diff --git a/2018/11xxx/CVE-2018-11289.json b/2018/11xxx/CVE-2018-11289.json index 804f3060359..58f364557e2 100644 --- a/2018/11xxx/CVE-2018-11289.json +++ b/2018/11xxx/CVE-2018-11289.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Data truncation during higher to lower type conversion which causes less memory allocation than desired can leads to a buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in versions IPQ8074, MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCA8081, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130" + "value" : "Data truncation during higher to lower type conversion which causes less memory allocation than desired can lead to a buffer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in versions IPQ8074, MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCA8081, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130." } ] }, @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11820.json b/2018/11xxx/CVE-2018-11820.json index 1c0e1dc4dfa..06155206b17 100644 --- a/2018/11xxx/CVE-2018-11820.json +++ b/2018/11xxx/CVE-2018-11820.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11845.json b/2018/11xxx/CVE-2018-11845.json index 8de61e3ec9b..6abb7edacb4 100644 --- a/2018/11xxx/CVE-2018-11845.json +++ b/2018/11xxx/CVE-2018-11845.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11864.json b/2018/11xxx/CVE-2018-11864.json index 5c5ca0efb70..a6e580df757 100644 --- a/2018/11xxx/CVE-2018-11864.json +++ b/2018/11xxx/CVE-2018-11864.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11931.json b/2018/11xxx/CVE-2018-11931.json index 796049ea0a4..4825874d3c6 100644 --- a/2018/11xxx/CVE-2018-11931.json +++ b/2018/11xxx/CVE-2018-11931.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11932.json b/2018/11xxx/CVE-2018-11932.json index ddd8825ed78..399f52c7a94 100644 --- a/2018/11xxx/CVE-2018-11932.json +++ b/2018/11xxx/CVE-2018-11932.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11935.json b/2018/11xxx/CVE-2018-11935.json index 8818dd3b004..c6b8a4456ea 100644 --- a/2018/11xxx/CVE-2018-11935.json +++ b/2018/11xxx/CVE-2018-11935.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11938.json b/2018/11xxx/CVE-2018-11938.json index 4182c317ff1..6d9e18b30fc 100644 --- a/2018/11xxx/CVE-2018-11938.json +++ b/2018/11xxx/CVE-2018-11938.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11945.json b/2018/11xxx/CVE-2018-11945.json index 85fc0f6dfdb..99a8f7550f1 100644 --- a/2018/11xxx/CVE-2018-11945.json +++ b/2018/11xxx/CVE-2018-11945.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/11xxx/CVE-2018-11948.json b/2018/11xxx/CVE-2018-11948.json index 7376a092491..98cb1b65778 100644 --- a/2018/11xxx/CVE-2018-11948.json +++ b/2018/11xxx/CVE-2018-11948.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/12xxx/CVE-2018-12388.json b/2018/12xxx/CVE-2018-12388.json index 8f631eb322f..e90171d8c8d 100644 --- a/2018/12xxx/CVE-2018-12388.json +++ b/2018/12xxx/CVE-2018-12388.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12388", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12388", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Memory safety bugs fixed in Firefox 63" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Memory safety bugs fixed in Firefox 63" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1472639%2C1485698%2C1301547%2C1471427%2C1379411%2C1482122%2C1486314%2C1487167" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12389.json b/2018/12xxx/CVE-2018-12389.json index ca10aafa469..080eaad7db0 100644 --- a/2018/12xxx/CVE-2018-12389.json +++ b/2018/12xxx/CVE-2018-12389.json @@ -1,77 +1,84 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-28/" - }, - { - "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Thunderbird" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12389", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12389", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Memory safety bugs fixed in Firefox ESR 60.3" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Memory safety bugs fixed in Firefox ESR 60.3" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-28/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-28/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12390.json b/2018/12xxx/CVE-2018-12390.json index 42253a57641..380b448b1ea 100644 --- a/2018/12xxx/CVE-2018-12390.json +++ b/2018/12xxx/CVE-2018-12390.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-28/" - }, - { - "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Thunderbird" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12390", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12390", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-28/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-28/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12391.json b/2018/12xxx/CVE-2018-12391.json index 3968ce27122..7be6cc3dca1 100644 --- a/2018/12xxx/CVE-2018-12391.json +++ b/2018/12xxx/CVE-2018-12391.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-28/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1478843" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Thunderbird" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12391", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12391", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "HTTP Live Stream audio data is accessible cross-origin" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "HTTP Live Stream audio data is accessible cross-origin" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1478843", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1478843" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-28/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-28/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12392.json b/2018/12xxx/CVE-2018-12392.json index f8d8d0beed7..d5b0445270e 100644 --- a/2018/12xxx/CVE-2018-12392.json +++ b/2018/12xxx/CVE-2018-12392.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-28/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1492823" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Thunderbird" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12392", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12392", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Crash with nested event loops" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Crash with nested event loops" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1492823", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1492823" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-28/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-28/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12393.json b/2018/12xxx/CVE-2018-12393.json index 5d1f11c1245..d41e54f6fbc 100644 --- a/2018/12xxx/CVE-2018-12393.json +++ b/2018/12xxx/CVE-2018-12393.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-28/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1495011" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Thunderbird" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12393", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12393", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Integer overflow during Unicode conversion while loading JavaScript" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Integer overflow during Unicode conversion while loading JavaScript" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1495011", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1495011" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-28/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-28/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12395.json b/2018/12xxx/CVE-2018-12395.json index d265e6d9145..c1a777d4121 100644 --- a/2018/12xxx/CVE-2018-12395.json +++ b/2018/12xxx/CVE-2018-12395.json @@ -1,77 +1,84 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12395", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12395", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "WebExtension bypass of domain restrictions through header rewriting" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "WebExtension bypass of domain restrictions through header rewriting" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1467523" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12396.json b/2018/12xxx/CVE-2018-12396.json index 5a3929ec906..98fb3b28afb 100644 --- a/2018/12xxx/CVE-2018-12396.json +++ b/2018/12xxx/CVE-2018-12396.json @@ -1,77 +1,84 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1483602" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12396", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12396", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "WebExtension content scripts can execute in disallowed contexts" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "WebExtension content scripts can execute in disallowed contexts" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1483602", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1483602" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12397.json b/2018/12xxx/CVE-2018-12397.json index df7f9aa1448..4fb22afe17a 100644 --- a/2018/12xxx/CVE-2018-12397.json +++ b/2018/12xxx/CVE-2018-12397.json @@ -1,77 +1,84 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-27/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1487478" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A WebExtension can request access to local files without the warning prompt stating that the extension will \"Access your data for all websites\" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.3" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12397", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12397", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Missing warning prompt when WebExtension requests local file access" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.3" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A WebExtension can request access to local files without the warning prompt stating that the extension will \"Access your data for all websites\" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Missing warning prompt when WebExtension requests local file access" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1487478", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1487478" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-27/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-27/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12398.json b/2018/12xxx/CVE-2018-12398.json index 0d556588d10..1c9916ab742 100644 --- a/2018/12xxx/CVE-2018-12398.json +++ b/2018/12xxx/CVE-2018-12398.json @@ -1,66 +1,73 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1460538" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1488061" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12398", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12398", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "CSP bypass through stylesheet injection in resource URIs" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CSP bypass through stylesheet injection in resource URIs" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1460538", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1460538" + }, + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1488061", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1488061" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12399.json b/2018/12xxx/CVE-2018-12399.json index 8e001226fd5..d0567c7b0e4 100644 --- a/2018/12xxx/CVE-2018-12399.json +++ b/2018/12xxx/CVE-2018-12399.