From d983b944a89cc5088939c58547ecbc709eea0cfd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 16 Dec 2019 17:01:07 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/18xxx/CVE-2019-18826.json | 62 ++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18827.json | 87 ++++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18828.json | 87 ++++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18830.json | 87 ++++++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18831.json | 87 ++++++++++++++++++++++++++++++++++ 2019/19xxx/CVE-2019-19731.json | 61 +++++++++++++++++++++--- 2019/19xxx/CVE-2019-19743.json | 71 ++++++++++++++++++++++++--- 2019/19xxx/CVE-2019-19790.json | 5 ++ 2019/19xxx/CVE-2019-19809.json | 18 +++++++ 2019/19xxx/CVE-2019-19810.json | 18 +++++++ 10 files changed, 571 insertions(+), 12 deletions(-) create mode 100644 2019/18xxx/CVE-2019-18826.json create mode 100644 2019/18xxx/CVE-2019-18827.json create mode 100644 2019/18xxx/CVE-2019-18828.json create mode 100644 2019/18xxx/CVE-2019-18830.json create mode 100644 2019/18xxx/CVE-2019-18831.json create mode 100644 2019/19xxx/CVE-2019-19809.json create mode 100644 2019/19xxx/CVE-2019-19810.json diff --git a/2019/18xxx/CVE-2019-18826.json b/2019/18xxx/CVE-2019-18826.json new file mode 100644 index 00000000000..33faf26d61c --- /dev/null +++ b/2019/18xxx/CVE-2019-18826.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18826", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 have Improper Following of a Certificate's Chain of Trust. The embedded 'dongle_bridge' program used to expose the functionalities of the ClickShare Button to a USB host, does not properly validate the whole certificate chain." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18827.json b/2019/18xxx/CVE-2019-18827.json new file mode 100644 index 00000000000..af90d14a986 --- /dev/null +++ b/2019/18xxx/CVE-2019-18827.json @@ -0,0 +1,87 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18827", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On the ClickShare Button (R9861500D01) the JTAG debug interface is only disabled in software at initial stage of the bootloader and not permanently disabled (versions before v1.9.x)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18828.json b/2019/18xxx/CVE-2019-18828.json new file mode 100644 index 00000000000..af0ba0386a0 --- /dev/null +++ b/2019/18xxx/CVE-2019-18828.json @@ -0,0 +1,87 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18828", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 have Insufficiently Protected Credentials. The root account (present for access via debug interfaces, which are by default not enabled on production devices) of the embedded Linux on the ClickShare Button is using a weak password." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18830.json b/2019/18xxx/CVE-2019-18830.json new file mode 100644 index 00000000000..bba724830ce --- /dev/null +++ b/2019/18xxx/CVE-2019-18830.json @@ -0,0 +1,87 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18830", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 allow OS Command Injection. The embedded 'dongle_bridge' program used to expose the functionalities of the ClickShare Button to a USB host, is vulnerable to OS command injection vulnerabilities. These vulnerabilities could lead to code execution on the ClickShare Button with the privileges of the user 'nobody'." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18831.json b/2019/18xxx/CVE-2019-18831.json new file mode 100644 index 00000000000..fc6c33e5b9b --- /dev/null +++ b/2019/18xxx/CVE-2019-18831.json @@ -0,0 +1,87 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-18831", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Barco ClickShare Button R9861500D01 devices before 1.9.0 allow Information Exposure. The encrypted ClickShare Button firmware contains the private key of a test device-certificate." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.barco.com/en/clickshare/firmware-update", + "refsource": "MISC", + "name": "https://www.barco.com/en/clickshare/firmware-update" + }, + { + "refsource": "MISC", + "name": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/", + "url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050069?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050125?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050095?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + }, + { + "refsource": "MISC", + "name": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007", + "url": "https://www.barco.com/en/support/software/R33050070?majorVersion=01&minorVersion=09&patchVersion=01&buildVersion=007" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19731.json b/2019/19xxx/CVE-2019-19731.json index 20611a0f842..109f3e800c1 100644 --- a/2019/19xxx/CVE-2019-19731.json +++ b/2019/19xxx/CVE-2019-19731.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19731", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19731", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Roxy Fileman 1.4.5 for .NET is vulnerable to path traversal. A remote attacker can write uploaded files to arbitrary locations via the RENAMEFILE action. This can be leveraged for code execution by uploading a specially crafted Windows shortcut file and writing the file to the Startup folder (because an incomplete blacklist of file extensions allows Windows shortcut files to be uploaded)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.roxyfileman.com/download", + "refsource": "MISC", + "name": "http://www.roxyfileman.com/download" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html", + "url": "http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html" } ] } diff --git a/2019/19xxx/CVE-2019-19743.json b/2019/19xxx/CVE-2019-19743.json index 065ee504888..1e812c857eb 100644 --- a/2019/19xxx/CVE-2019-19743.json +++ b/2019/19xxx/CVE-2019-19743.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19743", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19743", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin" + }, + { + "refsource": "MISC", + "name": "https://www.exploit-db.com/exploits/47778", + "url": "https://www.exploit-db.com/exploits/47778" + }, + { + "refsource": "MISC", + "name": "https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routervertical.html", + "url": "https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routervertical.html" + }, + { + "refsource": "MISC", + "name": "https://pastebin.com/wHiRGdEG", + "url": "https://pastebin.com/wHiRGdEG" } ] } diff --git a/2019/19xxx/CVE-2019-19790.json b/2019/19xxx/CVE-2019-19790.json index 0702780d374..ec8ec4b86ee 100644 --- a/2019/19xxx/CVE-2019-19790.json +++ b/2019/19xxx/CVE-2019-19790.json @@ -61,6 +61,11 @@ "url": "https://docs.telerik.com/devtools/aspnet-ajax/controls/chart/overview", "refsource": "MISC", "name": "https://docs.telerik.com/devtools/aspnet-ajax/controls/chart/overview" + }, + { + "refsource": "MISC", + "name": "https://www.telerik.com/forums/-620f6977edef", + "url": "https://www.telerik.com/forums/-620f6977edef" } ] } diff --git a/2019/19xxx/CVE-2019-19809.json b/2019/19xxx/CVE-2019-19809.json new file mode 100644 index 00000000000..89da14d3afd --- /dev/null +++ b/2019/19xxx/CVE-2019-19809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19810.json b/2019/19xxx/CVE-2019-19810.json new file mode 100644 index 00000000000..f8279288185 --- /dev/null +++ b/2019/19xxx/CVE-2019-19810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file