"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-10-23 15:00:57 +00:00
parent d4af9b37b3
commit fae2159d38
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
33 changed files with 296 additions and 55 deletions

View File

@ -108,6 +108,11 @@
"refsource": "MLIST",
"name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[shiro-dev] 20191023 [jira] [Assigned] (SHIRO-723) Provide Minor Shiro Release that includes CVE-2019-10086 Fix",
"url": "https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E"
}
]
},

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1628",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1628",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1546",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1546",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1477",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1477",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(1)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(1)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(2)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(2)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-820",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-822",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-822",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1003",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1003",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(2)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(2)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(2)",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(2)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1073",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1073",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1490",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1490",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -56,6 +56,11 @@
"name": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1621",
"url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1621",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191023 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/10/23/2"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "MISC",
"name": "https://github.com/fusionpbx/fusionpbx/commit/2f9e591a4034c3aea70185dcab837946096449bf"
},
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=8834a501-3a18-429a-aa84-192dc01e66c7",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=8834a501-3a18-429a-aa84-192dc01e66c7"
},
{
"refsource": "MISC",
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-sofia-api-command-injection-1/",

View File

@ -57,11 +57,6 @@
"refsource": "MISC",
"name": "https://github.com/fusionpbx/fusionpbx/commit/6baad9af1bc55c80b793af3bd1ac35b39c20b173"
},
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=14811194-6897-4e22-9110-b5767d46a536",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=14811194-6897-4e22-9110-b5767d46a536"
},
{
"refsource": "MISC",
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-sofia-api-command-injection-2/",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=5f72cb0b-54d7-487d-a8b9-8b30b7a02376",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=5f72cb0b-54d7-487d-a8b9-8b30b7a02376"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/02378c54722d89f875c66ddb00ff06468dabbc6d",
"refsource": "MISC",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=408a8556-5ba5-44bb-a341-7cd96c76cad7",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=408a8556-5ba5-44bb-a341-7cd96c76cad7"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/d3679bbeface57a21f6623cbc193b04a7fc0a885",
"refsource": "MISC",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=dc5f192e-c6e0-4526-bb66-687a88d435ec",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=dc5f192e-c6e0-4526-bb66-687a88d435ec"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/a55f1cd5d8edd655058152e9acf212680d5b75f3",
"refsource": "MISC",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=bc250780-76ba-48c1-adc0-de421cbd61fd",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=bc250780-76ba-48c1-adc0-de421cbd61fd"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/c48a160af53352ad1a43518b7d0faab16b8dfbcc",
"refsource": "MISC",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=f0f687f2-63c6-4740-b90b-d3ba3a3bd043",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=f0f687f2-63c6-4740-b90b-d3ba3a3bd043"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/913ad234cf145a55e5f2faaab08d776d83c1699b",
"refsource": "MISC",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=e4f9dc60-6a4b-4e4f-9abf-975614822d43",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=e4f9dc60-6a4b-4e4f-9abf-975614822d43"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/bcc75d63aa5b721f699a2b416425943ad7707825",
"refsource": "MISC",

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16976",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In FusionPBX up to 4.5.7, the file app\\destinations\\destination_imports.php uses an unsanitized \"query_string\" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/d6ea02d896b2c57dec491ee3b36ec102639270be",
"refsource": "MISC",
"name": "https://github.com/fusionpbx/fusionpbx/commit/d6ea02d896b2c57dec491ee3b36ec102639270be"
},
{
"refsource": "MISC",
"name": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-9/",
"url": "https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-xss-9/"
}
]
}
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a8614e66-95b7-490f-9aa8-10de5f3f9b7d",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=a8614e66-95b7-490f-9aa8-10de5f3f9b7d"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/83622c4ee1d9dd1913e9fb01ce8f060b46a5768a",
"refsource": "MISC",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=15d02f7a-3dc0-441a-ac70-e09f95817004",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=15d02f7a-3dc0-441a-ac70-e09f95817004"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/7fec1014ff0d08e36be6a3f7664edb3a9df7b4ac",
"refsource": "MISC",

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"url": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=84d7fa60-99d5-41a2-a392-0b0a727e5987",
"refsource": "MISC",
"name": "https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=84d7fa60-99d5-41a2-a392-0b0a727e5987"
},
{
"url": "https://github.com/fusionpbx/fusionpbx/commit/cd4632b46c62855f7e1c1c93d20ffd64edcb476e",
"refsource": "MISC",

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18281",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows attackers to cause a denial of service by crashing an application via a text file containing many directional characters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugreports.qt.io/browse/QTBUG-77819",
"refsource": "MISC",
"name": "https://bugreports.qt.io/browse/QTBUG-77819"
},
{
"url": "https://codereview.qt-project.org/c/qt/qtbase/+/271889",
"refsource": "MISC",
"name": "https://codereview.qt-project.org/c/qt/qtbase/+/271889"
},
{
"url": "https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1848784",
"refsource": "MISC",
"name": "https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1848784"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18344",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sourcecodester Online Grading System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the student, instructor, department, room, class, or user page (id or classid parameter)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli",
"refsource": "MISC",
"name": "https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli"
}
]
}
}