From fdcd8989c84f9a577811f46e433c61c3d39c3b9c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 17 Feb 2019 14:04:46 -0500 Subject: [PATCH] - Synchronized data. --- 2019/8xxx/CVE-2019-8409.json | 18 +++++++++++ 2019/8xxx/CVE-2019-8410.json | 18 +++++++++++ 2019/8xxx/CVE-2019-8411.json | 62 ++++++++++++++++++++++++++++++++++++ 2019/8xxx/CVE-2019-8412.json | 62 ++++++++++++++++++++++++++++++++++++ 2019/8xxx/CVE-2019-8413.json | 62 ++++++++++++++++++++++++++++++++++++ 5 files changed, 222 insertions(+) create mode 100644 2019/8xxx/CVE-2019-8409.json create mode 100644 2019/8xxx/CVE-2019-8410.json create mode 100644 2019/8xxx/CVE-2019-8411.json create mode 100644 2019/8xxx/CVE-2019-8412.json create mode 100644 2019/8xxx/CVE-2019-8413.json diff --git a/2019/8xxx/CVE-2019-8409.json b/2019/8xxx/CVE-2019-8409.json new file mode 100644 index 00000000000..0c41cd0389c --- /dev/null +++ b/2019/8xxx/CVE-2019-8409.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8409", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8410.json b/2019/8xxx/CVE-2019-8410.json new file mode 100644 index 00000000000..a6efe008783 --- /dev/null +++ b/2019/8xxx/CVE-2019-8410.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8410", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8411.json b/2019/8xxx/CVE-2019-8411.json new file mode 100644 index 00000000000..bf79c4fb3c7 --- /dev/null +++ b/2019/8xxx/CVE-2019-8411.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8411", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "admin/dl_data.php in zzcms 2018 (2018-10-19) allows remote attackers to delete arbitrary files via action=del&filename=../ directory traversal." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/615/VulnPoC/issues/1", + "refsource" : "MISC", + "url" : "https://github.com/615/VulnPoC/issues/1" + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8412.json b/2019/8xxx/CVE-2019-8412.json new file mode 100644 index 00000000000..4eb1cf4e58e --- /dev/null +++ b/2019/8xxx/CVE-2019-8412.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8412", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "FeiFeiCms 4.0.181010 on Windows allows remote attackers to read or delete arbitrary files via index.php?s=Admin-Data-Down-id-..\\ or index.php?s=Admin-Data-Del-id-..\\ directory traversal." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/615/cms_vuln/blob/master/feifei.docx", + "refsource" : "MISC", + "url" : "https://github.com/615/cms_vuln/blob/master/feifei.docx" + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8413.json b/2019/8xxx/CVE-2019-8413.json new file mode 100644 index 00000000000..583d74c1bac --- /dev/null +++ b/2019/8xxx/CVE-2019-8413.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8413", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "On Xiaomi MIX 2 devices with the 4.4.78 kernel, a NULL pointer dereference in the ioctl interface of the device file /dev/elliptic1 or /dev/elliptic0 causes a system crash via IOCTL 0x4008c575 (aka decimal 1074316661)." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/datadancer/HIAFuzz/blob/master/MIX2_elliptic.md", + "refsource" : "MISC", + "url" : "https://github.com/datadancer/HIAFuzz/blob/master/MIX2_elliptic.md" + } + ] + } +}