From 0c0906b41217a779cefb664a5c8cb6cacf48b3da Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 22 May 2019 16:00:45 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/10xxx/CVE-2016-10712.json | 5 ++ 2017/11xxx/CVE-2017-11362.json | 5 ++ 2017/12xxx/CVE-2017-12933.json | 5 ++ 2018/18xxx/CVE-2018-18511.json | 5 ++ 2018/19xxx/CVE-2018-19725.json | 68 +++++++++++++++++++++---- 2019/10xxx/CVE-2019-10953.json | 5 ++ 2019/11xxx/CVE-2019-11036.json | 5 ++ 2019/11xxx/CVE-2019-11880.json | 61 ++++++++++++++++++++--- 2019/12xxx/CVE-2019-12044.json | 61 ++++++++++++++++++++--- 2019/12xxx/CVE-2019-12046.json | 91 +++++++++++++++++++++++++++++++--- 2019/12xxx/CVE-2019-12279.json | 62 +++++++++++++++++++++++ 2019/12xxx/CVE-2019-12280.json | 18 +++++++ 2019/6xxx/CVE-2019-6572.json | 5 ++ 2019/6xxx/CVE-2019-6576.json | 5 ++ 2019/6xxx/CVE-2019-6577.json | 5 ++ 2019/7xxx/CVE-2019-7317.json | 5 ++ 2019/7xxx/CVE-2019-7805.json | 67 +++++++++++++++++++++---- 2019/7xxx/CVE-2019-7806.json | 67 +++++++++++++++++++++---- 2019/7xxx/CVE-2019-7807.json | 67 +++++++++++++++++++++---- 2019/7xxx/CVE-2019-7808.json | 67 +++++++++++++++++++++---- 2019/7xxx/CVE-2019-7809.json | 72 +++++++++++++++++++++++---- 2019/7xxx/CVE-2019-7810.json | 72 +++++++++++++++++++++++---- 2019/7xxx/CVE-2019-7811.json | 67 +++++++++++++++++++++---- 2019/7xxx/CVE-2019-7812.json | 67 +++++++++++++++++++++---- 2019/7xxx/CVE-2019-7813.json | 67 +++++++++++++++++++++---- 2019/7xxx/CVE-2019-7814.json | 72 +++++++++++++++++++++++---- 2019/7xxx/CVE-2019-7817.json | 72 +++++++++++++++++++++++---- 2019/7xxx/CVE-2019-7820.json | 72 +++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9797.json | 5 ++ 29 files changed, 1110 insertions(+), 135 deletions(-) create mode 100644 2019/12xxx/CVE-2019-12279.json create mode 100644 2019/12xxx/CVE-2019-12280.json diff --git a/2016/10xxx/CVE-2016-10712.json b/2016/10xxx/CVE-2016-10712.json index 389eb109135..bdec25b82be 100644 --- a/2016/10xxx/CVE-2016-10712.json +++ b/2016/10xxx/CVE-2016-10712.json @@ -66,6 +66,11 @@ "name": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5", "refsource": "CONFIRM", "url": "https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5" + }, + { + "refsource": "UBUNTU", + "name": "USN-3566-2", + "url": "https://usn.ubuntu.com/3566-2/" } ] } diff --git a/2017/11xxx/CVE-2017-11362.json b/2017/11xxx/CVE-2017-11362.json index c5c5c5a7c05..c725b87ca6c 100644 --- a/2017/11xxx/CVE-2017-11362.json +++ b/2017/11xxx/CVE-2017-11362.json @@ -71,6 +71,11 @@ "name": "GLSA-201709-21", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201709-21" + }, + { + "refsource": "UBUNTU", + "name": "USN-3566-2", + "url": "https://usn.ubuntu.com/3566-2/" } ] } diff --git a/2017/12xxx/CVE-2017-12933.json b/2017/12xxx/CVE-2017-12933.json index 9af7959454d..e2ceb898164 100644 --- a/2017/12xxx/CVE-2017-12933.json +++ b/2017/12xxx/CVE-2017-12933.json @@ -91,6 +91,11 @@ "name": "99490", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99490" + }, + { + "refsource": "UBUNTU", + "name": "USN-3566-2", + "url": "https://usn.ubuntu.com/3566-2/" } ] } diff --git a/2018/18xxx/CVE-2018-18511.json b/2018/18xxx/CVE-2018-18511.json index bb60b01e206..99d187c7be1 100644 --- a/2018/18xxx/CVE-2018-18511.json +++ b/2018/18xxx/CVE-2018-18511.json @@ -11,6 +11,11 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1526218", "refsource": "MISC", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1526218" + }, + { + "refsource": "BUGTRAQ", + "name": "20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)", + "url": "https://seclists.org/bugtraq/2019/May/56" } ] }, diff --git a/2018/19xxx/CVE-2018-19725.json b/2018/19xxx/CVE-2018-19725.json index 03961730050..c6a0020cb7e 100644 --- a/2018/19xxx/CVE-2018-19725.json +++ b/2018/19xxx/CVE-2018-19725.json @@ -1,18 +1,68 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2018-19725", - "ASSIGNER": "cve@mitre.org", - "STATE": "REJECT" - }, "description": { "description_data": [ { "lang": "eng", - "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2018. Notes: none." + "value": "Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability. Successful exploitation could lead to privilege escalation." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Adobe", + "product": { + "product_data": [ + { + "product_name": "Adobe Acrobat and Reader", + "version": { + "version_data": [ + { + "version_value": "2019.010.20069 and earlier versions" + }, + { + "version_value": "2017.011.30113 and earlier versions" + }, + { + "version_value": "and 2015.006.30464 and earlier versions" + } + ] + } + } + ] + } + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Security bypass" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-07.