"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-26 01:00:44 +00:00
parent 9fa8330f27
commit e3f49f9a74
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
10 changed files with 222 additions and 4 deletions

View File

@ -71,6 +71,11 @@
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9",
"refsource": "MISC",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K62602089",
"url": "https://support.f5.com/csp/article/K62602089"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049",
"refsource": "MISC",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=24049"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K38336243",
"url": "https://support.f5.com/csp/article/K38336243"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f",
"refsource": "MISC",
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=54025d5812ff100f5f0654eb7e1ffd50f2e37f5f"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K38336243",
"url": "https://support.f5.com/csp/article/K38336243"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539",
"refsource": "MISC",
"url": "https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K62602089",
"url": "https://support.f5.com/csp/article/K62602089"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "106563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106563"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K38336243",
"url": "https://support.f5.com/csp/article/K38336243"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-10061",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.npmjs.com/advisories/789",
"refsource": "MISC",
"name": "https://www.npmjs.com/advisories/789"
},
{
"refsource": "MISC",
"name": "https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b",
"url": "https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b"
},
{
"refsource": "MISC",
"name": "https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563",
"url": "https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10062",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7711",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. The undocumented shell command \"prompt\" sets the (user controlled) shell's prompt value, which is used as a format string input to printf, resulting in an information leak of memory addresses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/bl4ckic3/GHS-Bugs",
"refsource": "MISC",
"name": "https://github.com/bl4ckic3/GHS-Bugs"
},
{
"url": "https://www.ghs.com/products/rtos/integrity.html",
"refsource": "MISC",
"name": "https://www.ghs.com/products/rtos/integrity.html"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7712",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
@ -11,7 +34,33 @@
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue was discovered in handler_ipcom_shell_pwd in the Interpeak IPCOMShell TELNET server on Green Hills INTEGRITY RTOS 5.0.4. When using the pwd command, the current working directory path is used as the first argument to printf() without a proper check. An attacker may thus forge a path containing format string modifiers to get a custom format string evaluated. This results in an information leak of memory addresses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/bl4ckic3/GHS-Bugs",
"refsource": "MISC",
"name": "https://github.com/bl4ckic3/GHS-Bugs"
},
{
"url": "https://www.ghs.com/products/rtos/integrity.html",
"refsource": "MISC",
"name": "https://www.ghs.com/products/rtos/integrity.html"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/9238",
"url": "https://wpvulndb.com/vulnerabilities/9238"
},
{
"url": "https://www.cybersecurity-help.cz/vdb/SB2019032105",
"refsource": "MISC",