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1490276" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12399", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12399", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Spoofing of protocol registration notification bar" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Spoofing of protocol registration notification bar" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1490276", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1490276" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12400.json b/2018/12xxx/CVE-2018-12400.json index d2920943d84..ab6e509dce6 100644 --- a/2018/12xxx/CVE-2018-12400.json +++ b/2018/12xxx/CVE-2018-12400.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1448305" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode. This allows information leakage of sites visited during private browsing sessions. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12400", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12400", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Favicons are cached in private browsing mode on Firefox for Android" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode. This allows information leakage of sites visited during private browsing sessions. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Favicons are cached in private browsing mode on Firefox for Android" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1448305", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1448305" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12401.json b/2018/12xxx/CVE-2018-12401.json index b369d07171c..c051b2a6f9e 100644 --- a/2018/12xxx/CVE-2018-12401.json +++ b/2018/12xxx/CVE-2018-12401.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1422456" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12401", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12401", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "DOS attack through special resource URI parsing" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "DOS attack through special resource URI parsing" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1422456", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1422456" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12402.json b/2018/12xxx/CVE-2018-12402.json index f995e3d8dd6..0c589edd2ef 100644 --- a/2018/12xxx/CVE-2018-12402.json +++ b/2018/12xxx/CVE-2018-12402.json @@ -1,66 +1,73 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1447087" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1469916" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of \"Save Page As...\" functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the \"Save Page As...\" menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12402", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12402", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "WebBrowserPersist uses incorrect origin information" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of \"Save Page As...\" functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the \"Save Page As...\" menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "WebBrowserPersist uses incorrect origin information" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1447087", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1447087" + }, + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1469916", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1469916" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12403.json b/2018/12xxx/CVE-2018-12403.json index f741cdeab5e..1931ff114ef 100644 --- a/2018/12xxx/CVE-2018-12403.json +++ b/2018/12xxx/CVE-2018-12403.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-26/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1484753" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "63" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12403", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12403", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Mixed content warning is not displayed when HTTPS page loads a favicon over HTTP" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "63" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Mixed content warning is not displayed when HTTPS page loads a favicon over HTTP" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1484753", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1484753" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-26/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-26/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12405.json b/2018/12xxx/CVE-2018-12405.json index b75fafc43d8..5638b071b21 100644 --- a/2018/12xxx/CVE-2018-12405.json +++ b/2018/12xxx/CVE-2018-12405.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-30/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-31/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Thunderbird" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12405", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12405", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Memory safety bugs fixed in Firefox 64, Firefox ESR 60.4, and Thunderbird 60.4" + "product" : { + "product_data" : [ + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Memory safety bugs fixed in Firefox 64, Firefox ESR 60.4, and Thunderbird 60.4" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-30/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-30/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-31/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-31/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12406.json b/2018/12xxx/CVE-2018-12406.json index 8b852f75de4..24e70b1cea5 100644 --- a/2018/12xxx/CVE-2018-12406.json +++ b/2018/12xxx/CVE-2018-12406.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Mozilla developers and community members reported memory safety bugs present in Firefox 63. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12406", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12406", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Memory safety bugs fixed in Firefox 64" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Mozilla developers and community members reported memory safety bugs present in Firefox 63. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Memory safety bugs fixed in Firefox 64" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + } + ] + } +} diff --git a/2018/12xxx/CVE-2018-12407.json b/2018/12xxx/CVE-2018-12407.json index f380926dbe2..1b433178696 100644 --- a/2018/12xxx/CVE-2018-12407.json +++ b/2018/12xxx/CVE-2018-12407.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1505973" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content, when working with the VertexBuffer11 module. This results in a potentially exploitable crash. This vulnerability affects Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-12407", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-12407", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Buffer overflow with ANGLE library when using VertexBuffer11 module" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content, when working with the VertexBuffer11 module. This results in a potentially exploitable crash. This vulnerability affects Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Buffer overflow with ANGLE library when using VertexBuffer11 module" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1505973", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1505973" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + } + ] + } +} diff --git a/2018/13xxx/CVE-2018-13900.json b/2018/13xxx/CVE-2018-13900.json index 2caa7cf5900..a100ae56a05 100644 --- a/2018/13xxx/CVE-2018-13900.json +++ b/2018/13xxx/CVE-2018-13900.json @@ -56,6 +56,11 @@ "name" : "https://www.codeaurora.org/security-bulletin/2019/02/04/february-2019-code-aurora-security-bulletin", "refsource" : "CONFIRM", "url" : "https://www.codeaurora.org/security-bulletin/2019/02/04/february-2019-code-aurora-security-bulletin" + }, + { + "name" : "106949", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106949" } ] } diff --git a/2018/13xxx/CVE-2018-13904.json b/2018/13xxx/CVE-2018-13904.json index 3cdb7ee865c..1d8c751d59f 100644 --- a/2018/13xxx/CVE-2018-13904.json +++ b/2018/13xxx/CVE-2018-13904.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2018/13xxx/CVE-2018-13905.json b/2018/13xxx/CVE-2018-13905.json index 231b9c61216..f659e176023 100644 --- a/2018/13xxx/CVE-2018-13905.json +++ b/2018/13xxx/CVE-2018-13905.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "KGSL syncsource lock not handled properly during syncsource cleanup can lead to use after free issue in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, SD 210/SD 212/SD 205, SD 439 / SD 429, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDM439, SDM660, SDX24" + "value" : "KGSL syncsource lock not handled properly during syncsource cleanup can lead to use after free issue in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, SD 210/SD 212/SD 205, SD 439 / SD 429, SD 712 / SD 710 / SD 670, SD 820A, SD 845 / SD 850, SD 855, SDM439, SDM660, SDX24." } ] }, @@ -56,6 +56,11 @@ "name" : "https://www.codeaurora.org/security-bulletin/2019/02/04/february-2019-code-aurora-security-bulletin", "refsource" : "CONFIRM", "url" : "https://www.codeaurora.org/security-bulletin/2019/02/04/february-2019-code-aurora-security-bulletin" + }, + { + "name" : "106949", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106949" } ] } diff --git a/2018/13xxx/CVE-2018-13912.json b/2018/13xxx/CVE-2018-13912.json index 5f761b7cbff..45aa4019eb4 100644 --- a/2018/13xxx/CVE-2018-13912.json +++ b/2018/13xxx/CVE-2018-13912.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Arbitrary write issue occur when user provides kernel address In compat mode in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24" + "value" : "Arbitrary write issue can occur when user provides kernel address in compat mode in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24." } ] }, diff --git a/2018/13xxx/CVE-2018-13913.json b/2018/13xxx/CVE-2018-13913.json index cc676486f1f..52f02d5ba13 100644 --- a/2018/13xxx/CVE-2018-13913.json +++ b/2018/13xxx/CVE-2018-13913.