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-07.html" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2018-19725", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10953.json b/2019/10xxx/CVE-2019-10953.json index 35e1a337e24..28d313a8f2a 100644 --- a/2019/10xxx/CVE-2019-10953.json +++ b/2019/10xxx/CVE-2019-10953.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-106-03", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-106-03" + }, + { + "refsource": "BID", + "name": "108413", + "url": "http://www.securityfocus.com/bid/108413" } ] }, diff --git a/2019/11xxx/CVE-2019-11036.json b/2019/11xxx/CVE-2019-11036.json index c39a6e6c5ca..5756efde107 100644 --- a/2019/11xxx/CVE-2019-11036.json +++ b/2019/11xxx/CVE-2019-11036.json @@ -120,6 +120,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20190517-0003/", "url": "https://security.netapp.com/advisory/ntap-20190517-0003/" + }, + { + "refsource": "UBUNTU", + "name": "USN-3566-2", + "url": "https://usn.ubuntu.com/3566-2/" } ] }, diff --git a/2019/11xxx/CVE-2019-11880.json b/2019/11xxx/CVE-2019-11880.json index 77e53242c63..2da65d22374 100644 --- a/2019/11xxx/CVE-2019-11880.json +++ b/2019/11xxx/CVE-2019-11880.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11880", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11880", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CommSy through 8.6.5 has SQL Injection via the cid parameter. This is fixed in 9.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.commsy.net", + "refsource": "MISC", + "name": "https://www.commsy.net" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152910/CommSy-8.6.5-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/152910/CommSy-8.6.5-SQL-Injection.html" } ] } diff --git a/2019/12xxx/CVE-2019-12044.json b/2019/12xxx/CVE-2019-12044.json index afe6d0627c0..9e21af1bf5f 100644 --- a/2019/12xxx/CVE-2019-12044.json +++ b/2019/12xxx/CVE-2019-12044.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12044", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12044", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Buffer Overflow exists in Citrix NetScaler Gateway 10.5.x before 10.5.70.x, 11.1.x before 11.1.59.10, 12.0.x before 12.0.59.8, and 12.1.x before 12.1.49.23 and Citrix Application Delivery Controller 10.5.x before 10.5.70.x, 11.1.x before 11.1.59.10, 12.0.x before 12.0.59.8, and 12.1.x before 12.1.49.23." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.citrix.com/v1/search?searchQuery=%22%22&lang=en&sort=cr_date_desc&prod=&pver=&ct=Security+Bulletin", + "refsource": "MISC", + "name": "https://support.citrix.com/v1/search?searchQuery=%22%22&lang=en&sort=cr_date_desc&prod=&pver=&ct=Security+Bulletin" + }, + { + "refsource": "CONFIRM", + "name": "https://support.citrix.com/article/CTX249976", + "url": "https://support.citrix.com/article/CTX249976" } ] } diff --git a/2019/12xxx/CVE-2019-12046.json b/2019/12xxx/CVE-2019-12046.json index 52aae18e8e2..ca748c8c6bc 100644 --- a/2019/12xxx/CVE-2019-12046.json +++ b/2019/12xxx/CVE-2019-12046.json @@ -1,17 +1,96 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12046", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12046", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LemonLDAP::NG -2.0.3 has Incorrect Access Control." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/commits/master", + "refsource": "MISC", + "name": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/commits/master" + }, + { + "url": "https://lemonldap-ng.org/download", + "refsource": "MISC", + "name": "https://lemonldap-ng.org/download" + }, + { + "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742", + "refsource": "MISC", + "name": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1742" + }, + { + "refsource": "MISC", + "name": "https://seclists.org/bugtraq/2019/May/38", + "url": "https://seclists.org/bugtraq/2019/May/38" + }, + { + "refsource": "MISC", + "name": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1743", + "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1743" + }, + { + "refsource": "MISC", + "name": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1744", + "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/issues/1744" + }, + { + "refsource": "CONFIRM", + "name": "https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-1-9-19-is-out/", + "url": "https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-1-9-19-is-out/" + }, + { + "refsource": "CONFIRM", + "name": "https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-4-is-out/", + "url": "https://projects.ow2.org/view/lemonldap-ng/lemonldap-ng-2-0-4-is-out/" } ] } diff --git a/2019/12xxx/CVE-2019-12279.json b/2019/12xxx/CVE-2019-12279.json new file mode 100644 index 00000000000..a1f717c3b1a --- /dev/null +++ b/2019/12xxx/CVE-2019-12279.