diff --git a/2019/10xxx/CVE-2019-10894.json b/2019/10xxx/CVE-2019-10894.json index 8981e3192d1..52d03baa52c 100644 --- a/2019/10xxx/CVE-2019-10894.json +++ b/2019/10xxx/CVE-2019-10894.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1356", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:1390", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" } ] } diff --git a/2019/10xxx/CVE-2019-10895.json b/2019/10xxx/CVE-2019-10895.json index b56ba474fdd..1d29420bf4c 100644 --- a/2019/10xxx/CVE-2019-10895.json +++ b/2019/10xxx/CVE-2019-10895.json @@ -96,6 +96,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1356", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:1390", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" } ] } diff --git a/2019/10xxx/CVE-2019-10896.json b/2019/10xxx/CVE-2019-10896.json index 3c9983f3d6c..13c4f46b0fc 100644 --- a/2019/10xxx/CVE-2019-10896.json +++ b/2019/10xxx/CVE-2019-10896.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1356", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:1390", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" } ] } diff --git a/2019/10xxx/CVE-2019-10899.json b/2019/10xxx/CVE-2019-10899.json index 76a93a4cc4c..e3c11953edd 100644 --- a/2019/10xxx/CVE-2019-10899.json +++ b/2019/10xxx/CVE-2019-10899.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1356", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:1390", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" } ] } diff --git a/2019/10xxx/CVE-2019-10901.json b/2019/10xxx/CVE-2019-10901.json index 685459651b4..9d4cb01bdd7 100644 --- a/2019/10xxx/CVE-2019-10901.json +++ b/2019/10xxx/CVE-2019-10901.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1356", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:1390", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" } ] } diff --git a/2019/10xxx/CVE-2019-10903.json b/2019/10xxx/CVE-2019-10903.json index 232e168f78c..bcaae017ea2 100644 --- a/2019/10xxx/CVE-2019-10903.json +++ b/2019/10xxx/CVE-2019-10903.json @@ -86,6 +86,11 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:1356", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2019:1390", + "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00027.html" } ] } diff --git a/2019/11xxx/CVE-2019-11429.json b/2019/11xxx/CVE-2019-11429.json index 5c2a6cee414..43164a0eb4c 100644 --- a/2019/11xxx/CVE-2019-11429.json +++ b/2019/11xxx/CVE-2019-11429.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11429", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11429", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version), 0.9.8.753 (Pro) and 0.9.8.807 (Pro) is vulnerable to Reflected XSS for the \"Domain\" field on the \"DNS Functions > \"Add DNS Zone\" screen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://CentOS-WebPanel.com", + "refsource": "MISC", + "name": "https://CentOS-WebPanel.com" + }, + { + "refsource": "EXPLOIT-DB", + "name": "46784", + "url": "https://www.exploit-db.com/exploits/46784/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152696/CentOS-Web-Panel-Domain-Field-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/152696/CentOS-Web-Panel-Domain-Field-Cross-Site-Scripting.html" } ] } diff --git a/2019/11xxx/CVE-2019-11831.json b/2019/11xxx/CVE-2019-11831.json index 3ce38ad2ce8..895585d95ba 100644 --- a/2019/11xxx/CVE-2019-11831.json +++ b/2019/11xxx/CVE-2019-11831.json @@ -76,6 +76,11 @@ "refsource": "CONFIRM", "name": "https://www.synology.com/security/advisory/Synology_SA_19_22", "url": "https://www.synology.com/security/advisory/Synology_SA_19_22" + }, + { + "refsource": "BID", + "name": "108302", + "url": "http://www.securityfocus.com/bid/108302" } ] } diff --git a/2019/11xxx/CVE-2019-11884.json b/2019/11xxx/CVE-2019-11884.json index 1be058921b9..79898f7b1c0 100644 --- a/2019/11xxx/CVE-2019-11884.json +++ b/2019/11xxx/CVE-2019-11884.json @@ -66,6 +66,11 @@ "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1616a5ac99ede5d605047a9012481ce7ff18b16", "refsource": "MISC", "name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1616a5ac99ede5d605047a9012481ce7ff18b16" + }, + { + "refsource": "BID", + "name": "108299", + "url": "http://www.securityfocus.com/bid/108299" } ] } diff --git a/2019/12xxx/CVE-2019-12046.json b/2019/12xxx/CVE-2019-12046.json new file mode 100644 index 00000000000..52aae18e8e2 --- /dev/null +++ b/2019/12xxx/CVE-2019-12046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12047.json b/2019/12xxx/CVE-2019-12047.json new file mode 100644 index 00000000000..131a1c1e5f5 --- /dev/null +++ b/2019/12xxx/CVE-2019-12047.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12047", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Gridea v0.8.0 has an XSS vulnerability through which the Nodejs module can be called to achieve arbitrary code execution, as demonstrated by child_process.exec and the \"