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Improper validation of array index can lead to unauthorized access while processing debugFS in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in version MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24" + "value" : "Improper validation of array index can lead to unauthorized access while processing debugFS in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in version MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24." } ] }, diff --git a/2018/13xxx/CVE-2018-13914.json b/2018/13xxx/CVE-2018-13914.json index 1bcf600021f..83a7fce71ef 100644 --- a/2018/13xxx/CVE-2018-13914.json +++ b/2018/13xxx/CVE-2018-13914.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Lack of input validation for data received from user space can lead to an out of bound array issue in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in version MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 636, SD 820A, SD 835, SDM630, SDM660, SDX20" + "value" : "Lack of input validation for data received from user space can lead to an out of bound array issue in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in version MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 636, SD 820A, SD 835, SDM630, SDM660, SDX20." } ] }, diff --git a/2018/18xxx/CVE-2018-18492.json b/2018/18xxx/CVE-2018-18492.json index 24cc60dff9f..a96f51172cd 100644 --- a/2018/18xxx/CVE-2018-18492.json +++ b/2018/18xxx/CVE-2018-18492.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-30/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-31/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1499861" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Thunderbird" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18492", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18492", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Use-after-free with select element" + "product" : { + "product_data" : [ + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Use-after-free with select element" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1499861", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1499861" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-30/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-30/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-31/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-31/" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18493.json b/2018/18xxx/CVE-2018-18493.json index fe191fbdf57..3458d21f953 100644 --- a/2018/18xxx/CVE-2018-18493.json +++ b/2018/18xxx/CVE-2018-18493.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-30/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-31/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1504452" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Thunderbird" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18493", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18493", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Buffer overflow in accelerated 2D canvas with Skia" + "product" : { + "product_data" : [ + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Buffer overflow in accelerated 2D canvas with Skia" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1504452", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1504452" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-30/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-30/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-31/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-31/" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18494.json b/2018/18xxx/CVE-2018-18494.json index 76fb3cfe0c3..af2f35b2cb6 100644 --- a/2018/18xxx/CVE-2018-18494.json +++ b/2018/18xxx/CVE-2018-18494.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-30/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-31/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1487964" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Thunderbird" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18494", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18494", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs" + "product" : { + "product_data" : [ + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1487964", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1487964" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-30/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-30/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-31/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-31/" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18495.json b/2018/18xxx/CVE-2018-18495.json index 520d8096a8d..75f24dcc3e0 100644 --- a/2018/18xxx/CVE-2018-18495.json +++ b/2018/18xxx/CVE-2018-18495.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1427585" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "WebExtension content scripts can be loaded into about: pages in some circumstances, in violation of the permissions granted to extensions. This could allow an extension to interfere with the loading and usage of these pages and use capabilities that were intended to be restricted from extensions. This vulnerability affects Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18495", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18495", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "WebExtension content scripts can be loaded in about: pages" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "WebExtension content scripts can be loaded into about: pages in some circumstances, in violation of the permissions granted to extensions. This could allow an extension to interfere with the loading and usage of these pages and use capabilities that were intended to be restricted from extensions. This vulnerability affects Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "WebExtension content scripts can be loaded in about: pages" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1427585", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1427585" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18496.json b/2018/18xxx/CVE-2018-18496.json index cf825a13483..9825c313a86 100644 --- a/2018/18xxx/CVE-2018-18496.json +++ b/2018/18xxx/CVE-2018-18496.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1422231" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "When the RSS Feed preview about:feeds page is framed within another page, it can be used in concert with scripted content for a clickjacking attack that confuses users into downloading and executing an executable file from a temporary directory. *Note: This issue only affects Windows operating systems. Other operating systems are not affected.*. This vulnerability affects Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18496", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18496", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Embedded feed preview page can be abused for clickjacking" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "When the RSS Feed preview about:feeds page is framed within another page, it can be used in concert with scripted content for a clickjacking attack that confuses users into downloading and executing an executable file from a temporary directory. *Note: This issue only affects Windows operating systems. Other operating systems are not affected.*. This vulnerability affects Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Embedded feed preview page can be abused for clickjacking" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1422231", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1422231" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18497.json b/2018/18xxx/CVE-2018-18497.json index 9230e713847..7b7f74b3bb1 100644 --- a/2018/18xxx/CVE-2018-18497.json +++ b/2018/18xxx/CVE-2018-18497.json @@ -1,63 +1,68 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1488180" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18497", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18497", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "WebExtensions can load arbitrary URLs through pipe separators" + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Limitations on the URIs allowed to WebExtensions by the browser.windows.create API can be bypassed when a pipe in the URL field is used within the extension to load multiple pages as a single argument. This could allow a malicious WebExtension to open privileged about: or file: locations. This vulnerability affects Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "WebExtensions can load arbitrary URLs through pipe separators" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1488180", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1488180" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18498.json b/2018/18xxx/CVE-2018-18498.json index 4efccd474aa..2e6ccc3c7e7 100644 --- a/2018/18xxx/CVE-2018-18498.json +++ b/2018/18xxx/CVE-2018-18498.json @@ -1,91 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-30/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-31/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-29/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1500011" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Thunderbird" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "60.4" - } - ] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "64" - } - ] - }, - "product_name": "Firefox" - } - ] - }, - "vendor_name": "Mozilla" - } - ] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18498", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18498", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "Integer overflow when calculating buffer sizes for images" + "product" : { + "product_data" : [ + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.4" + } + ] + } + }, + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "64" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" } - ] - } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64." + } ] - } - } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Integer overflow when calculating buffer sizes for images" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1500011", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1500011" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-29/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-29/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-30/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-30/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-31/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-31/" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18499.json b/2018/18xxx/CVE-2018-18499.json index 4febbcf1e2f..08b1c76cbe7 100644 --- a/2018/18xxx/CVE-2018-18499.json +++ b/2018/18xxx/CVE-2018-18499.json @@ -1,75 +1,100 @@ { - "data_version": "4.0", - "references": { - "reference_data": [{ - "url": "https://www.mozilla.org/security/advisories/mfsa2018-25/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-21/" - }, - { - "url": "https://www.mozilla.org/security/advisories/mfsa2018-20/" - }, - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1468523" - } - ] - }, - "description": { - "description_data": [{ - "lang": "eng", - "value": "A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv=\"refresh\" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1." - }] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [{ - "product": { - "product_data": [{ - "version": { - "version_data": [{ - "version_affected": "<", - "version_value": "62" - }] - }, - "product_name": "Firefox" - }, - { - "version": { - "version_data": [{ - "version_affected": "<", - "version_value": "60.2" - }] - }, - "product_name": "Firefox ESR" - }, - { - "version": { - "version_data": [{ - "version_affected": "<", - "version_value": "60.2.1" - }] - }, - "product_name": "Thunderbird" - } - ] - }, - "vendor_name": "Mozilla" - }] - } - }, - "CVE_data_meta": { - "ID": "CVE-2018-18499", - "ASSIGNER": "security@mozilla.org" - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [{ - "description": [{ - "lang": "eng", - "value": "Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs" - }] - }] - } + "CVE_data_meta" : { + "ASSIGNER" : "security@mozilla.org", + "ID" : "CVE-2018-18499", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Firefox", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "62" + } + ] + } + }, + { + "product_name" : "Firefox ESR", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.2" + } + ] + } + }, + { + "product_name" : "Thunderbird", + "version" : { + "version_data" : [ + { + "version_affected" : "<", + "version_value" : "60.2.1" + } + ] + } + } + ] + }, + "vendor_name" : "Mozilla" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A same-origin policy violation allowing the theft of cross-origin URL entries when using a meta http-equiv=\"refresh\" on a page to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1468523", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1468523" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-20/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-20/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-21/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-21/" + }, + { + "name" : "https://www.mozilla.org/security/advisories/mfsa2018-25/", + "refsource" : "CONFIRM", + "url" : "https://www.mozilla.org/security/advisories/mfsa2018-25/" + } + ] + } } diff --git a/2018/5xxx/CVE-2018-5839.json b/2018/5xxx/CVE-2018-5839.json index 833ba2b7d91..030da7d4713 100644 --- a/2018/5xxx/CVE-2018-5839.json +++ b/2018/5xxx/CVE-2018-5839.json @@ -56,6 +56,11 @@ "name" : "https://www.qualcomm.com/company/product-security/bulletins", "refsource" : "CONFIRM", "url" : "https://www.qualcomm.com/company/product-security/bulletins" + }, + { + "name" : "106845", + "refsource" : "BID", + "url" : "http://www.securityfocus.com/bid/106845" } ] } diff --git a/2019/1xxx/CVE-2019-1663.json b/2019/1xxx/CVE-2019-1663.json index a5faab0ede4..d28ad712bb8 100644 --- a/2019/1xxx/CVE-2019-1663.json +++ b/2019/1xxx/CVE-2019-1663.json @@ -1,111 +1,111 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@cisco.com", - "DATE_PUBLIC": "2019-02-27T16:00:00-0800", - "ID": "CVE-2019-1663", - "STATE": "PUBLIC", - "TITLE": "Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "RV110W Wireless-N VPN Firewall", - "version": { - "version_data": [ - { - "affected": "<", - "version_value": "1.2.2.1" - } - ] - } - }, - { - "product_name": "RV130W Wireless-N Multifunction VPN Router", - "version": { - "version_data": [ - { - "affected": "<", - "version_value": "1.0.3.45" - } - ] - } - }, - { - "product_name": "RV215W Wireless-N VPN Router", - "version": { - "version_data": [ - { - "affected": "<", - "version_value": "1.3.1.1" - } - ] - } - } - ] - }, - "vendor_name": "Cisco" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta" : { + "ASSIGNER" : "psirt@cisco.com", + "DATE_PUBLIC" : "2019-02-27T16:00:00-0800", + "ID" : "CVE-2019-1663", + "STATE" : "PUBLIC", + "TITLE" : "Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected." - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "Security researchers announced the discovery of this vulnerability, without any technical details or mention of the affected products, at the GeekPwn Shanghai conference on October 24-25, 2018. " - } - ], - "impact": { - "cvss": { - "baseScore": "9.8", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "product" : { + "product_data" : [ + { + "product_name" : "RV110W Wireless-N VPN Firewall", + "version" : { + "version_data" : [ { - "lang": "eng", - "value": "CWE-119" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "20190227 Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability", - "refsource": "CISCO", - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex" - } - ] - }, - "source": { - "advisory": "cisco-sa-20190227-rmi-cmd-ex", - "defect": [ - [ - "CSCvn18638", - "CSCvn18639", - "CSCvn18642" + "affected" : "<", + "version_value" : "1.2.2.1" + } + ] + } + }, + { + "product_name" : "RV130W Wireless-N Multifunction VPN Router", + "version" : { + "version_data" : [ + { + "affected" : "<", + "version_value" : "1.0.3.45" + } + ] + } + }, + { + "product_name" : "RV215W Wireless-N VPN Router", + "version" : { + "version_data" : [ + { + "affected" : "<", + "version_value" : "1.3.1.1" + } + ] + } + } ] - ], - "discovery": "INTERNAL" - } + }, + "vendor_name" : "Cisco" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied data in the web-based management interface. An attacker could exploit this vulnerability by sending malicious HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of the affected device as a high-privilege user. RV110W Wireless-N VPN Firewall versions prior to 1.2.2.1 are affected. RV130W Wireless-N Multifunction VPN Router versions prior to 1.0.3.45 are affected. RV215W Wireless-N VPN Router versions prior to 1.3.1.1 are affected." + } + ] + }, + "exploit" : [ + { + "lang" : "eng", + "value" : "Security researchers announced the discovery of this vulnerability, without any technical details or mention of the affected products, at the GeekPwn Shanghai conference on October 24-25, 2018. " + } + ], + "impact" : { + "cvss" : { + "baseScore" : "9.8", + "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ", + "version" : "3.0" + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-119" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "20190227 Cisco RV110W, RV130W, and RV215W Routers Management Interface Remote Command Execution Vulnerability", + "refsource" : "CISCO", + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex" + } + ] + }, + "source" : { + "advisory" : "cisco-sa-20190227-rmi-cmd-ex", + "defect" : [ + [ + "CSCvn18638", + "CSCvn18639", + "CSCvn18642" + ] + ], + "discovery" : "INTERNAL" + } } diff --git a/2019/1xxx/CVE-2019-1674.json b/2019/1xxx/CVE-2019-1674.json index ceafd3eda6b..fe93a32c2c4 100644 --- a/2019/1xxx/CVE-2019-1674.json +++ b/2019/1xxx/CVE-2019-1674.json @@ -1,102 +1,102 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@cisco.com", - "DATE_PUBLIC": "2019-02-27T16:00:00-0800", - "ID": "CVE-2019-1674", - "STATE": "PUBLIC", - "TITLE": "Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools Update Service Command Injection Vulnerability" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Cisco Webex Meetings Desktop App ", - "version": { - "version_data": [ - { - "affected": "<", - "version_value": "33.6.6" - }, - { - "affected": "<", - "version_value": "33.9.1" - } - ] - } - }, - { - "product_name": "Cisco Webex Productivity Tools", - "version": { - "version_data": [ - { - "affected": "<", - "version_value": "33.0.7" - } - ] - } - } - ] - }, - "vendor_name": "Cisco" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "CVE_data_meta" : { + "ASSIGNER" : "psirt@cisco.com", + "DATE_PUBLIC" : "2019-02-27T16:00:00-0800", + "ID" : "CVE-2019-1674", + "STATE" : "PUBLIC", + "TITLE" : "Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools Update Service Command Injection Vulnerability" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "A vulnerability in the update service of Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools. This vulnerability is fixed in Cisco Webex Meetings Desktop App Release 33.6.6 and 33.9.1 releases. This vulnerability is fixed in Cisco Webex Productivity Tools Release 33.0.7. " - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " - } - ], - "impact": { - "cvss": { - "baseScore": "7.8", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ + "product" : { + "product_data" : [ + { + "product_name" : "Cisco Webex Meetings Desktop App ", + "version" : { + "version_data" : [ { - "lang": "eng", - "value": "CWE-78" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "20190227 Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools Update Service Command Injection Vulnerability", - "refsource": "CISCO", - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj" - } - ] - }, - "source": { - "advisory": "cisco-sa-20190227-wmda-cmdinj", - "defect": [ - [ - "CSCvn55874" + "affected" : "<", + "version_value" : "33.6.6" + }, + { + "affected" : "<", + "version_value" : "33.9.1" + } + ] + } + }, + { + "product_name" : "Cisco Webex Productivity Tools", + "version" : { + "version_data" : [ + { + "affected" : "<", + "version_value" : "33.0.7" + } + ] + } + } ] - ], - "discovery": "INTERNAL" - } + }, + "vendor_name" : "Cisco" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A vulnerability in the update service of Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools for Windows could allow an authenticated, local attacker to execute arbitrary commands as a privileged user. The vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by invoking the update service command with a crafted argument. An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges. While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access, administrators should be aware that in Active Directory deployments, the vulnerability could be exploited remotely by leveraging the operating system remote management tools. This vulnerability is fixed in Cisco Webex Meetings Desktop App Release 33.6.6 and 33.9.1 releases. This vulnerability is fixed in Cisco Webex Productivity Tools Release 33.0.7." + } + ] + }, + "exploit" : [ + { + "lang" : "eng", + "value" : "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " + } + ], + "impact" : { + "cvss" : { + "baseScore" : "7.8", + "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H ", + "version" : "3.0" + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-78" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "20190227 Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools Update Service Command Injection Vulnerability", + "refsource" : "CISCO", + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj" + } + ] + }, + "source" : { + "advisory" : "cisco-sa-20190227-wmda-cmdinj", + "defect" : [ + [ + "CSCvn55874" + ] + ], + "discovery" : "INTERNAL" + } } diff --git a/2019/9xxx/CVE-2019-9232.json b/2019/9xxx/CVE-2019-9232.json new file mode 100644 index 00000000000..a034b5fdaf1 --- /dev/null +++ b/2019/9xxx/CVE-2019-9232.