From e90a55aab85837c1459ff79a52552ff9a1dd9dae Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 22 Sep 2019 15:00:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/21xxx/CVE-2018-21018.json | 77 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15903.json | 5 +++ 2019/16xxx/CVE-2019-16692.json | 62 +++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16693.json | 62 +++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16694.json | 62 +++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16695.json | 62 +++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16696.json | 62 +++++++++++++++++++++++++++ 7 files changed, 392 insertions(+) create mode 100644 2018/21xxx/CVE-2018-21018.json create mode 100644 2019/16xxx/CVE-2019-16692.json create mode 100644 2019/16xxx/CVE-2019-16693.json create mode 100644 2019/16xxx/CVE-2019-16694.json create mode 100644 2019/16xxx/CVE-2019-16695.json create mode 100644 2019/16xxx/CVE-2019-16696.json diff --git a/2018/21xxx/CVE-2018-21018.json b/2018/21xxx/CVE-2018-21018.json new file mode 100644 index 00000000000..4ab073734b5 --- /dev/null +++ b/2018/21xxx/CVE-2018-21018.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-21018", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Mastodon before 2.6.3 mishandles timeouts of incompletely established sessions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/tootsuite/mastodon/releases/tag/v2.6.2", + "refsource": "MISC", + "name": "https://github.com/tootsuite/mastodon/releases/tag/v2.6.2" + }, + { + "url": "https://github.com/tootsuite/mastodon/releases/tag/v2.6.3", + "refsource": "MISC", + "name": "https://github.com/tootsuite/mastodon/releases/tag/v2.6.3" + }, + { + "url": "https://github.com/tootsuite/mastodon/pull/9329", + "refsource": "MISC", + "name": "https://github.com/tootsuite/mastodon/pull/9329" + }, + { + "url": "https://github.com/tootsuite/mastodon/pull/9381", + "refsource": "MISC", + "name": "https://github.com/tootsuite/mastodon/pull/9381" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15903.json b/2019/15xxx/CVE-2019-15903.json index f899f6b89ae..099f445e6cd 100644 --- a/2019/15xxx/CVE-2019-15903.json +++ b/2019/15xxx/CVE-2019-15903.json @@ -96,6 +96,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-613edfe68b", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/" + }, + { + "refsource": "DEBIAN", + "name": "DSA-4530", + "url": "https://www.debian.org/security/2019/dsa-4530" } ] } diff --git a/2019/16xxx/CVE-2019-16692.json b/2019/16xxx/CVE-2019-16692.json new file mode 100644 index 00000000000..add7588fe5e --- /dev/null +++ b/2019/16xxx/CVE-2019-16692.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16692", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter-result.php table parameter when action=add is used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/phpipam/phpipam/issues/2738", + "refsource": "MISC", + "name": "https://github.com/phpipam/phpipam/issues/2738" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16693.json b/2019/16xxx/CVE-2019-16693.json new file mode 100644 index 00000000000..5e12b97c8f7 --- /dev/null +++ b/2019/16xxx/CVE-2019-16693.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16693", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/order.php table parameter when action=add is used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/phpipam/phpipam/issues/2738", + "refsource": "MISC", + "name": "https://github.com/phpipam/phpipam/issues/2738" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16694.json b/2019/16xxx/CVE-2019-16694.json new file mode 100644 index 00000000000..8acdb20c500 --- /dev/null +++ b/2019/16xxx/CVE-2019-16694.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16694", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit-result.php table parameter when action=add is used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/phpipam/phpipam/issues/2738", + "refsource": "MISC", + "name": "https://github.com/phpipam/phpipam/issues/2738" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16695.json b/2019/16xxx/CVE-2019-16695.json new file mode 100644 index 00000000000..c0febc76e21 --- /dev/null +++ b/2019/16xxx/CVE-2019-16695.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16695", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter.php table parameter when action=add is used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/phpipam/phpipam/issues/2738", + "refsource": "MISC", + "name": "https://github.com/phpipam/phpipam/issues/2738" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16696.json b/2019/16xxx/CVE-2019-16696.json new file mode 100644 index 00000000000..2babca90bf7 --- /dev/null +++ b/2019/16xxx/CVE-2019-16696.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16696", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit.php table parameter when action=add is used." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/phpipam/phpipam/issues/2738", + "refsource": "MISC", + "name": "https://github.com/phpipam/phpipam/issues/2738" + } + ] + } +} \ No newline at end of file