From fd5872239108cc6ee9be13a39720e64b52872d8c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Apr 2019 22:00:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/0xxx/CVE-2019-0739.json | 5 ++++ 2019/0xxx/CVE-2019-0764.json | 5 ++++ 2019/0xxx/CVE-2019-0790.json | 5 ++++ 2019/0xxx/CVE-2019-0791.json | 5 ++++ 2019/0xxx/CVE-2019-0792.json | 5 ++++ 2019/0xxx/CVE-2019-0793.json | 5 ++++ 2019/0xxx/CVE-2019-0795.json | 5 ++++ 2019/0xxx/CVE-2019-0815.json | 5 ++++ 2019/0xxx/CVE-2019-0833.json | 5 ++++ 2019/0xxx/CVE-2019-0842.json | 5 ++++ 2019/0xxx/CVE-2019-0860.json | 5 ++++ 2019/0xxx/CVE-2019-0861.json | 5 ++++ 2019/0xxx/CVE-2019-0862.json | 5 ++++ 2019/0xxx/CVE-2019-0867.json | 5 ++++ 2019/0xxx/CVE-2019-0869.json | 5 ++++ 2019/0xxx/CVE-2019-0870.json | 5 ++++ 2019/0xxx/CVE-2019-0871.json | 5 ++++ 2019/0xxx/CVE-2019-0876.json | 5 ++++ 2019/0xxx/CVE-2019-0879.json | 5 ++++ 2019/1xxx/CVE-2019-1573.json | 58 +++++++++++++++++++++++++++++++----- 20 files changed, 146 insertions(+), 7 deletions(-) diff --git a/2019/0xxx/CVE-2019-0739.json b/2019/0xxx/CVE-2019-0739.json index a9234201664..f10619cda79 100644 --- a/2019/0xxx/CVE-2019-0739.json +++ b/2019/0xxx/CVE-2019-0739.json @@ -114,6 +114,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0739", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0739" + }, + { + "refsource": "BID", + "name": "107708", + "url": "http://www.securityfocus.com/bid/107708" } ] } diff --git a/2019/0xxx/CVE-2019-0764.json b/2019/0xxx/CVE-2019-0764.json index bb9b34ac09b..df738f29481 100644 --- a/2019/0xxx/CVE-2019-0764.json +++ b/2019/0xxx/CVE-2019-0764.json @@ -206,6 +206,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0764", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0764" + }, + { + "refsource": "BID", + "name": "107731", + "url": "http://www.securityfocus.com/bid/107731" } ] } diff --git a/2019/0xxx/CVE-2019-0790.json b/2019/0xxx/CVE-2019-0790.json index 45bb456dddc..4486e1aa1c8 100644 --- a/2019/0xxx/CVE-2019-0790.json +++ b/2019/0xxx/CVE-2019-0790.json @@ -144,6 +144,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0790", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0790" + }, + { + "refsource": "BID", + "name": "107702", + "url": "http://www.securityfocus.com/bid/107702" } ] } diff --git a/2019/0xxx/CVE-2019-0791.json b/2019/0xxx/CVE-2019-0791.json index 9d90edc78b0..736a03f6f5d 100644 --- a/2019/0xxx/CVE-2019-0791.json +++ b/2019/0xxx/CVE-2019-0791.json @@ -174,6 +174,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0791", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0791" + }, + { + "refsource": "BID", + "name": "107726", + "url": "http://www.securityfocus.com/bid/107726" } ] } diff --git a/2019/0xxx/CVE-2019-0792.json b/2019/0xxx/CVE-2019-0792.json index 9c5c7331e58..b3ddc2ee05a 100644 --- a/2019/0xxx/CVE-2019-0792.json +++ b/2019/0xxx/CVE-2019-0792.json @@ -174,6 +174,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0792", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0792" + }, + { + "refsource": "BID", + "name": "107728", + "url": "http://www.securityfocus.com/bid/107728" } ] } diff --git a/2019/0xxx/CVE-2019-0793.json b/2019/0xxx/CVE-2019-0793.json index 4acf4d65fc3..f859916bd50 100644 --- a/2019/0xxx/CVE-2019-0793.json +++ b/2019/0xxx/CVE-2019-0793.json @@ -174,6 +174,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0793", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0793" + }, + { + "refsource": "BID", + "name": "107729", + "url": "http://www.securityfocus.com/bid/107729" } ] } diff --git a/2019/0xxx/CVE-2019-0795.json b/2019/0xxx/CVE-2019-0795.json index 1b4bf8602f7..7910bced2a3 100644 --- a/2019/0xxx/CVE-2019-0795.json +++ b/2019/0xxx/CVE-2019-0795.json @@ -174,6 +174,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0795", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0795" + }, + { + "refsource": "BID", + "name": "107732", + "url": "http://www.securityfocus.com/bid/107732" } ] } diff --git a/2019/0xxx/CVE-2019-0815.json b/2019/0xxx/CVE-2019-0815.json index 44ab140d5c5..63a63aa0a1f 100644 --- a/2019/0xxx/CVE-2019-0815.json +++ b/2019/0xxx/CVE-2019-0815.json @@ -56,6 +56,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0815", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0815" + }, + { + "refsource": "BID", + "name": "107701", + "url": "http://www.securityfocus.com/bid/107701" } ] } diff --git a/2019/0xxx/CVE-2019-0833.json b/2019/0xxx/CVE-2019-0833.json index d780dadc3a6..9c19440b8c7 100644 --- a/2019/0xxx/CVE-2019-0833.json +++ b/2019/0xxx/CVE-2019-0833.json @@ -65,6 +65,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0833", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0833" + }, + { + "refsource": "BID", + "name": "107704", + "url": "http://www.securityfocus.com/bid/107704" } ] } diff --git a/2019/0xxx/CVE-2019-0842.json b/2019/0xxx/CVE-2019-0842.json index 02cef569e57..9eedc02d2fe 100644 --- a/2019/0xxx/CVE-2019-0842.json +++ b/2019/0xxx/CVE-2019-0842.json @@ -174,6 +174,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0842", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0842" + }, + { + "refsource": "BID", + "name": "107725", + "url": "http://www.securityfocus.com/bid/107725" } ] } diff --git a/2019/0xxx/CVE-2019-0860.json b/2019/0xxx/CVE-2019-0860.json index b7a8ccf0bc8..4b1fde1472e 100644 --- a/2019/0xxx/CVE-2019-0860.json +++ b/2019/0xxx/CVE-2019-0860.json @@ -114,6 +114,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0860", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0860" + }, + { + "refsource": "BID", + "name": "107722", + "url": "http://www.securityfocus.com/bid/107722" } ] } diff --git a/2019/0xxx/CVE-2019-0861.json b/2019/0xxx/CVE-2019-0861.json index f9695f85595..8acc3fa1fe5 100644 --- a/2019/0xxx/CVE-2019-0861.json +++ b/2019/0xxx/CVE-2019-0861.json @@ -114,6 +114,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0861", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0861" + }, + { + "refsource": "BID", + "name": "107724", + "url": "http://www.securityfocus.com/bid/107724" } ] } diff --git a/2019/0xxx/CVE-2019-0862.json b/2019/0xxx/CVE-2019-0862.json index 35d1313b14e..e4ad3e2672d 100644 --- a/2019/0xxx/CVE-2019-0862.json +++ b/2019/0xxx/CVE-2019-0862.json @@ -135,6 +135,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0862", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0862" + }, + { + "refsource": "BID", + "name": "107727", + "url": "http://www.securityfocus.com/bid/107727" } ] } diff --git a/2019/0xxx/CVE-2019-0867.json b/2019/0xxx/CVE-2019-0867.json index 1e5f3a21600..595c370396a 100644 --- a/2019/0xxx/CVE-2019-0867.json +++ b/2019/0xxx/CVE-2019-0867.json @@ -66,6 +66,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0867", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0867" + }, + { + "refsource": "BID", + "name": "107752", + "url": "http://www.securityfocus.com/bid/107752" } ] } diff --git a/2019/0xxx/CVE-2019-0869.json b/2019/0xxx/CVE-2019-0869.json index 0d50b195942..2ff28cc90e8 100644 --- a/2019/0xxx/CVE-2019-0869.json +++ b/2019/0xxx/CVE-2019-0869.json @@ -56,6 +56,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0869", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0869" + }, + { + "refsource": "BID", + "name": "107768", + "url": "http://www.securityfocus.com/bid/107768" } ] } diff --git a/2019/0xxx/CVE-2019-0870.json b/2019/0xxx/CVE-2019-0870.json index 4ba3e183c79..a7dede86550 100644 --- a/2019/0xxx/CVE-2019-0870.json +++ b/2019/0xxx/CVE-2019-0870.json @@ -79,6 +79,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0870", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0870" + }, + { + "refsource": "BID", + "name": "107754", + "url": "http://www.securityfocus.com/bid/107754" } ] } diff --git a/2019/0xxx/CVE-2019-0871.json b/2019/0xxx/CVE-2019-0871.json index c4e511e1186..d7e069c544f 100644 --- a/2019/0xxx/CVE-2019-0871.json +++ b/2019/0xxx/CVE-2019-0871.json @@ -79,6 +79,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0871", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0871" + }, + { + "refsource": "BID", + "name": "107755", + "url": "http://www.securityfocus.com/bid/107755" } ] } diff --git a/2019/0xxx/CVE-2019-0876.json b/2019/0xxx/CVE-2019-0876.json index 2be1f4ab7ad..15bcb2d514a 100644 --- a/2019/0xxx/CVE-2019-0876.json +++ b/2019/0xxx/CVE-2019-0876.json @@ -56,6 +56,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0876", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0876" + }, + { + "refsource": "BID", + "name": "107743", + "url": "http://www.securityfocus.com/bid/107743" } ] } diff --git a/2019/0xxx/CVE-2019-0879.json b/2019/0xxx/CVE-2019-0879.json index ad06870f72e..c4849af8990 100644 --- a/2019/0xxx/CVE-2019-0879.json +++ b/2019/0xxx/CVE-2019-0879.json @@ -174,6 +174,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0879", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0879" + }, + { + "refsource": "BID", + "name": "107741", + "url": "http://www.securityfocus.com/bid/107741" } ] } diff --git a/2019/1xxx/CVE-2019-1573.json b/2019/1xxx/CVE-2019-1573.json index d7cba5f514b..4339bd66734 100644 --- a/2019/1xxx/CVE-2019-1573.json +++ b/2019/1xxx/CVE-2019-1573.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-1573", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-1573", + "ASSIGNER": "psirt@paloaltonetworks.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Palo Alto Networks GlobalProtect Agent", + "version": { + "version_data": [ + { + "version_value": "Global ProtectAgent 4.1.10 and earlier for macOS and GlobalProtect Agent 4.1.0 for Windows" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Authentication Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/146", + "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/146" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow an attacker to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user." } ] }