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9232", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9233.json b/2019/9xxx/CVE-2019-9233.json new file mode 100644 index 00000000000..59235ac8b74 --- /dev/null +++ b/2019/9xxx/CVE-2019-9233.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9233", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9234.json b/2019/9xxx/CVE-2019-9234.json new file mode 100644 index 00000000000..a73f30eaca5 --- /dev/null +++ b/2019/9xxx/CVE-2019-9234.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9234", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9235.json b/2019/9xxx/CVE-2019-9235.json new file mode 100644 index 00000000000..bea2795029d --- /dev/null +++ b/2019/9xxx/CVE-2019-9235.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9235", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9236.json b/2019/9xxx/CVE-2019-9236.json new file mode 100644 index 00000000000..a773d2ca173 --- /dev/null +++ b/2019/9xxx/CVE-2019-9236.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9236", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9237.json b/2019/9xxx/CVE-2019-9237.json new file mode 100644 index 00000000000..a064d9fe3b8 --- /dev/null +++ b/2019/9xxx/CVE-2019-9237.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9237", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9238.json b/2019/9xxx/CVE-2019-9238.json new file mode 100644 index 00000000000..24b6f28dcca --- /dev/null +++ b/2019/9xxx/CVE-2019-9238.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9238", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9239.json b/2019/9xxx/CVE-2019-9239.json new file mode 100644 index 00000000000..f45017542d4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9239.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9239", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9240.json b/2019/9xxx/CVE-2019-9240.json new file mode 100644 index 00000000000..a9b0139fea9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9240.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9240", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9241.json b/2019/9xxx/CVE-2019-9241.json new file mode 100644 index 00000000000..08800c88b76 --- /dev/null +++ b/2019/9xxx/CVE-2019-9241.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9241", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9242.json b/2019/9xxx/CVE-2019-9242.json new file mode 100644 index 00000000000..433e8bc9c50 --- /dev/null +++ b/2019/9xxx/CVE-2019-9242.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9242", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9243.json b/2019/9xxx/CVE-2019-9243.json new file mode 100644 index 00000000000..563a23f166c --- /dev/null +++ b/2019/9xxx/CVE-2019-9243.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9243", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9244.json b/2019/9xxx/CVE-2019-9244.json new file mode 100644 index 00000000000..5fbaff4c0f7 --- /dev/null +++ b/2019/9xxx/CVE-2019-9244.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9244", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9245.json b/2019/9xxx/CVE-2019-9245.json new file mode 100644 index 00000000000..adac9093129 --- /dev/null +++ b/2019/9xxx/CVE-2019-9245.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9245", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9246.json b/2019/9xxx/CVE-2019-9246.json new file mode 100644 index 00000000000..b264eb2c4d8 --- /dev/null +++ b/2019/9xxx/CVE-2019-9246.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9246", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9247.json b/2019/9xxx/CVE-2019-9247.json new file mode 100644 index 00000000000..95ca331f274 --- /dev/null +++ b/2019/9xxx/CVE-2019-9247.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9247", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9248.json b/2019/9xxx/CVE-2019-9248.json new file mode 100644 index 00000000000..ca9865b9dfb --- /dev/null +++ b/2019/9xxx/CVE-2019-9248.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9248", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9249.json b/2019/9xxx/CVE-2019-9249.json new file mode 100644 index 00000000000..ee61139872f --- /dev/null +++ b/2019/9xxx/CVE-2019-9249.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9249", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9250.json b/2019/9xxx/CVE-2019-9250.json new file mode 100644 index 00000000000..8d42fc16064 --- /dev/null +++ b/2019/9xxx/CVE-2019-9250.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9250", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9251.json b/2019/9xxx/CVE-2019-9251.json new file mode 100644 index 00000000000..82f4239f592 --- /dev/null +++ b/2019/9xxx/CVE-2019-9251.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9251", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9252.json b/2019/9xxx/CVE-2019-9252.json new file mode 100644 index 00000000000..ed87c8da55b --- /dev/null +++ b/2019/9xxx/CVE-2019-9252.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9252", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9253.json b/2019/9xxx/CVE-2019-9253.json new file mode 100644 index 00000000000..ba35031c1af --- /dev/null +++ b/2019/9xxx/CVE-2019-9253.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9253", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9254.json b/2019/9xxx/CVE-2019-9254.json new file mode 100644 index 00000000000..67f13dbb431 --- /dev/null +++ b/2019/9xxx/CVE-2019-9254.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9254", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9255.json b/2019/9xxx/CVE-2019-9255.json new file mode 100644 index 00000000000..95f04b2d09f --- /dev/null +++ b/2019/9xxx/CVE-2019-9255.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9255", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9256.json b/2019/9xxx/CVE-2019-9256.json new file mode 100644 index 00000000000..79fa5b642ef --- /dev/null +++ b/2019/9xxx/CVE-2019-9256.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9256", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9257.json b/2019/9xxx/CVE-2019-9257.json new file mode 100644 index 00000000000..efaa2c564e3 --- /dev/null +++ b/2019/9xxx/CVE-2019-9257.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9257", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9258.json b/2019/9xxx/CVE-2019-9258.json new file mode 100644 index 00000000000..2da7204f073 --- /dev/null +++ b/2019/9xxx/CVE-2019-9258.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9258", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9259.json b/2019/9xxx/CVE-2019-9259.json new file mode 100644 index 00000000000..c7e2e6a8dd0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9259.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9259", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9260.json b/2019/9xxx/CVE-2019-9260.json new file mode 100644 index 00000000000..cfc8072b823 --- /dev/null +++ b/2019/9xxx/CVE-2019-9260.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9260", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9261.json b/2019/9xxx/CVE-2019-9261.json new file mode 100644 index 00000000000..4939d78c34a --- /dev/null +++ b/2019/9xxx/CVE-2019-9261.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9261", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9262.json b/2019/9xxx/CVE-2019-9262.json new file mode 100644 index 00000000000..da9c7c748eb --- /dev/null +++ b/2019/9xxx/CVE-2019-9262.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9262", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9263.json b/2019/9xxx/CVE-2019-9263.json new file mode 100644 index 00000000000..e2d5805f8a9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9263.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9263", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9264.json b/2019/9xxx/CVE-2019-9264.json new file mode 100644 index 00000000000..86b2358fa15 --- /dev/null +++ b/2019/9xxx/CVE-2019-9264.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9264", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9265.json b/2019/9xxx/CVE-2019-9265.json new file mode 100644 index 00000000000..559f92a215c --- /dev/null +++ b/2019/9xxx/CVE-2019-9265.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9265", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9266.json b/2019/9xxx/CVE-2019-9266.json new file mode 100644 index 00000000000..da9eead79e7 --- /dev/null +++ b/2019/9xxx/CVE-2019-9266.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9266", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9267.json b/2019/9xxx/CVE-2019-9267.json new file mode 100644 index 00000000000..6c756c23224 --- /dev/null +++ b/2019/9xxx/CVE-2019-9267.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9267", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9268.json b/2019/9xxx/CVE-2019-9268.json new file mode 100644 index 00000000000..e539ad3f62a --- /dev/null +++ b/2019/9xxx/CVE-2019-9268.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9268", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9269.json b/2019/9xxx/CVE-2019-9269.json new file mode 100644 index 00000000000..5a757a63e5d --- /dev/null +++ b/2019/9xxx/CVE-2019-9269.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9269", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9270.json b/2019/9xxx/CVE-2019-9270.json new file mode 100644 index 00000000000..570afb98dce --- /dev/null +++ b/2019/9xxx/CVE-2019-9270.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9270", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9271.json b/2019/9xxx/CVE-2019-9271.json new file mode 100644 index 00000000000..d5b2503aec6 --- /dev/null +++ b/2019/9xxx/CVE-2019-9271.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9271", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9272.json b/2019/9xxx/CVE-2019-9272.json new file mode 100644 index 00000000000..23fee4cdf79 --- /dev/null +++ b/2019/9xxx/CVE-2019-9272.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9272", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9273.json b/2019/9xxx/CVE-2019-9273.json new file mode 100644 index 00000000000..53826d67fa4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9273.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9273", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9274.json b/2019/9xxx/CVE-2019-9274.json new file mode 100644 index 00000000000..2bc7da0a3fd --- /dev/null +++ b/2019/9xxx/CVE-2019-9274.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9274", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9275.json b/2019/9xxx/CVE-2019-9275.json new file mode 100644 index 00000000000..29cc80f68cf --- /dev/null +++ b/2019/9xxx/CVE-2019-9275.