diff --git a/2018/20xxx/CVE-2018-20002.json b/2018/20xxx/CVE-2018-20002.json index fca62177cc8..6c07520831f 100644 --- a/2018/20xxx/CVE-2018-20002.json +++ b/2018/20xxx/CVE-2018-20002.json @@ -71,6 +71,11 @@ "name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9", "refsource": "MISC", "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K62602089", + "url": "https://support.f5.com/csp/article/K62602089" } ] } diff --git a/2018/20xxx/CVE-2018-20623.json b/2018/20xxx/CVE-2018-20623.json index 34ae4c7630c..e004bccb27e 100644 --- a/2018/20xxx/CVE-2018-20623.json +++ b/2018/20xxx/CVE-2018-20623.json @@ -61,6 +61,11 @@ "name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049", "refsource": "MISC", "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K38336243", + "url": "https://support.f5.com/csp/article/K38336243" } ] } diff --git a/2018/20xxx/CVE-2018-20651.json b/2018/20xxx/CVE-2018-20651.json index 1a7462d0204..662001064df 100644 --- a/2018/20xxx/CVE-2018-20651.json +++ b/2018/20xxx/CVE-2018-20651.json @@ -66,6 +66,11 @@ "name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f", "refsource": "MISC", "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K38336243", + "url": "https://support.f5.com/csp/article/K38336243" } ] } diff --git a/2018/20xxx/CVE-2018-20657.json b/2018/20xxx/CVE-2018-20657.json index 9acfbf0800c..c45e8a0e7b4 100644 --- a/2018/20xxx/CVE-2018-20657.json +++ b/2018/20xxx/CVE-2018-20657.json @@ -61,6 +61,11 @@ "name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539", "refsource": "MISC", "url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K62602089", + "url": "https://support.f5.com/csp/article/K62602089" } ] } diff --git a/2018/20xxx/CVE-2018-20712.json b/2018/20xxx/CVE-2018-20712.json index 3fe58d745e8..e1a7285a2cf 100644 --- a/2018/20xxx/CVE-2018-20712.json +++ b/2018/20xxx/CVE-2018-20712.json @@ -66,6 +66,11 @@ "name": "106563", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106563" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K38336243", + "url": "https://support.f5.com/csp/article/K38336243" } ] } diff --git a/2019/10xxx/CVE-2019-10061.json b/2019/10xxx/CVE-2019-10061.json new file mode 100644 index 00000000000..10743805829 --- /dev/null +++ b/2019/10xxx/CVE-2019-10061.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10061", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.npmjs.com/advisories/789", + "refsource": "MISC", + "name": "https://www.npmjs.com/advisories/789" + }, + { + "refsource": "MISC", + "name": "https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b", + "url": "https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b" + }, + { + "refsource": "MISC", + "name": "https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563", + "url": "https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10062.json b/2019/10xxx/CVE-2019-10062.json new file mode 100644 index 00000000000..d6383e4475c --- /dev/null +++ b/2019/10xxx/CVE-2019-10062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7711.json b/2019/7xxx/CVE-2019-7711.json index 216f587f568..957e792bf78 100644 --- a/2019/7xxx/CVE-2019-7711.json +++ b/2019/7xxx/CVE-2019-7711.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7711", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. The undocumented shell command \"prompt\" sets the (user controlled) shell's prompt value, which is used as a format string input to printf, resulting in an information leak of memory addresses." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bl4ckic3/GHS-Bugs", + "refsource": "MISC", + "name": "https://github.com/bl4ckic3/GHS-Bugs" + }, + { + "url": "https://www.ghs.com/products/rtos/integrity.html", + "refsource": "MISC", + "name": "https://www.ghs.com/products/rtos/integrity.html" } ] } diff --git a/2019/7xxx/CVE-2019-7712.json b/2019/7xxx/CVE-2019-7712.json index ac24031ce78..ff7e42b760d 100644 --- a/2019/7xxx/CVE-2019-7712.json +++ b/2019/7xxx/CVE-2019-7712.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7712", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in handler_ipcom_shell_pwd in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. When using the pwd command, the current working directory path is used as the first argument to printf() without a proper check. An attacker may thus forge a path containing format string modifiers to get a custom format string evaluated. This results in an information leak of memory addresses." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/bl4ckic3/GHS-Bugs", + "refsource": "MISC", + "name": "https://github.com/bl4ckic3/GHS-Bugs" + }, + { + "url": "https://www.ghs.com/products/rtos/integrity.html", + "refsource": "MISC", + "name": "https://www.ghs.com/products/rtos/integrity.html" } ] } diff --git a/2019/9xxx/CVE-2019-9978.json b/2019/9xxx/CVE-2019-9978.json index c8a34b81eeb..78f9cf1a75b 100644 --- a/2019/9xxx/CVE-2019-9978.json +++ b/2019/9xxx/CVE-2019-9978.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9238", + "url": "https://wpvulndb.com/vulnerabilities/9238" + }, { "url": "https://www.cybersecurity-help.cz/vdb/SB2019032105", "refsource": "MISC",