diff --git a/2019/16xxx/CVE-2019-16759.json b/2019/16xxx/CVE-2019-16759.json index a39f9267fa7..de439a26ab7 100644 --- a/2019/16xxx/CVE-2019-16759.json +++ b/2019/16xxx/CVE-2019-16759.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/154648/vBulletin-5.x-Pre-Auth-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.html", + "url": "http://packetstormsecurity.com/files/155633/vBulletin-5.5.4-Remote-Command-Execution.html" } ] } diff --git a/2019/18xxx/CVE-2019-18346.json b/2019/18xxx/CVE-2019-18346.json index ac3ea7255f6..069756c7634 100644 --- a/2019/18xxx/CVE-2019-18346.json +++ b/2019/18xxx/CVE-2019-18346.json @@ -81,6 +81,11 @@ "refsource": "FULLDISC", "name": "20191210 CVE-2019-18346 Cross-Site Request Forgery (CSRF) vulnerability in DAViCal CalDAV Server", "url": "http://seclists.org/fulldisclosure/2019/Dec/18" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/155629/DAViCal-CalDAV-Server-1.1.8-Cross-Site-Request-Forgery.html" } ] } diff --git a/2019/18xxx/CVE-2019-18347.json b/2019/18xxx/CVE-2019-18347.json index 1b516e77f0b..18e734ede76 100644 --- a/2019/18xxx/CVE-2019-18347.json +++ b/2019/18xxx/CVE-2019-18347.json @@ -81,6 +81,11 @@ "refsource": "FULLDISC", "name": "20191210 CVE-2019-18346 Cross-Site Request Forgery (CSRF) vulnerability in DAViCal CalDAV Server", "url": "http://seclists.org/fulldisclosure/2019/Dec/18" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155628/DAViCal-CalDAV-Server-1.1.8-Persistent-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/155628/DAViCal-CalDAV-Server-1.1.8-Persistent-Cross-Site-Scripting.html" } ] } diff --git a/2019/19xxx/CVE-2019-19230.json b/2019/19xxx/CVE-2019-19230.json index 8e3cb046bbf..528abb2cec4 100644 --- a/2019/19xxx/CVE-2019-19230.json +++ b/2019/19xxx/CVE-2019-19230.json @@ -88,6 +88,11 @@ "refsource": "BUGTRAQ", "name": "20191210 CA20191209-01: Security Notice for CA Nolio (Release Automation)", "url": "https://seclists.org/bugtraq/2019/Dec/16" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/155631/CA-Nolio-6.6-Arbitrary-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/155631/CA-Nolio-6.6-Arbitrary-Code-Execution.html" } ] }, diff --git a/2019/19xxx/CVE-2019-19687.json b/2019/19xxx/CVE-2019-19687.json index b7ca2ab0cf5..dbf369f64ae 100644 --- a/2019/19xxx/CVE-2019-19687.json +++ b/2019/19xxx/CVE-2019-19687.json @@ -71,6 +71,11 @@ "url": "https://review.opendev.org/#/c/697731/", "refsource": "MISC", "name": "https://review.opendev.org/#/c/697731/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.openstack.org/ossa/OSSA-2019-006.html", + "url": "https://security.openstack.org/ossa/OSSA-2019-006.html" } ] } diff --git a/2019/19xxx/CVE-2019-19707.json b/2019/19xxx/CVE-2019-19707.json new file mode 100644 index 00000000000..8998afa3663 --- /dev/null +++ b/2019/19xxx/CVE-2019-19707.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-19707", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities", + "refsource": "MISC", + "name": "https://www.moxa.com/en/support/support/security-advisory/eds-g508e-g512e-g516e-series-ethernet-switches-vulnerabilities" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19708.json b/2019/19xxx/CVE-2019-19708.json new file mode 100644 index 00000000000..011ca4ed1b4 --- /dev/null +++ b/2019/19xxx/CVE-2019-19708.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-19708", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The VisualEditor extension through 1.34 for MediaWiki allows XSS via pasted content containing an element with a data-ve-clipboard-key attribute." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T239209", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T239209" + }, + { + "url": "https://gerrit.wikimedia.org/r/q/I1f99458fd2c4f6b2460dfe7a93b330ddee4400b6", + "refsource": "MISC", + "name": "https://gerrit.wikimedia.org/r/q/I1f99458fd2c4f6b2460dfe7a93b330ddee4400b6" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19709.json b/2019/19xxx/CVE-2019-19709.json new file mode 100644 index 00000000000..86aa94bfa9b --- /dev/null +++ b/2019/19xxx/CVE-2019-19709.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-19709", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://phabricator.wikimedia.org/T239466", + "refsource": "MISC", + "name": "https://phabricator.wikimedia.org/T239466" + }, + { + "url": "https://gerrit.wikimedia.org/r/q/Ie54f366986056c876eade0fcad6c41f70b8b8de8", + "refsource": "MISC", + "name": "https://gerrit.wikimedia.org/r/q/Ie54f366986056c876eade0fcad6c41f70b8b8de8" + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19710.json b/2019/19xxx/CVE-2019-19710.json new file mode 100644 index 00000000000..e6d4566485a --- /dev/null +++ b/2019/19xxx/CVE-2019-19710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/19xxx/CVE-2019-19711.json b/2019/19xxx/CVE-2019-19711.json new file mode 100644 index 00000000000..54352a9b4b1 --- /dev/null +++ b/2019/19xxx/CVE-2019-19711.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-19711", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file