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9275", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9276.json b/2019/9xxx/CVE-2019-9276.json new file mode 100644 index 00000000000..642214a3bfd --- /dev/null +++ b/2019/9xxx/CVE-2019-9276.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9276", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9277.json b/2019/9xxx/CVE-2019-9277.json new file mode 100644 index 00000000000..0a8247e3a9c --- /dev/null +++ b/2019/9xxx/CVE-2019-9277.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9277", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9278.json b/2019/9xxx/CVE-2019-9278.json new file mode 100644 index 00000000000..2b2735b1c58 --- /dev/null +++ b/2019/9xxx/CVE-2019-9278.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9278", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9279.json b/2019/9xxx/CVE-2019-9279.json new file mode 100644 index 00000000000..0cb14312bc3 --- /dev/null +++ b/2019/9xxx/CVE-2019-9279.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9279", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9280.json b/2019/9xxx/CVE-2019-9280.json new file mode 100644 index 00000000000..0b25600d7ae --- /dev/null +++ b/2019/9xxx/CVE-2019-9280.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9280", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9281.json b/2019/9xxx/CVE-2019-9281.json new file mode 100644 index 00000000000..4978555df82 --- /dev/null +++ b/2019/9xxx/CVE-2019-9281.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9281", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9282.json b/2019/9xxx/CVE-2019-9282.json new file mode 100644 index 00000000000..a41e9e5ea9c --- /dev/null +++ b/2019/9xxx/CVE-2019-9282.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9282", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9283.json b/2019/9xxx/CVE-2019-9283.json new file mode 100644 index 00000000000..f37fe8cfb9b --- /dev/null +++ b/2019/9xxx/CVE-2019-9283.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9283", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9284.json b/2019/9xxx/CVE-2019-9284.json new file mode 100644 index 00000000000..ae7b7eb8afb --- /dev/null +++ b/2019/9xxx/CVE-2019-9284.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9284", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9285.json b/2019/9xxx/CVE-2019-9285.json new file mode 100644 index 00000000000..97beb54020d --- /dev/null +++ b/2019/9xxx/CVE-2019-9285.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9285", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9286.json b/2019/9xxx/CVE-2019-9286.json new file mode 100644 index 00000000000..705513b1608 --- /dev/null +++ b/2019/9xxx/CVE-2019-9286.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9286", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9287.json b/2019/9xxx/CVE-2019-9287.json new file mode 100644 index 00000000000..26c5467000a --- /dev/null +++ b/2019/9xxx/CVE-2019-9287.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9287", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9288.json b/2019/9xxx/CVE-2019-9288.json new file mode 100644 index 00000000000..07477c222d2 --- /dev/null +++ b/2019/9xxx/CVE-2019-9288.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9288", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9289.json b/2019/9xxx/CVE-2019-9289.json new file mode 100644 index 00000000000..0f4be329fa4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9289.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9289", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9290.json b/2019/9xxx/CVE-2019-9290.json new file mode 100644 index 00000000000..7d4c8c2bc54 --- /dev/null +++ b/2019/9xxx/CVE-2019-9290.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9290", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9291.json b/2019/9xxx/CVE-2019-9291.json new file mode 100644 index 00000000000..cfd91bff18c --- /dev/null +++ b/2019/9xxx/CVE-2019-9291.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9291", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9292.json b/2019/9xxx/CVE-2019-9292.json new file mode 100644 index 00000000000..5c481779984 --- /dev/null +++ b/2019/9xxx/CVE-2019-9292.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9292", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9293.json b/2019/9xxx/CVE-2019-9293.json new file mode 100644 index 00000000000..f98cae9e494 --- /dev/null +++ b/2019/9xxx/CVE-2019-9293.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9293", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9294.json b/2019/9xxx/CVE-2019-9294.json new file mode 100644 index 00000000000..3164be5daba --- /dev/null +++ b/2019/9xxx/CVE-2019-9294.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9294", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9295.json b/2019/9xxx/CVE-2019-9295.json new file mode 100644 index 00000000000..82d11264568 --- /dev/null +++ b/2019/9xxx/CVE-2019-9295.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9295", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9296.json b/2019/9xxx/CVE-2019-9296.json new file mode 100644 index 00000000000..03c92822614 --- /dev/null +++ b/2019/9xxx/CVE-2019-9296.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9296", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9297.json b/2019/9xxx/CVE-2019-9297.json new file mode 100644 index 00000000000..c38f758d239 --- /dev/null +++ b/2019/9xxx/CVE-2019-9297.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9297", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9298.json b/2019/9xxx/CVE-2019-9298.json new file mode 100644 index 00000000000..7e75b41f52e --- /dev/null +++ b/2019/9xxx/CVE-2019-9298.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9298", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9299.json b/2019/9xxx/CVE-2019-9299.json new file mode 100644 index 00000000000..b8f62778438 --- /dev/null +++ b/2019/9xxx/CVE-2019-9299.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9299", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9300.json b/2019/9xxx/CVE-2019-9300.json new file mode 100644 index 00000000000..c2a6c67cb6d --- /dev/null +++ b/2019/9xxx/CVE-2019-9300.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9300", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9301.json b/2019/9xxx/CVE-2019-9301.json new file mode 100644 index 00000000000..55e197b65df --- /dev/null +++ b/2019/9xxx/CVE-2019-9301.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9301", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9302.json b/2019/9xxx/CVE-2019-9302.json new file mode 100644 index 00000000000..13f01648cb1 --- /dev/null +++ b/2019/9xxx/CVE-2019-9302.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9302", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9303.json b/2019/9xxx/CVE-2019-9303.json new file mode 100644 index 00000000000..5ce553fb24e --- /dev/null +++ b/2019/9xxx/CVE-2019-9303.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9303", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9304.json b/2019/9xxx/CVE-2019-9304.json new file mode 100644 index 00000000000..9da0292af08 --- /dev/null +++ b/2019/9xxx/CVE-2019-9304.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9304", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9305.json b/2019/9xxx/CVE-2019-9305.json new file mode 100644 index 00000000000..821a9e5ed3e --- /dev/null +++ b/2019/9xxx/CVE-2019-9305.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9305", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9306.json b/2019/9xxx/CVE-2019-9306.json new file mode 100644 index 00000000000..a6bfd18e558 --- /dev/null +++ b/2019/9xxx/CVE-2019-9306.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9306", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9307.json b/2019/9xxx/CVE-2019-9307.json new file mode 100644 index 00000000000..8bed870eb10 --- /dev/null +++ b/2019/9xxx/CVE-2019-9307.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9307", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9308.json b/2019/9xxx/CVE-2019-9308.json new file mode 100644 index 00000000000..332dab4e046 --- /dev/null +++ b/2019/9xxx/CVE-2019-9308.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9308", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9309.json b/2019/9xxx/CVE-2019-9309.json new file mode 100644 index 00000000000..ed21f89a4c0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9309.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9309", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9310.json b/2019/9xxx/CVE-2019-9310.json new file mode 100644 index 00000000000..36344ebc896 --- /dev/null +++ b/2019/9xxx/CVE-2019-9310.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9310", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9311.json b/2019/9xxx/CVE-2019-9311.json new file mode 100644 index 00000000000..0a55e059569 --- /dev/null +++ b/2019/9xxx/CVE-2019-9311.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9311", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9312.json b/2019/9xxx/CVE-2019-9312.json new file mode 100644 index 00000000000..c76f55b2990 --- /dev/null +++ b/2019/9xxx/CVE-2019-9312.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9312", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9313.json b/2019/9xxx/CVE-2019-9313.json new file mode 100644 index 00000000000..2588629d935 --- /dev/null +++ b/2019/9xxx/CVE-2019-9313.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9313", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9314.json b/2019/9xxx/CVE-2019-9314.json new file mode 100644 index 00000000000..6913562b614 --- /dev/null +++ b/2019/9xxx/CVE-2019-9314.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9314", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9315.json b/2019/9xxx/CVE-2019-9315.json new file mode 100644 index 00000000000..94e45b2a853 --- /dev/null +++ b/2019/9xxx/CVE-2019-9315.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9315", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9316.json b/2019/9xxx/CVE-2019-9316.json new file mode 100644 index 00000000000..ba9524a917f --- /dev/null +++ b/2019/9xxx/CVE-2019-9316.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9316", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9317.json b/2019/9xxx/CVE-2019-9317.json new file mode 100644 index 00000000000..fae11c69d78 --- /dev/null +++ b/2019/9xxx/CVE-2019-9317.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9317", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9318.json b/2019/9xxx/CVE-2019-9318.json new file mode 100644 index 00000000000..584bbf5ab8d --- /dev/null +++ b/2019/9xxx/CVE-2019-9318.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9318", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9319.json b/2019/9xxx/CVE-2019-9319.json new file mode 100644 index 00000000000..e513d20a8dc --- /dev/null +++ b/2019/9xxx/CVE-2019-9319.