From 0328bd55defc7680b88e045fbd3d757ee82ec946 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 7 Feb 2019 14:05:18 -0500 Subject: [PATCH] - Synchronized data. --- 2019/1xxx/CVE-2019-1677.json | 168 +++++++++++++++++------------------ 2019/3xxx/CVE-2019-3704.json | 99 +++++++++++---------- 2019/7xxx/CVE-2019-7586.json | 18 ++++ 2019/7xxx/CVE-2019-7587.json | 62 +++++++++++++ 2019/7xxx/CVE-2019-7588.json | 18 ++++ 2019/7xxx/CVE-2019-7589.json | 18 ++++ 2019/7xxx/CVE-2019-7590.json | 18 ++++ 2019/7xxx/CVE-2019-7591.json | 18 ++++ 2019/7xxx/CVE-2019-7592.json | 18 ++++ 2019/7xxx/CVE-2019-7593.json | 18 ++++ 2019/7xxx/CVE-2019-7594.json | 18 ++++ 2019/7xxx/CVE-2019-7595.json | 18 ++++ 2019/7xxx/CVE-2019-7596.json | 18 ++++ 2019/7xxx/CVE-2019-7597.json | 18 ++++ 2019/7xxx/CVE-2019-7598.json | 18 ++++ 2019/7xxx/CVE-2019-7599.json | 18 ++++ 2019/7xxx/CVE-2019-7600.json | 18 ++++ 2019/7xxx/CVE-2019-7601.json | 18 ++++ 2019/7xxx/CVE-2019-7602.json | 18 ++++ 2019/7xxx/CVE-2019-7603.json | 18 ++++ 2019/7xxx/CVE-2019-7604.json | 18 ++++ 2019/7xxx/CVE-2019-7605.json | 18 ++++ 2019/7xxx/CVE-2019-7606.json | 18 ++++ 2019/7xxx/CVE-2019-7607.json | 18 ++++ 2019/7xxx/CVE-2019-7608.json | 18 ++++ 2019/7xxx/CVE-2019-7609.json | 18 ++++ 2019/7xxx/CVE-2019-7610.json | 18 ++++ 2019/7xxx/CVE-2019-7611.json | 18 ++++ 2019/7xxx/CVE-2019-7612.json | 18 ++++ 2019/7xxx/CVE-2019-7613.json | 18 ++++ 2019/7xxx/CVE-2019-7614.json | 18 ++++ 2019/7xxx/CVE-2019-7615.json | 18 ++++ 2019/7xxx/CVE-2019-7616.json | 18 ++++ 2019/7xxx/CVE-2019-7617.json | 18 ++++ 2019/7xxx/CVE-2019-7618.json | 18 ++++ 2019/7xxx/CVE-2019-7619.json | 18 ++++ 2019/7xxx/CVE-2019-7620.json | 18 ++++ 2019/7xxx/CVE-2019-7621.json | 18 ++++ 2019/7xxx/CVE-2019-7622.json | 18 ++++ 2019/7xxx/CVE-2019-7623.json | 18 ++++ 2019/7xxx/CVE-2019-7624.json | 18 ++++ 2019/7xxx/CVE-2019-7625.json | 18 ++++ 2019/7xxx/CVE-2019-7626.json | 18 ++++ 2019/7xxx/CVE-2019-7627.json | 18 ++++ 44 files changed, 934 insertions(+), 133 deletions(-) create mode 100644 2019/7xxx/CVE-2019-7586.json create mode 100644 2019/7xxx/CVE-2019-7587.json create mode 100644 2019/7xxx/CVE-2019-7588.json create mode 100644 2019/7xxx/CVE-2019-7589.json create mode 100644 2019/7xxx/CVE-2019-7590.json create mode 100644 2019/7xxx/CVE-2019-7591.json create mode 100644 2019/7xxx/CVE-2019-7592.json create mode 100644 2019/7xxx/CVE-2019-7593.json create mode 100644 2019/7xxx/CVE-2019-7594.json create mode 100644 2019/7xxx/CVE-2019-7595.json create mode 100644 2019/7xxx/CVE-2019-7596.json create mode 100644 2019/7xxx/CVE-2019-7597.json create mode 100644 2019/7xxx/CVE-2019-7598.json create mode 100644 2019/7xxx/CVE-2019-7599.json create mode 100644 2019/7xxx/CVE-2019-7600.json create mode 100644 2019/7xxx/CVE-2019-7601.json create mode 100644 2019/7xxx/CVE-2019-7602.json create mode 100644 2019/7xxx/CVE-2019-7603.json create mode 100644 2019/7xxx/CVE-2019-7604.json create mode 100644 2019/7xxx/CVE-2019-7605.json create mode 100644 2019/7xxx/CVE-2019-7606.json create mode 100644 2019/7xxx/CVE-2019-7607.json create mode 100644 2019/7xxx/CVE-2019-7608.json create mode 100644 2019/7xxx/CVE-2019-7609.json create mode 100644 2019/7xxx/CVE-2019-7610.json create mode 100644 2019/7xxx/CVE-2019-7611.json create mode 100644 2019/7xxx/CVE-2019-7612.json create mode 100644 2019/7xxx/CVE-2019-7613.json create mode 100644 2019/7xxx/CVE-2019-7614.json create mode 100644 2019/7xxx/CVE-2019-7615.json create mode 100644 2019/7xxx/CVE-2019-7616.json create mode 100644 2019/7xxx/CVE-2019-7617.json create mode 100644 2019/7xxx/CVE-2019-7618.json create mode 100644 2019/7xxx/CVE-2019-7619.json create mode 100644 2019/7xxx/CVE-2019-7620.json create mode 100644 2019/7xxx/CVE-2019-7621.json create mode 100644 2019/7xxx/CVE-2019-7622.json create mode 100644 2019/7xxx/CVE-2019-7623.json create mode 100644 2019/7xxx/CVE-2019-7624.json create mode 100644 2019/7xxx/CVE-2019-7625.json create mode 100644 2019/7xxx/CVE-2019-7626.json create mode 100644 2019/7xxx/CVE-2019-7627.json diff --git a/2019/1xxx/CVE-2019-1677.json b/2019/1xxx/CVE-2019-1677.json index e012a38cfc3..dd705c2f6cb 100644 --- a/2019/1xxx/CVE-2019-1677.json +++ b/2019/1xxx/CVE-2019-1677.json @@ -1,87 +1,87 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@cisco.com", - "DATE_PUBLIC": "2019-02-06T16:00:00-0800", - "ID": "CVE-2019-1677", - "STATE": "PUBLIC", - "TITLE": "Cisco Webex Meetings for Android Cross-Site Scripting Vulnerability" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Cisco WebEx Meetings for Android ", - "version": { - "version_data": [ - { - "affected": "<", - "version_value": "11.7.0.236" - } - ] - } - } - ] - }, - "vendor_name": "Cisco" - } + "CVE_data_meta" : { + "ASSIGNER" : "psirt@cisco.com", + "DATE_PUBLIC" : "2019-02-06T16:00:00-0800", + "ID" : "CVE-2019-1677", + "STATE" : "PUBLIC", + "TITLE" : "Cisco Webex Meetings for Android Cross-Site Scripting Vulnerability" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Cisco WebEx Meetings for Android ", + "version" : { + "version_data" : [ + { + "affected" : "<", + "version_value" : "11.7.0.236" + } + ] + } + } + ] + }, + "vendor_name" : "Cisco" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A vulnerability in Cisco Webex Meetings for Android could allow an unauthenticated, local attacker to perform a cross-site scripting attack against the application. The vulnerability is due to insufficient validation of the application input parameters. An attacker could exploit this vulnerability by sending a malicious request to the Webex Meetings application through an intent. A successful exploit could allow the attacker to execute script code in the context of the Webex Meetings application. Versions prior to 11.7.0.236 are affected." + } + ] + }, + "exploit" : [ + { + "lang" : "eng", + "value" : "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact" : { + "cvss" : { + "baseScore" : "5.0", + "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", + "version" : "3.0" + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-79" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability in Cisco Webex Meetings for Android could allow an unauthenticated, local attacker to perform a cross-site scripting attack against the application. The vulnerability is due to insufficient validation of the application input parameters. An attacker could exploit this vulnerability by sending a malicious request to the Webex Meetings application through an intent. A successful exploit could allow the attacker to execute script code in the context of the Webex Meetings application. Versions prior to 11.7.0.236 are affected. " - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " - } - ], - "impact": { - "cvss": { - "baseScore": "5.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "20190206 Cisco Webex Meetings for Android Cross-Site Scripting Vulnerability", - "refsource": "CISCO", - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-webex-andro-xss" - } - ] - }, - "source": { - "advisory": "cisco-sa-20190206-webex-andro-xss", - "defect": [ - [ - "CSCvn97559" - ] - ], - "discovery": "INTERNAL" - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "20190206 Cisco Webex Meetings for Android Cross-Site Scripting Vulnerability", + "refsource" : "CISCO", + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-webex-andro-xss" + } + ] + }, + "source" : { + "advisory" : "cisco-sa-20190206-webex-andro-xss", + "defect" : [ + [ + "CSCvn97559" + ] + ], + "discovery" : "INTERNAL" + } } diff --git a/2019/3xxx/CVE-2019-3704.json b/2019/3xxx/CVE-2019-3704.json index d5dbaa1778a..7ee530c68f5 100644 --- a/2019/3xxx/CVE-2019-3704.json +++ b/2019/3xxx/CVE-2019-3704.json @@ -1,82 +1,83 @@ { - "CVE_data_meta": { - "ASSIGNER": "secure@dell.com", - "DATE_PUBLIC": "2019-02-04T05:00:00.000Z", - "ID": "CVE-2019-3704", - "STATE": "PUBLIC" + "CVE_data_meta" : { + "ASSIGNER" : "secure@dell.com", + "DATE_PUBLIC" : "2019-02-04T05:00:00.000Z", + "ID" : "CVE-2019-3704", + "STATE" : "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "VNX Control Station in Dell EMC VNX2 OE for File", - "version": { - "version_data": [ + "product_name" : "VNX Control Station in Dell EMC VNX2 OE for File", + "version" : { + "version_data" : [ { - "affected": "<", - "version_value": "8.1.9.236" + "affected" : "<", + "version_value" : "8.1.9.236" } ] } } ] }, - "vendor_name": "Dell