mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 03:02:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
5dc45bef06
commit
dc70ee9817
@ -71,6 +71,16 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/FasterXML/jackson-databind/issues/2032",
|
||||
"url": "https://github.com/FasterXML/jackson-databind/issues/2032"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -151,6 +151,16 @@
|
||||
"refsource": "BID",
|
||||
"name": "107585",
|
||||
"url": "http://www.securityfocus.com/bid/107585"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -151,6 +151,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1797",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1797"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1797",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1797"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -126,6 +126,16 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1797",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1797"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -146,6 +146,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190530-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190530-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -131,6 +131,16 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190530-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190530-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,16 @@
|
||||
"refsource": "BID",
|
||||
"name": "107985",
|
||||
"url": "http://www.securityfocus.com/bid/107985"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,16 @@
|
||||
"refsource": "BID",
|
||||
"name": "107985",
|
||||
"url": "http://www.securityfocus.com/bid/107985"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,16 @@
|
||||
"refsource": "BID",
|
||||
"name": "107985",
|
||||
"url": "http://www.securityfocus.com/bid/107985"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1822",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1823",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve-assign@distributedweaknessfiling.org",
|
||||
"ID": "CVE-2019-1010228",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "DCMTK",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "3.6.3 and below [fixed: 3.6.4, after commit 40917614e]"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "OFFIS.de"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of DICOM file processing (e.g. DICOM to image conversion). The fixed version is: 3.6.4, after commit 40917614e."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Buffer Overflow"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://support.dcmtk.org/redmine/issues/858",
|
||||
"refsource": "MISC",
|
||||
"name": "https://support.dcmtk.org/redmine/issues/858"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,18 +1,76 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-12326",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ID": "CVE-2019-12326",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Missing file and path validation in the ringtone upload function of the Akuvox R50P VoIP phone 50.0.6.156 allows an attacker to upload a manipulated ringtone file, with an executable payload (shell commands within the file) and trigger code execution."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Akuvox_R50P.pdf",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Akuvox_R50P.pdf"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": {
|
||||
"attackComplexity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"availabilityImpact": "HIGH",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"scope": "UNCHANGED",
|
||||
"userInteraction": "NONE",
|
||||
"vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:H/S:U/UI:N",
|
||||
"version": "3.0"
|
||||
}
|
||||
}
|
||||
}
|
67
2019/13xxx/CVE-2019-13096.json
Normal file
67
2019/13xxx/CVE-2019-13096.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-13096",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "TronLink Wallet 2.2.0 stores user wallet keystore in plaintext and places them in insecure storage. An attacker can read and reuse the user keystore of a valid user via /data/data/com.tronlink.wallet/shared_prefs/<wallet-name>.xml to gain unauthorized access."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://pastebin.com/raw/J9B8Lh0j",
|
||||
"refsource": "MISC",
|
||||
"name": "https://pastebin.com/raw/J9B8Lh0j"
|
||||
},
|
||||
{
|
||||
"url": "https://pastebin.com/raw/08REmV1X",
|
||||
"refsource": "MISC",
|
||||
"name": "https://pastebin.com/raw/08REmV1X"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
67
2019/13xxx/CVE-2019-13097.json
Normal file
67
2019/13xxx/CVE-2019-13097.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-13097",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The application API of Cat Runner Decorate Home version 2.8.0 for Android does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable. Attackers can manipulate users' score parameters exchanged between client and server."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://pastebin.com/WkkGk0tw",
|
||||
"refsource": "MISC",
|
||||
"name": "https://pastebin.com/WkkGk0tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.youtube.com/watch?v=u5iEeLZnYVg",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.youtube.com/watch?v=u5iEeLZnYVg"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user