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9319", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9320.json b/2019/9xxx/CVE-2019-9320.json new file mode 100644 index 00000000000..4a567684f14 --- /dev/null +++ b/2019/9xxx/CVE-2019-9320.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9320", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9321.json b/2019/9xxx/CVE-2019-9321.json new file mode 100644 index 00000000000..c20c9cef5d6 --- /dev/null +++ b/2019/9xxx/CVE-2019-9321.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9321", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9322.json b/2019/9xxx/CVE-2019-9322.json new file mode 100644 index 00000000000..69d3f4587aa --- /dev/null +++ b/2019/9xxx/CVE-2019-9322.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9322", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9323.json b/2019/9xxx/CVE-2019-9323.json new file mode 100644 index 00000000000..8293efe8893 --- /dev/null +++ b/2019/9xxx/CVE-2019-9323.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9323", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9324.json b/2019/9xxx/CVE-2019-9324.json new file mode 100644 index 00000000000..d01bf6f1728 --- /dev/null +++ b/2019/9xxx/CVE-2019-9324.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9324", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9325.json b/2019/9xxx/CVE-2019-9325.json new file mode 100644 index 00000000000..124ae75f28c --- /dev/null +++ b/2019/9xxx/CVE-2019-9325.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9325", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9326.json b/2019/9xxx/CVE-2019-9326.json new file mode 100644 index 00000000000..adfc7627837 --- /dev/null +++ b/2019/9xxx/CVE-2019-9326.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9326", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9327.json b/2019/9xxx/CVE-2019-9327.json new file mode 100644 index 00000000000..fd475f6f7fc --- /dev/null +++ b/2019/9xxx/CVE-2019-9327.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9327", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9328.json b/2019/9xxx/CVE-2019-9328.json new file mode 100644 index 00000000000..e0fcc5a684c --- /dev/null +++ b/2019/9xxx/CVE-2019-9328.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9328", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9329.json b/2019/9xxx/CVE-2019-9329.json new file mode 100644 index 00000000000..a23225a28af --- /dev/null +++ b/2019/9xxx/CVE-2019-9329.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9329", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9330.json b/2019/9xxx/CVE-2019-9330.json new file mode 100644 index 00000000000..4c36764f215 --- /dev/null +++ b/2019/9xxx/CVE-2019-9330.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9330", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9331.json b/2019/9xxx/CVE-2019-9331.json new file mode 100644 index 00000000000..da43285430a --- /dev/null +++ b/2019/9xxx/CVE-2019-9331.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9331", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9332.json b/2019/9xxx/CVE-2019-9332.json new file mode 100644 index 00000000000..c907bbdd124 --- /dev/null +++ b/2019/9xxx/CVE-2019-9332.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9332", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9333.json b/2019/9xxx/CVE-2019-9333.json new file mode 100644 index 00000000000..ddb26237a17 --- /dev/null +++ b/2019/9xxx/CVE-2019-9333.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9333", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9334.json b/2019/9xxx/CVE-2019-9334.json new file mode 100644 index 00000000000..b4574276637 --- /dev/null +++ b/2019/9xxx/CVE-2019-9334.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9334", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9335.json b/2019/9xxx/CVE-2019-9335.json new file mode 100644 index 00000000000..1bf74fffd59 --- /dev/null +++ b/2019/9xxx/CVE-2019-9335.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9335", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9336.json b/2019/9xxx/CVE-2019-9336.json new file mode 100644 index 00000000000..b3300b7b944 --- /dev/null +++ b/2019/9xxx/CVE-2019-9336.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9336", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9337.json b/2019/9xxx/CVE-2019-9337.json new file mode 100644 index 00000000000..d4e58c7859f --- /dev/null +++ b/2019/9xxx/CVE-2019-9337.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9337", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9338.json b/2019/9xxx/CVE-2019-9338.json new file mode 100644 index 00000000000..ab483bc6c11 --- /dev/null +++ b/2019/9xxx/CVE-2019-9338.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9338", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9339.json b/2019/9xxx/CVE-2019-9339.json new file mode 100644 index 00000000000..9ae6d0d197c --- /dev/null +++ b/2019/9xxx/CVE-2019-9339.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9339", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9340.json b/2019/9xxx/CVE-2019-9340.json new file mode 100644 index 00000000000..9ab01ce8703 --- /dev/null +++ b/2019/9xxx/CVE-2019-9340.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9340", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9341.json b/2019/9xxx/CVE-2019-9341.json new file mode 100644 index 00000000000..2e3c272bc5b --- /dev/null +++ b/2019/9xxx/CVE-2019-9341.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9341", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9342.json b/2019/9xxx/CVE-2019-9342.json new file mode 100644 index 00000000000..c7e17b1eeca --- /dev/null +++ b/2019/9xxx/CVE-2019-9342.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9342", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9343.json b/2019/9xxx/CVE-2019-9343.json new file mode 100644 index 00000000000..3ffe7c75bbd --- /dev/null +++ b/2019/9xxx/CVE-2019-9343.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9343", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9344.json b/2019/9xxx/CVE-2019-9344.json new file mode 100644 index 00000000000..9c19e2a8ea0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9344.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9344", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9345.json b/2019/9xxx/CVE-2019-9345.json new file mode 100644 index 00000000000..5207ffd5f6d --- /dev/null +++ b/2019/9xxx/CVE-2019-9345.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9345", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9346.json b/2019/9xxx/CVE-2019-9346.json new file mode 100644 index 00000000000..6c8e9a87b8c --- /dev/null +++ b/2019/9xxx/CVE-2019-9346.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9346", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9347.json b/2019/9xxx/CVE-2019-9347.json new file mode 100644 index 00000000000..11e7107187a --- /dev/null +++ b/2019/9xxx/CVE-2019-9347.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9347", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9348.json b/2019/9xxx/CVE-2019-9348.json new file mode 100644 index 00000000000..01e3e3d27bb --- /dev/null +++ b/2019/9xxx/CVE-2019-9348.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9348", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9349.json b/2019/9xxx/CVE-2019-9349.json new file mode 100644 index 00000000000..86b7a78f169 --- /dev/null +++ b/2019/9xxx/CVE-2019-9349.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9349", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9350.json b/2019/9xxx/CVE-2019-9350.json new file mode 100644 index 00000000000..776a6a29fea --- /dev/null +++ b/2019/9xxx/CVE-2019-9350.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9350", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9351.json b/2019/9xxx/CVE-2019-9351.json new file mode 100644 index 00000000000..92ccf0f7df6 --- /dev/null +++ b/2019/9xxx/CVE-2019-9351.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9351", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9352.json b/2019/9xxx/CVE-2019-9352.json new file mode 100644 index 00000000000..5281945e693 --- /dev/null +++ b/2019/9xxx/CVE-2019-9352.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9352", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9353.json b/2019/9xxx/CVE-2019-9353.json new file mode 100644 index 00000000000..ce378cb68de --- /dev/null +++ b/2019/9xxx/CVE-2019-9353.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9353", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9354.json b/2019/9xxx/CVE-2019-9354.json new file mode 100644 index 00000000000..9829534b315 --- /dev/null +++ b/2019/9xxx/CVE-2019-9354.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9354", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9355.json b/2019/9xxx/CVE-2019-9355.json new file mode 100644 index 00000000000..25dd60ba853 --- /dev/null +++ b/2019/9xxx/CVE-2019-9355.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9355", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9356.json b/2019/9xxx/CVE-2019-9356.json new file mode 100644 index 00000000000..df85f870695 --- /dev/null +++ b/2019/9xxx/CVE-2019-9356.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9356", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9357.json b/2019/9xxx/CVE-2019-9357.json new file mode 100644 index 00000000000..12972328ae4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9357.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9357", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9358.json b/2019/9xxx/CVE-2019-9358.json new file mode 100644 index 00000000000..cdaaf454624 --- /dev/null +++ b/2019/9xxx/CVE-2019-9358.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9358", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9359.json b/2019/9xxx/CVE-2019-9359.json new file mode 100644 index 00000000000..91638314247 --- /dev/null +++ b/2019/9xxx/CVE-2019-9359.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9359", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9360.json b/2019/9xxx/CVE-2019-9360.json new file mode 100644 index 00000000000..7e1663973cd --- /dev/null +++ b/2019/9xxx/CVE-2019-9360.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9360", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9361.json b/2019/9xxx/CVE-2019-9361.json new file mode 100644 index 00000000000..e4ade5fb0b3 --- /dev/null +++ b/2019/9xxx/CVE-2019-9361.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9361", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9362.json b/2019/9xxx/CVE-2019-9362.json new file mode 100644 index 00000000000..ed6a1d591c4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9362.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9362", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9363.json b/2019/9xxx/CVE-2019-9363.json new file mode 100644 index 00000000000..48a2ebc0811 --- /dev/null +++ b/2019/9xxx/CVE-2019-9363.