From fd6e62e5e22a930d423edc0f38eb82699b2dbf2d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 3 Jun 2019 03:00:47 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/12xxx/CVE-2019-12581.json | 18 +++++++++ 2019/12xxx/CVE-2019-12582.json | 18 +++++++++ 2019/12xxx/CVE-2019-12583.json | 18 +++++++++ 2019/12xxx/CVE-2019-12584.json | 67 +++++++++++++++++++++++++++++++ 2019/12xxx/CVE-2019-12585.json | 67 +++++++++++++++++++++++++++++++ 2019/12xxx/CVE-2019-12586.json | 18 +++++++++ 2019/12xxx/CVE-2019-12587.json | 18 +++++++++ 2019/12xxx/CVE-2019-12588.json | 18 +++++++++ 2019/12xxx/CVE-2019-12589.json | 72 ++++++++++++++++++++++++++++++++++ 9 files changed, 314 insertions(+) create mode 100644 2019/12xxx/CVE-2019-12581.json create mode 100644 2019/12xxx/CVE-2019-12582.json create mode 100644 2019/12xxx/CVE-2019-12583.json create mode 100644 2019/12xxx/CVE-2019-12584.json create mode 100644 2019/12xxx/CVE-2019-12585.json create mode 100644 2019/12xxx/CVE-2019-12586.json create mode 100644 2019/12xxx/CVE-2019-12587.json create mode 100644 2019/12xxx/CVE-2019-12588.json create mode 100644 2019/12xxx/CVE-2019-12589.json diff --git a/2019/12xxx/CVE-2019-12581.json b/2019/12xxx/CVE-2019-12581.json new file mode 100644 index 00000000000..7d95691e9de --- /dev/null +++ b/2019/12xxx/CVE-2019-12581.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12581", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12582.json b/2019/12xxx/CVE-2019-12582.json new file mode 100644 index 00000000000..dd0bf90a8b0 --- /dev/null +++ b/2019/12xxx/CVE-2019-12582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12583.json b/2019/12xxx/CVE-2019-12583.json new file mode 100644 index 00000000000..ed8147381fa --- /dev/null +++ b/2019/12xxx/CVE-2019-12583.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12583", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12584.json b/2019/12xxx/CVE-2019-12584.json new file mode 100644 index 00000000000..fd701f62bcd --- /dev/null +++ b/2019/12xxx/CVE-2019-12584.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12584", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Apcupsd 0.3.91_5, as used in pfSense through 2.4.4-RELEASE-p3 and other products, has an XSS issue in apcupsd_status.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pfsense/FreeBSD-ports/commit/b492c0ea47aba8dde2f14183e71498ba207594e3", + "refsource": "MISC", + "name": "https://github.com/pfsense/FreeBSD-ports/commit/b492c0ea47aba8dde2f14183e71498ba207594e3" + }, + { + "url": "https://redmine.pfsense.org/issues/9556", + "refsource": "MISC", + "name": "https://redmine.pfsense.org/issues/9556" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12585.json b/2019/12xxx/CVE-2019-12585.json new file mode 100644 index 00000000000..289e9bad9e3 --- /dev/null +++ b/2019/12xxx/CVE-2019-12585.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12585", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Apcupsd 0.3.91_5, as used in pfSense through 2.4.4-RELEASE-p3 and other products, has an Arbitrary Command Execution issue in apcupsd_status.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pfsense/FreeBSD-ports/commit/b492c0ea47aba8dde2f14183e71498ba207594e3", + "refsource": "MISC", + "name": "https://github.com/pfsense/FreeBSD-ports/commit/b492c0ea47aba8dde2f14183e71498ba207594e3" + }, + { + "url": "https://redmine.pfsense.org/issues/9556", + "refsource": "MISC", + "name": "https://redmine.pfsense.org/issues/9556" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12586.json b/2019/12xxx/CVE-2019-12586.json new file mode 100644 index 00000000000..bf1a31e98e7 --- /dev/null +++ b/2019/12xxx/CVE-2019-12586.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12586", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12587.json b/2019/12xxx/CVE-2019-12587.json new file mode 100644 index 00000000000..b75c8d59c39 --- /dev/null +++ b/2019/12xxx/CVE-2019-12587.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12587", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12588.json b/2019/12xxx/CVE-2019-12588.json new file mode 100644 index 00000000000..bc8fb469b7f --- /dev/null +++ b/2019/12xxx/CVE-2019-12588.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12588", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12589.json b/2019/12xxx/CVE-2019-12589.json new file mode 100644 index 00000000000..f95a269d531 --- /dev/null +++ b/2019/12xxx/CVE-2019-12589.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12589", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/netblue30/firejail/issues/2718", + "refsource": "MISC", + "name": "https://github.com/netblue30/firejail/issues/2718" + }, + { + "url": "https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134", + "refsource": "MISC", + "name": "https://github.com/netblue30/firejail/commit/eecf35c2f8249489a1d3e512bb07f0d427183134" + }, + { + "url": "https://github.com/netblue30/firejail/releases/tag/0.9.60", + "refsource": "MISC", + "name": "https://github.com/netblue30/firejail/releases/tag/0.9.60" + } + ] + } +} \ No newline at end of file