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12279", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/JameelNabbo/exploits/blob/master/nagiosxi%20username%20sql%20injection.txt", + "refsource": "MISC", + "name": "https://github.com/JameelNabbo/exploits/blob/master/nagiosxi%20username%20sql%20injection.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12280.json b/2019/12xxx/CVE-2019-12280.json new file mode 100644 index 00000000000..5a4b5dd0148 --- /dev/null +++ b/2019/12xxx/CVE-2019-12280.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12280", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6572.json b/2019/6xxx/CVE-2019-6572.json index fc6463919d8..e30008fb2c5 100644 --- a/2019/6xxx/CVE-2019-6572.json +++ b/2019/6xxx/CVE-2019-6572.json @@ -108,6 +108,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf" + }, + { + "refsource": "BID", + "name": "108412", + "url": "http://www.securityfocus.com/bid/108412" } ] }, diff --git a/2019/6xxx/CVE-2019-6576.json b/2019/6xxx/CVE-2019-6576.json index 1515d8b4f44..42c9fd5b19d 100644 --- a/2019/6xxx/CVE-2019-6576.json +++ b/2019/6xxx/CVE-2019-6576.json @@ -108,6 +108,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf" + }, + { + "refsource": "BID", + "name": "108412", + "url": "http://www.securityfocus.com/bid/108412" } ] }, diff --git a/2019/6xxx/CVE-2019-6577.json b/2019/6xxx/CVE-2019-6577.json index 5e631526ed4..b1663013e84 100644 --- a/2019/6xxx/CVE-2019-6577.json +++ b/2019/6xxx/CVE-2019-6577.json @@ -108,6 +108,11 @@ "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf" + }, + { + "refsource": "BID", + "name": "108412", + "url": "http://www.securityfocus.com/bid/108412" } ] }, diff --git a/2019/7xxx/CVE-2019-7317.json b/2019/7xxx/CVE-2019-7317.json index 49d397e8379..535c10a08f9 100644 --- a/2019/7xxx/CVE-2019-7317.json +++ b/2019/7xxx/CVE-2019-7317.json @@ -91,6 +91,11 @@ "refsource": "UBUNTU", "name": "USN-3991-1", "url": "https://usn.ubuntu.com/3991-1/" + }, + { + "refsource": "BUGTRAQ", + "name": "20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)", + "url": "https://seclists.org/bugtraq/2019/May/56" } ] } diff --git a/2019/7xxx/CVE-2019-7805.json b/2019/7xxx/CVE-2019-7805.json index 299ceed1181..ede9202584d 100644 --- a/2019/7xxx/CVE-2019-7805.json +++ b/2019/7xxx/CVE-2019-7805.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7805", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108320", + "url": "http://www.securityfocus.com/bid/108320" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7805", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7806.json b/2019/7xxx/CVE-2019-7806.json index d5b7a5e4a24..7783e45a499 100644 --- a/2019/7xxx/CVE-2019-7806.json +++ b/2019/7xxx/CVE-2019-7806.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7806", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108320", + "url": "http://www.securityfocus.com/bid/108320" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7806", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7807.json b/2019/7xxx/CVE-2019-7807.json index a57afdbdd67..f998ce68da7 100644 --- a/2019/7xxx/CVE-2019-7807.json +++ b/2019/7xxx/CVE-2019-7807.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7807", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108320", + "url": "http://www.securityfocus.com/bid/108320" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7807", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7808.json b/2019/7xxx/CVE-2019-7808.json index 9c627ef37f3..ce6b727a572 100644 --- a/2019/7xxx/CVE-2019-7808.json +++ b/2019/7xxx/CVE-2019-7808.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7808", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108320", + "url": "http://www.securityfocus.com/bid/108320" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7808", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7809.json b/2019/7xxx/CVE-2019-7809.json index 133b2b7a3aa..47dbcd75dc2 100644 --- a/2019/7xxx/CVE-2019-7809.json +++ b/2019/7xxx/CVE-2019-7809.json @@ -1,18 +1,72 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7809", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108320", + "url": "http://www.securityfocus.com/bid/108320" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-500/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-500/" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7809", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7810.json b/2019/7xxx/CVE-2019-7810.json index 9859c2514e9..a41485642f6 100644 --- a/2019/7xxx/CVE-2019-7810.json +++ b/2019/7xxx/CVE-2019-7810.json @@ -1,18 +1,72 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7810", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-Bounds Read\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108326", + "url": "http://www.securityfocus.com/bid/108326" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-499/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-499/" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7810", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7811.json b/2019/7xxx/CVE-2019-7811.json index 3c83ea94fe8..5262473dbb3 100644 --- a/2019/7xxx/CVE-2019-7811.json +++ b/2019/7xxx/CVE-2019-7811.