EMC" + "vendor_name" : "Dell EMC" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "VNX Control Station in Dell EMC VNX2 OE for File versions prior to 8.1.9.236 contains OS command injection vulnerability. Due to inadequate restriction configured in sudores, a local authenticated malicious user could \npotentially execute arbitrary OS commands as root by exploiting this vulnerability." + "lang" : "eng", + "value" : "VNX Control Station in Dell EMC VNX2 OE for File versions prior to 8.1.9.236 contains OS command injection vulnerability. Due to inadequate restriction configured in sudores, a local authenticated malicious user could potentially execute arbitrary OS commands as root by exploiting this vulnerability." } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "LOCAL", + "availabilityImpact" : "HIGH", + "baseScore" : 7.8, + "baseSeverity" : "HIGH", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "NONE", + "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "OS Command Injection" + "lang" : "eng", + "value" : "OS Command Injection" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "refsource": "CONFIRM", - "url": "https://seclists.org/fulldisclosure/2019/Feb/8" + "name" : "20190204 DSA-2019-010: Dell EMC VNX2 Family OS Command Injection Vulnerability", + "refsource" : "FULLDISC", + "url" : "https://seclists.org/fulldisclosure/2019/Feb/8" } ] }, - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2019/7xxx/CVE-2019-7586.json b/2019/7xxx/CVE-2019-7586.json new file mode 100644 index 00000000000..0eb75418b89 --- /dev/null +++ b/2019/7xxx/CVE-2019-7586.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7586", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7587.json b/2019/7xxx/CVE-2019-7587.json new file mode 100644 index 00000000000..a21a0ec08d8 --- /dev/null +++ b/2019/7xxx/CVE-2019-7587.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7587", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Bo-blog Wind through 1.6.0-r allows SQL Injection via the admin.php/comments/batchdel/ comID parameter because this parameter is mishandled in the mode/admin.mode.php delBlockedBatch function." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://c3tsec.wordpress.com/2019/01/12/sql-injection-in-bo-blog-wind-cms/", + "refsource" : "MISC", + "url" : "https://c3tsec.wordpress.com/2019/01/12/sql-injection-in-bo-blog-wind-cms/" + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7588.json b/2019/7xxx/CVE-2019-7588.json new file mode 100644 index 00000000000..12a38b58d0a --- /dev/null +++ b/2019/7xxx/CVE-2019-7588.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7588", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7589.json b/2019/7xxx/CVE-2019-7589.json new file mode 100644 index 00000000000..07b65439bf7 --- /dev/null +++ b/2019/7xxx/CVE-2019-7589.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7589", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7590.json b/2019/7xxx/CVE-2019-7590.json new file mode 100644 index 00000000000..d43e9124e88 --- /dev/null +++ b/2019/7xxx/CVE-2019-7590.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7590", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7591.json b/2019/7xxx/CVE-2019-7591.json new file mode 100644 index 00000000000..2efeffa09bd --- /dev/null +++ b/2019/7xxx/CVE-2019-7591.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7591", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7592.json b/2019/7xxx/CVE-2019-7592.json new file mode 100644 index 00000000000..ddedf55a65e --- /dev/null +++ b/2019/7xxx/CVE-2019-7592.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7592", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7593.json b/2019/7xxx/CVE-2019-7593.json new file mode 100644 index 00000000000..eac0278737c --- /dev/null +++ b/2019/7xxx/CVE-2019-7593.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7593", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7594.json b/2019/7xxx/CVE-2019-7594.json new file mode 100644 index 00000000000..51483480f43 --- /dev/null +++ b/2019/7xxx/CVE-2019-7594.