Skip to content

Commit 2d06ee8

Browse files
committed
"-Synchronized-Data."
1 parent eb7cf8a commit 2d06ee8

29 files changed

+429
-26
lines changed

2019/16xxx/CVE-2019-16285.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,11 @@
6262
"refsource": "FULLDISC",
6363
"name": "20200324 HP ThinPro - Information disclosure",
6464
"url": "http://seclists.org/fulldisclosure/2020/Mar/30"
65+
},
66+
{
67+
"refsource": "MISC",
68+
"name": "http://packetstormsecurity.com/files/156895/HP-ThinPro-6.x-7.x-Information-Disclosure.html",
69+
"url": "http://packetstormsecurity.com/files/156895/HP-ThinPro-6.x-7.x-Information-Disclosure.html"
6570
}
6671
]
6772
},

2019/16xxx/CVE-2019-16286.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,11 @@
6262
"refsource": "FULLDISC",
6363
"name": "20200324 HP ThinPro - Application filter bypass",
6464
"url": "http://seclists.org/fulldisclosure/2020/Mar/37"
65+
},
66+
{
67+
"refsource": "MISC",
68+
"name": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html",
69+
"url": "http://packetstormsecurity.com/files/156898/HP-ThinPro-6.x-7.x-Filter-Bypass.html"
6570
}
6671
]
6772
},

2019/16xxx/CVE-2019-16287.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,11 @@
6262
"refsource": "FULLDISC",
6363
"name": "20200324 HP ThinPro - Privilege escalation",
6464
"url": "http://seclists.org/fulldisclosure/2020/Mar/38"
65+
},
66+
{
67+
"refsource": "MISC",
68+
"name": "http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html",
69+
"url": "http://packetstormsecurity.com/files/156899/HP-ThinPro-6.x-7.x-Privilege-Escalation.html"
6570
}
6671
]
6772
},

2019/18xxx/CVE-2019-18909.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,11 @@
6262
"refsource": "FULLDISC",
6363
"name": "20200324 HP ThinPro - Citrix command injection",
6464
"url": "http://seclists.org/fulldisclosure/2020/Mar/39"
65+
},
66+
{
67+
"refsource": "MISC",
68+
"name": "http://packetstormsecurity.com/files/156907/HP-ThinPro-6.x-7.x-Citrix-Command-Injection.html",
69+
"url": "http://packetstormsecurity.com/files/156907/HP-ThinPro-6.x-7.x-Citrix-Command-Injection.html"
6570
}
6671
]
6772
},

2019/18xxx/CVE-2019-18910.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,11 @@
6262
"refsource": "FULLDISC",
6363
"name": "20200324 HP ThinPro - Privileged command injection",
6464
"url": "http://seclists.org/fulldisclosure/2020/Mar/40"
65+
},
66+
{
67+
"refsource": "MISC",
68+
"name": "http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html",
69+
"url": "http://packetstormsecurity.com/files/156909/HP-ThinPro-6.x-7.x-Privileged-Command-Injection.html"
6570
}
6671
]
6772
},

2019/19xxx/CVE-2019-19127.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,11 @@
6161
"refsource": "MISC",
6262
"name": "http://seclists.org/fulldisclosure/2020/Mar/26",
6363
"url": "http://seclists.org/fulldisclosure/2020/Mar/26"
64+
},
65+
{
66+
"refsource": "MISC",
67+
"name": "http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html",
68+
"url": "http://packetstormsecurity.com/files/156903/SITS-Vision-9.7.0-Authentication-Bypass.html"
6469
}
6570
]
6671
}

2019/20xxx/CVE-2019-20633.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"CVE_data_meta": {
3+
"ASSIGNER": "[email protected]",
4+
"ID": "CVE-2019-20633",
5+
"STATE": "PUBLIC"
6+
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
29+
},
30+
"data_format": "MITRE",
31+
"data_type": "CVE",
32+
"data_version": "4.0",
33+
"description": {
34+
"description_data": [
35+
{
36+
"lang": "eng",
37+
"value": "GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"url": "https://savannah.gnu.org/bugs/index.php?56683",
57+
"refsource": "MISC",
58+
"name": "https://savannah.gnu.org/bugs/index.php?56683"
59+
}
60+
]
61+
}
62+
}

2019/7xxx/CVE-2019-7240.json

Lines changed: 46 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,30 @@
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
44
"ID": "CVE-2019-7240",
5-
"STATE": "RESERVED"
5+
"STATE": "PUBLIC"
6+
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
629
},
730
"data_format": "MITRE",
831
"data_type": "CVE",
@@ -11,7 +34,28 @@
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "An issue was discovered in WinRing0x64.sys in Moo0 System Monitor 1.83. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x9C402088 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"refsource": "MISC",
57+
"name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0004/FEYE-2019-0004.md",
58+
"url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0004/FEYE-2019-0004.md"
1559
}
1660
]
1761
}

2019/7xxx/CVE-2019-7244.json

Lines changed: 46 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,30 @@
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
44
"ID": "CVE-2019-7244",
5-
"STATE": "RESERVED"
5+
"STATE": "PUBLIC"
6+
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
629
},
730
"data_format": "MITRE",
831
"data_type": "CVE",
@@ -11,7 +34,28 @@
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "An issue was discovered in kerneld.sys in AIDA64 before 5.99. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x80112084 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"refsource": "MISC",
57+
"name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0010/FEYE-2019-0010.md",
58+
"url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0010/FEYE-2019-0010.md"
1559
}
1660
]
1761
}

2019/7xxx/CVE-2019-7245.json

Lines changed: 46 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,30 @@
22
"CVE_data_meta": {
33
"ASSIGNER": "[email protected]",
44
"ID": "CVE-2019-7245",
5-
"STATE": "RESERVED"
5+
"STATE": "PUBLIC"
6+
},
7+
"affects": {
8+
"vendor": {
9+
"vendor_data": [
10+
{
11+
"product": {
12+
"product_data": [
13+
{
14+
"product_name": "n/a",
15+
"version": {
16+
"version_data": [
17+
{
18+
"version_value": "n/a"
19+
}
20+
]
21+
}
22+
}
23+
]
24+
},
25+
"vendor_name": "n/a"
26+
}
27+
]
28+
}
629
},
730
"data_format": "MITRE",
831
"data_type": "CVE",
@@ -11,7 +34,28 @@
1134
"description_data": [
1235
{
1336
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
37+
"value": "An issue was discovered in GPU-Z.sys in TechPowerUp GPU-Z before 2.23.0. The vulnerable driver exposes a wrmsr instruction via an IOCTL and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges."
38+
}
39+
]
40+
},
41+
"problemtype": {
42+
"problemtype_data": [
43+
{
44+
"description": [
45+
{
46+
"lang": "eng",
47+
"value": "n/a"
48+
}
49+
]
50+
}
51+
]
52+
},
53+
"references": {
54+
"reference_data": [
55+
{
56+
"refsource": "MISC",
57+
"name": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0002/FEYE-2019-0002.md",
58+
"url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2019-0002/FEYE-2019-0002.md"
1559
}
1660
]
1761
}

0 commit comments

Comments
 (0)