019/8xxx/CVE-2019-8979.json | 62 +++++++++++++++++++++++++++++++++ 2019/8xxx/CVE-2019-8980.json | 67 ++++++++++++++++++++++++++++++++++++ 2 files changed, 129 insertions(+) create mode 100644 2019/8xxx/CVE-2019-8979.json create mode 100644 2019/8xxx/CVE-2019-8980.json diff --git a/2019/8xxx/CVE-2019-8979.json b/2019/8xxx/CVE-2019-8979.json new file mode 100644 index 00000000000..83e243c5665 --- /dev/null +++ b/2019/8xxx/CVE-2019-8979.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8979", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/huzr2018/orderby_SQLi", + "refsource" : "MISC", + "url" : "https://github.com/huzr2018/orderby_SQLi" + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8980.json b/2019/8xxx/CVE-2019-8980.json new file mode 100644 index 00000000000..0795c40dc47 --- /dev/null +++ b/2019/8xxx/CVE-2019-8980.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8980", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935698.html", + "refsource" : "MISC", + "url" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935698.html" + }, + { + "name" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html", + "refsource" : "MISC", + "url" : "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1935705.html" + } + ] + } +}