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7594", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7595.json b/2019/7xxx/CVE-2019-7595.json new file mode 100644 index 00000000000..7c933586b59 --- /dev/null +++ b/2019/7xxx/CVE-2019-7595.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7595", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7596.json b/2019/7xxx/CVE-2019-7596.json new file mode 100644 index 00000000000..f81b60ffd18 --- /dev/null +++ b/2019/7xxx/CVE-2019-7596.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7596", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7597.json b/2019/7xxx/CVE-2019-7597.json new file mode 100644 index 00000000000..da4e63a364e --- /dev/null +++ b/2019/7xxx/CVE-2019-7597.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7597", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7598.json b/2019/7xxx/CVE-2019-7598.json new file mode 100644 index 00000000000..22268583239 --- /dev/null +++ b/2019/7xxx/CVE-2019-7598.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7598", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7599.json b/2019/7xxx/CVE-2019-7599.json new file mode 100644 index 00000000000..e906ad9d61c --- /dev/null +++ b/2019/7xxx/CVE-2019-7599.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7599", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7600.json b/2019/7xxx/CVE-2019-7600.json new file mode 100644 index 00000000000..44660aff1b2 --- /dev/null +++ b/2019/7xxx/CVE-2019-7600.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7600", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7601.json b/2019/7xxx/CVE-2019-7601.json new file mode 100644 index 00000000000..f2389a2524c --- /dev/null +++ b/2019/7xxx/CVE-2019-7601.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7601", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7602.json b/2019/7xxx/CVE-2019-7602.json new file mode 100644 index 00000000000..05b8652caa5 --- /dev/null +++ b/2019/7xxx/CVE-2019-7602.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7602", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7603.json b/2019/7xxx/CVE-2019-7603.json new file mode 100644 index 00000000000..dd1a62714e8 --- /dev/null +++ b/2019/7xxx/CVE-2019-7603.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7603", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7604.json b/2019/7xxx/CVE-2019-7604.json new file mode 100644 index 00000000000..44fc4602ed3 --- /dev/null +++ b/2019/7xxx/CVE-2019-7604.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7604", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7605.json b/2019/7xxx/CVE-2019-7605.json new file mode 100644 index 00000000000..ee983dd48a2 --- /dev/null +++ b/2019/7xxx/CVE-2019-7605.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7605", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7606.json b/2019/7xxx/CVE-2019-7606.json new file mode 100644 index 00000000000..65056a737f0 --- /dev/null +++ b/2019/7xxx/CVE-2019-7606.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7606", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7607.json b/2019/7xxx/CVE-2019-7607.json new file mode 100644 index 00000000000..db66c3d8d49 --- /dev/null +++ b/2019/7xxx/CVE-2019-7607.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7607", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7608.json b/2019/7xxx/CVE-2019-7608.json new file mode 100644 index 00000000000..624b7f96561 --- /dev/null +++ b/2019/7xxx/CVE-2019-7608.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7608", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7609.json b/2019/7xxx/CVE-2019-7609.json new file mode 100644 index 00000000000..7f89dfeeb41 --- /dev/null +++ b/2019/7xxx/CVE-2019-7609.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7609", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7610.json b/2019/7xxx/CVE-2019-7610.json new file mode 100644 index 00000000000..0424cd4211c --- /dev/null +++ b/2019/7xxx/CVE-2019-7610.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7610", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7611.json b/2019/7xxx/CVE-2019-7611.json new file mode 100644 index 00000000000..661f51e3051 --- /dev/null +++ b/2019/7xxx/CVE-2019-7611.