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7811", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-Bounds Read\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108326", + "url": "http://www.securityfocus.com/bid/108326" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7811", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7812.json b/2019/7xxx/CVE-2019-7812.json index 9edb08913b0..05553ef8e04 100644 --- a/2019/7xxx/CVE-2019-7812.json +++ b/2019/7xxx/CVE-2019-7812.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7812", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-Bounds Read\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108326", + "url": "http://www.securityfocus.com/bid/108326" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7812", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7813.json b/2019/7xxx/CVE-2019-7813.json index 385b1c3fc02..412b594b10b 100644 --- a/2019/7xxx/CVE-2019-7813.json +++ b/2019/7xxx/CVE-2019-7813.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7813", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Out-of-Bounds Read\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108326", + "url": "http://www.securityfocus.com/bid/108326" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7813", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7814.json b/2019/7xxx/CVE-2019-7814.json index 7a1b357e131..a8299fd86d7 100644 --- a/2019/7xxx/CVE-2019-7814.json +++ b/2019/7xxx/CVE-2019-7814.json @@ -1,18 +1,72 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7814", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108320", + "url": "http://www.securityfocus.com/bid/108320" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-501/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-501/" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7814", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7817.json b/2019/7xxx/CVE-2019-7817.json index 61705dba478..c199aca9ddf 100644 --- a/2019/7xxx/CVE-2019-7817.json +++ b/2019/7xxx/CVE-2019-7817.json @@ -1,18 +1,72 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7817", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Use After Free\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108320", + "url": "http://www.securityfocus.com/bid/108320" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-502/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-502/" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7817", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7820.json b/2019/7xxx/CVE-2019-7820.json index 0b3f439c0b5..2016867ec4c 100644 --- a/2019/7xxx/CVE-2019-7820.json +++ b/2019/7xxx/CVE-2019-7820.json @@ -1,18 +1,72 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-7820", - "STATE": "RESERVED" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution." } ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier versions" + } + ] + }, + "product_name": "Adobe Acrobat and Reader" + } + ] + }, + "vendor_name": "Adobe" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Type Confusion\u202f\u202f" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html", + "refsource": "CONFIRM", + "name": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html" + }, + { + "refsource": "BID", + "name": "108315", + "url": "http://www.securityfocus.com/bid/108315" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-504/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-504/" + } + ] + }, + "CVE_data_meta": { + "STATE": "PUBLIC", + "ID": "CVE-2019-7820", + "ASSIGNER": "psirt@adobe.com" } } \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9797.json b/2019/9xxx/CVE-2019-9797.json index 387ac547164..742d0b5b99d 100644 --- a/2019/9xxx/CVE-2019-9797.json +++ b/2019/9xxx/CVE-2019-9797.json @@ -11,6 +11,11 @@ "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1528909", "refsource": "MISC", "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1528909" + }, + { + "refsource": "BUGTRAQ", + "name": "20190522 [slackware-security] mozilla-firefox (SSA:2019-141-01)", + "url": "https://seclists.org/bugtraq/2019/May/56" } ] },