"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-17 12:01:04 +00:00
parent dd87ad579c
commit fbc1a9149d
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
6 changed files with 226 additions and 0 deletions

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15131",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Code42 Enterprise 6.7.5 and earlier, 6.8.4 through 6.8.8, and 7.0.0 a vulnerability has been identified that may allow arbitrary files to be uploaded to Code42 servers and executed. This vulnerability could allow an attacker to create directories and save files on Code42 servers, which could potentially lead to code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories",
"refsource": "MISC",
"name": "https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories"
},
{
"refsource": "CONFIRM",
"name": "https://code42.com/r/support/CVE-2019-15131",
"url": "https://code42.com/r/support/CVE-2019-15131"
}
]
}
}

View File

@ -71,6 +71,11 @@
"refsource": "BUGTRAQ",
"name": "20190917 [SECURITY] [DSA 4524-1] dino-im security update",
"url": "https://seclists.org/bugtraq/2019/Sep/31"
},
{
"refsource": "DEBIAN",
"name": "DSA-4524",
"url": "https://www.debian.org/security/2019/dsa-4524"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "BUGTRAQ",
"name": "20190917 [SECURITY] [DSA 4524-1] dino-im security update",
"url": "https://seclists.org/bugtraq/2019/Sep/31"
},
{
"refsource": "DEBIAN",
"name": "DSA-4524",
"url": "https://www.debian.org/security/2019/dsa-4524"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "BUGTRAQ",
"name": "20190917 [SECURITY] [DSA 4524-1] dino-im security update",
"url": "https://seclists.org/bugtraq/2019/Sep/31"
},
{
"refsource": "DEBIAN",
"name": "DSA-4524",
"url": "https://www.debian.org/security/2019/dsa-4524"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16239",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://t2.fi/schedule/2019/",
"refsource": "MISC",
"name": "https://t2.fi/schedule/2019/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-6969467639",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/"
},
{
"refsource": "CONFIRM",
"name": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html",
"url": "http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16378",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 is prone to a signature-bypass vulnerability with multiple From: addresses, which might affect applications that consider a domain name to be relevant to the origin of an e-mail message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/trusteddomainproject/OpenDMARC/pull/48",
"refsource": "MISC",
"name": "https://github.com/trusteddomainproject/OpenDMARC/pull/48"
},
{
"url": "https://bugs.debian.org/940081",
"refsource": "MISC",
"name": "https://bugs.debian.org/940081"
},
{
"url": "https://www.openwall.com/lists/oss-security/2019/09/11/8",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2019/09/11/8"
}
]
}
}