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7611", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7612.json b/2019/7xxx/CVE-2019-7612.json new file mode 100644 index 00000000000..5aeb74c5628 --- /dev/null +++ b/2019/7xxx/CVE-2019-7612.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7612", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7613.json b/2019/7xxx/CVE-2019-7613.json new file mode 100644 index 00000000000..4092e68721e --- /dev/null +++ b/2019/7xxx/CVE-2019-7613.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7613", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7614.json b/2019/7xxx/CVE-2019-7614.json new file mode 100644 index 00000000000..743693325ba --- /dev/null +++ b/2019/7xxx/CVE-2019-7614.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7614", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7615.json b/2019/7xxx/CVE-2019-7615.json new file mode 100644 index 00000000000..4625189b154 --- /dev/null +++ b/2019/7xxx/CVE-2019-7615.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7615", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7616.json b/2019/7xxx/CVE-2019-7616.json new file mode 100644 index 00000000000..7f235bd0652 --- /dev/null +++ b/2019/7xxx/CVE-2019-7616.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7616", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7617.json b/2019/7xxx/CVE-2019-7617.json new file mode 100644 index 00000000000..44b3317e8ea --- /dev/null +++ b/2019/7xxx/CVE-2019-7617.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7617", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7618.json b/2019/7xxx/CVE-2019-7618.json new file mode 100644 index 00000000000..56530ddd277 --- /dev/null +++ b/2019/7xxx/CVE-2019-7618.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7618", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7619.json b/2019/7xxx/CVE-2019-7619.json new file mode 100644 index 00000000000..536aed8b58a --- /dev/null +++ b/2019/7xxx/CVE-2019-7619.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7619", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7620.json b/2019/7xxx/CVE-2019-7620.json new file mode 100644 index 00000000000..239574f685a --- /dev/null +++ b/2019/7xxx/CVE-2019-7620.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7620", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7621.json b/2019/7xxx/CVE-2019-7621.json new file mode 100644 index 00000000000..ad2acf83ab9 --- /dev/null +++ b/2019/7xxx/CVE-2019-7621.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7621", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7622.json b/2019/7xxx/CVE-2019-7622.json new file mode 100644 index 00000000000..3e1a7b51a81 --- /dev/null +++ b/2019/7xxx/CVE-2019-7622.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7622", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7623.json b/2019/7xxx/CVE-2019-7623.json new file mode 100644 index 00000000000..946bbeb69ae --- /dev/null +++ b/2019/7xxx/CVE-2019-7623.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7623", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7624.json b/2019/7xxx/CVE-2019-7624.json new file mode 100644 index 00000000000..d15593b24c5 --- /dev/null +++ b/2019/7xxx/CVE-2019-7624.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7624", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7625.json b/2019/7xxx/CVE-2019-7625.json new file mode 100644 index 00000000000..de2c0c52b6c --- /dev/null +++ b/2019/7xxx/CVE-2019-7625.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7625", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7626.json b/2019/7xxx/CVE-2019-7626.json new file mode 100644 index 00000000000..fbcf43a04a1 --- /dev/null +++ b/2019/7xxx/CVE-2019-7626.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7626", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7627.json b/2019/7xxx/CVE-2019-7627.json new file mode 100644 index 00000000000..298b365c841 --- /dev/null +++ b/2019/7xxx/CVE-2019-7627.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7627", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}