From e15a0d39fdb83c166c3b13b82f932d997f9ea8c5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 20 May 2019 14:00:52 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/12xxx/CVE-2018-12270.json | 48 ++++++++++++++++++++++++-- 2019/0xxx/CVE-2019-0976.json | 7 +++- 2019/11xxx/CVE-2019-11460.json | 5 +++ 2019/12xxx/CVE-2019-12204.json | 18 ++++++++++ 2019/12xxx/CVE-2019-12205.json | 18 ++++++++++ 2019/12xxx/CVE-2019-12206.json | 62 ++++++++++++++++++++++++++++++++++ 2019/12xxx/CVE-2019-12207.json | 62 ++++++++++++++++++++++++++++++++++ 2019/12xxx/CVE-2019-12208.json | 62 ++++++++++++++++++++++++++++++++++ 8 files changed, 279 insertions(+), 3 deletions(-) create mode 100644 2019/12xxx/CVE-2019-12204.json create mode 100644 2019/12xxx/CVE-2019-12205.json create mode 100644 2019/12xxx/CVE-2019-12206.json create mode 100644 2019/12xxx/CVE-2019-12207.json create mode 100644 2019/12xxx/CVE-2019-12208.json diff --git a/2018/12xxx/CVE-2018-12270.json b/2018/12xxx/CVE-2018-12270.json index 2b9fd9955da..526fdb37aa8 100644 --- a/2018/12xxx/CVE-2018-12270.json +++ b/2018/12xxx/CVE-2018-12270.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-12270", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/VixusFoxy/CVE/wiki/CVE-2018-12270", + "url": "https://github.com/VixusFoxy/CVE/wiki/CVE-2018-12270" } ] } diff --git a/2019/0xxx/CVE-2019-0976.json b/2019/0xxx/CVE-2019-0976.json index 10bda489b9c..a73a80353eb 100644 --- a/2019/0xxx/CVE-2019-0976.json +++ b/2019/0xxx/CVE-2019-0976.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "A tampering vulnerability exists in the NuGet Package Manager for Linux and Mac that could allow an authenticated attacker to modify contents of the intermediate build folder (by default \u00c3\u00a2\u00e2\u201a\u00ac\u00c5\u201cobj\u00c3\u00a2\u00e2\u201a\u00ac\u00c2\u009d), aka 'NuGet Package Manager Tampering Vulnerability'." + "value": "A tampering vulnerability exists in the NuGet Package Manager for Linux and Mac that could allow an authenticated attacker to modify contents of the intermediate build folder (by default ), aka 'NuGet Package Manager Tampering Vulnerability'." } ] }, @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "BID", + "name": "108210", + "url": "http://www.securityfocus.com/bid/108210" + }, { "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0976", "refsource": "MISC", diff --git a/2019/11xxx/CVE-2019-11460.json b/2019/11xxx/CVE-2019-11460.json index edf8f023493..cc42eec0e51 100644 --- a/2019/11xxx/CVE-2019-11460.json +++ b/2019/11xxx/CVE-2019-11460.json @@ -56,6 +56,11 @@ "url": "https://gitlab.gnome.org/GNOME/gnome-desktop/issues/112", "refsource": "MISC", "name": "https://gitlab.gnome.org/GNOME/gnome-desktop/issues/112" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-992622684b", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5V6EIUHYR7SNKCRIGYCD3UWNEGFNT2F/" } ] } diff --git a/2019/12xxx/CVE-2019-12204.json b/2019/12xxx/CVE-2019-12204.json new file mode 100644 index 00000000000..919335e42ca --- /dev/null +++ b/2019/12xxx/CVE-2019-12204.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12204", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12205.json b/2019/12xxx/CVE-2019-12205.json new file mode 100644 index 00000000000..945617f479f --- /dev/null +++ b/2019/12xxx/CVE-2019-12205.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12205", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12206.json b/2019/12xxx/CVE-2019-12206.json new file mode 100644 index 00000000000..03d32061bec --- /dev/null +++ b/2019/12xxx/CVE-2019-12206.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12206", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nginx/njs/issues/162", + "refsource": "MISC", + "name": "https://github.com/nginx/njs/issues/162" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12207.json b/2019/12xxx/CVE-2019-12207.json new file mode 100644 index 00000000000..5ab75563d88 --- /dev/null +++ b/2019/12xxx/CVE-2019-12207.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12207", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nginx/njs/issues/168", + "refsource": "MISC", + "name": "https://github.com/nginx/njs/issues/168" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12208.json b/2019/12xxx/CVE-2019-12208.json new file mode 100644 index 00000000000..fbc5a3e0780 --- /dev/null +++ b/2019/12xxx/CVE-2019-12208.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12208", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/nginx/njs/issues/163", + "refsource": "MISC", + "name": "https://github.com/nginx/njs/issues/163" + } + ] + } +} \ No newline at end of file