"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-07-22 17:00:49 +00:00
parent 5dc45bef06
commit dc70ee9817
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
14 changed files with 348 additions and 12 deletions

View File

@ -71,6 +71,16 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2032",
"url": "https://github.com/FasterXML/jackson-databind/issues/2032"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -151,6 +151,16 @@
"refsource": "BID",
"name": "107585",
"url": "http://www.securityfocus.com/bid/107585"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -151,6 +151,16 @@
"refsource": "REDHAT",
"name": "RHSA-2019:1797",
"url": "https://access.redhat.com/errata/RHSA-2019:1797"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -141,6 +141,16 @@
"refsource": "REDHAT",
"name": "RHSA-2019:1797",
"url": "https://access.redhat.com/errata/RHSA-2019:1797"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -126,6 +126,16 @@
"refsource": "REDHAT",
"name": "RHSA-2019:1797",
"url": "https://access.redhat.com/errata/RHSA-2019:1797"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -146,6 +146,16 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190530-0003/",
"url": "https://security.netapp.com/advisory/ntap-20190530-0003/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -131,6 +131,16 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190530-0003/",
"url": "https://security.netapp.com/advisory/ntap-20190530-0003/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -141,6 +141,16 @@
"refsource": "BID",
"name": "107985",
"url": "http://www.securityfocus.com/bid/107985"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -141,6 +141,16 @@
"refsource": "BID",
"name": "107985",
"url": "http://www.securityfocus.com/bid/107985"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -141,6 +141,16 @@
"refsource": "BID",
"name": "107985",
"url": "http://www.securityfocus.com/bid/107985"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1822",
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1823",
"url": "https://access.redhat.com/errata/RHSA-2019:1823"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "cve-assign@distributedweaknessfiling.org",
"ID": "CVE-2019-1010228",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "DCMTK",
"version": {
"version_data": [
{
"version_value": "3.6.3 and below [fixed: 3.6.4, after commit 40917614e]"
}
]
}
}
]
},
"vendor_name": "OFFIS.de"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of DICOM file processing (e.g. DICOM to image conversion). The fixed version is: 3.6.4, after commit 40917614e."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.dcmtk.org/redmine/issues/858",
"refsource": "MISC",
"name": "https://support.dcmtk.org/redmine/issues/858"
}
]
}

View File

@ -1,18 +1,76 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-12326",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-12326",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing file and path validation in the ringtone upload function of the Akuvox R50P VoIP phone 50.0.6.156 allows an attacker to upload a manipulated ringtone file, with an executable payload (shell commands within the file) and trigger code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Akuvox_R50P.pdf",
"refsource": "MISC",
"name": "https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Akuvox_R50P.pdf"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:H/S:U/UI:N",
"version": "3.0"
}
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13096",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "TronLink Wallet 2.2.0 stores user wallet keystore in plaintext and places them in insecure storage. An attacker can read and reuse the user keystore of a valid user via /data/data/com.tronlink.wallet/shared_prefs/<wallet-name>.xml to gain unauthorized access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://pastebin.com/raw/J9B8Lh0j",
"refsource": "MISC",
"name": "https://pastebin.com/raw/J9B8Lh0j"
},
{
"url": "https://pastebin.com/raw/08REmV1X",
"refsource": "MISC",
"name": "https://pastebin.com/raw/08REmV1X"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-13097",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The application API of Cat Runner Decorate Home version 2.8.0 for Android does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable. Attackers can manipulate users' score parameters exchanged between client and server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://pastebin.com/WkkGk0tw",
"refsource": "MISC",
"name": "https://pastebin.com/WkkGk0tw"
},
{
"url": "https://www.youtube.com/watch?v=u5iEeLZnYVg",
"refsource": "MISC",
"name": "https://www.youtube.com/watch?v=u5iEeLZnYVg"
}
]
}
}