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9363", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9364.json b/2019/9xxx/CVE-2019-9364.json new file mode 100644 index 00000000000..e6f500a164f --- /dev/null +++ b/2019/9xxx/CVE-2019-9364.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9364", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9365.json b/2019/9xxx/CVE-2019-9365.json new file mode 100644 index 00000000000..65c225da04c --- /dev/null +++ b/2019/9xxx/CVE-2019-9365.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9365", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9366.json b/2019/9xxx/CVE-2019-9366.json new file mode 100644 index 00000000000..f0e83187541 --- /dev/null +++ b/2019/9xxx/CVE-2019-9366.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9366", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9367.json b/2019/9xxx/CVE-2019-9367.json new file mode 100644 index 00000000000..6b5522daa5a --- /dev/null +++ b/2019/9xxx/CVE-2019-9367.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9367", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9368.json b/2019/9xxx/CVE-2019-9368.json new file mode 100644 index 00000000000..8f31c5e7d72 --- /dev/null +++ b/2019/9xxx/CVE-2019-9368.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9368", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9369.json b/2019/9xxx/CVE-2019-9369.json new file mode 100644 index 00000000000..e2512710c39 --- /dev/null +++ b/2019/9xxx/CVE-2019-9369.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9369", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9370.json b/2019/9xxx/CVE-2019-9370.json new file mode 100644 index 00000000000..79b6f574895 --- /dev/null +++ b/2019/9xxx/CVE-2019-9370.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9370", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9371.json b/2019/9xxx/CVE-2019-9371.json new file mode 100644 index 00000000000..26f902c8bf7 --- /dev/null +++ b/2019/9xxx/CVE-2019-9371.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9371", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9372.json b/2019/9xxx/CVE-2019-9372.json new file mode 100644 index 00000000000..ce080aedffe --- /dev/null +++ b/2019/9xxx/CVE-2019-9372.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9372", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9373.json b/2019/9xxx/CVE-2019-9373.json new file mode 100644 index 00000000000..3e2d5421d76 --- /dev/null +++ b/2019/9xxx/CVE-2019-9373.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9373", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9374.json b/2019/9xxx/CVE-2019-9374.json new file mode 100644 index 00000000000..6acc904c825 --- /dev/null +++ b/2019/9xxx/CVE-2019-9374.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9374", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9375.json b/2019/9xxx/CVE-2019-9375.json new file mode 100644 index 00000000000..7fa5a6f150c --- /dev/null +++ b/2019/9xxx/CVE-2019-9375.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9375", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9376.json b/2019/9xxx/CVE-2019-9376.json new file mode 100644 index 00000000000..042f2f3f8be --- /dev/null +++ b/2019/9xxx/CVE-2019-9376.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9376", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9377.json b/2019/9xxx/CVE-2019-9377.json new file mode 100644 index 00000000000..edb823e7c0a --- /dev/null +++ b/2019/9xxx/CVE-2019-9377.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9377", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9378.json b/2019/9xxx/CVE-2019-9378.json new file mode 100644 index 00000000000..ffb4dbbb09a --- /dev/null +++ b/2019/9xxx/CVE-2019-9378.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9378", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9379.json b/2019/9xxx/CVE-2019-9379.json new file mode 100644 index 00000000000..9f63a0dd560 --- /dev/null +++ b/2019/9xxx/CVE-2019-9379.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9379", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9380.json b/2019/9xxx/CVE-2019-9380.json new file mode 100644 index 00000000000..72d1ff25777 --- /dev/null +++ b/2019/9xxx/CVE-2019-9380.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9380", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9381.json b/2019/9xxx/CVE-2019-9381.json new file mode 100644 index 00000000000..d38355633fa --- /dev/null +++ b/2019/9xxx/CVE-2019-9381.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9381", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9382.json b/2019/9xxx/CVE-2019-9382.json new file mode 100644 index 00000000000..9ba9fbbd98f --- /dev/null +++ b/2019/9xxx/CVE-2019-9382.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9382", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9383.json b/2019/9xxx/CVE-2019-9383.json new file mode 100644 index 00000000000..c7613abc3f9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9383.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9383", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9384.json b/2019/9xxx/CVE-2019-9384.json new file mode 100644 index 00000000000..e28a0227a3e --- /dev/null +++ b/2019/9xxx/CVE-2019-9384.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9384", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9385.json b/2019/9xxx/CVE-2019-9385.json new file mode 100644 index 00000000000..68a4117f902 --- /dev/null +++ b/2019/9xxx/CVE-2019-9385.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9385", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9386.json b/2019/9xxx/CVE-2019-9386.json new file mode 100644 index 00000000000..0fb91fb5089 --- /dev/null +++ b/2019/9xxx/CVE-2019-9386.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9386", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9387.json b/2019/9xxx/CVE-2019-9387.json new file mode 100644 index 00000000000..9049dbd4ba4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9387.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9387", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9388.json b/2019/9xxx/CVE-2019-9388.json new file mode 100644 index 00000000000..f38ca9d2c6e --- /dev/null +++ b/2019/9xxx/CVE-2019-9388.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9388", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9389.json b/2019/9xxx/CVE-2019-9389.json new file mode 100644 index 00000000000..8538d9e1ec5 --- /dev/null +++ b/2019/9xxx/CVE-2019-9389.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9389", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9390.json b/2019/9xxx/CVE-2019-9390.json new file mode 100644 index 00000000000..9d66919feb7 --- /dev/null +++ b/2019/9xxx/CVE-2019-9390.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9390", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9391.json b/2019/9xxx/CVE-2019-9391.json new file mode 100644 index 00000000000..c73e77e161c --- /dev/null +++ b/2019/9xxx/CVE-2019-9391.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9391", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9392.json b/2019/9xxx/CVE-2019-9392.json new file mode 100644 index 00000000000..b01bd63749a --- /dev/null +++ b/2019/9xxx/CVE-2019-9392.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9392", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9393.json b/2019/9xxx/CVE-2019-9393.json new file mode 100644 index 00000000000..3e7822e84f6 --- /dev/null +++ b/2019/9xxx/CVE-2019-9393.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9393", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9394.json b/2019/9xxx/CVE-2019-9394.json new file mode 100644 index 00000000000..46b5946bf7f --- /dev/null +++ b/2019/9xxx/CVE-2019-9394.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9394", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9395.json b/2019/9xxx/CVE-2019-9395.json new file mode 100644 index 00000000000..f0ace91c79d --- /dev/null +++ b/2019/9xxx/CVE-2019-9395.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9395", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9396.json b/2019/9xxx/CVE-2019-9396.json new file mode 100644 index 00000000000..ab8d6b491c9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9396.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9396", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9397.json b/2019/9xxx/CVE-2019-9397.json new file mode 100644 index 00000000000..d68f05e2cbe --- /dev/null +++ b/2019/9xxx/CVE-2019-9397.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9397", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9398.json b/2019/9xxx/CVE-2019-9398.json new file mode 100644 index 00000000000..c268e9e6f84 --- /dev/null +++ b/2019/9xxx/CVE-2019-9398.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9398", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9399.json b/2019/9xxx/CVE-2019-9399.json new file mode 100644 index 00000000000..918fd9be28e --- /dev/null +++ b/2019/9xxx/CVE-2019-9399.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9399", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9400.json b/2019/9xxx/CVE-2019-9400.json new file mode 100644 index 00000000000..c905b13e901 --- /dev/null +++ b/2019/9xxx/CVE-2019-9400.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9400", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9401.json b/2019/9xxx/CVE-2019-9401.json new file mode 100644 index 00000000000..7231e7a2bbf --- /dev/null +++ b/2019/9xxx/CVE-2019-9401.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9401", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9402.json b/2019/9xxx/CVE-2019-9402.json new file mode 100644 index 00000000000..6015c03888d --- /dev/null +++ b/2019/9xxx/CVE-2019-9402.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9402", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9403.json b/2019/9xxx/CVE-2019-9403.json new file mode 100644 index 00000000000..84e16f169d8 --- /dev/null +++ b/2019/9xxx/CVE-2019-9403.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9403", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9404.json b/2019/9xxx/CVE-2019-9404.json new file mode 100644 index 00000000000..c66a7c25718 --- /dev/null +++ b/2019/9xxx/CVE-2019-9404.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9404", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9405.json b/2019/9xxx/CVE-2019-9405.json new file mode 100644 index 00000000000..4151409b232 --- /dev/null +++ b/2019/9xxx/CVE-2019-9405.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9405", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9406.json b/2019/9xxx/CVE-2019-9406.json new file mode 100644 index 00000000000..21a79c55a34 --- /dev/null +++ b/2019/9xxx/CVE-2019-9406.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9406", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9407.json b/2019/9xxx/CVE-2019-9407.json new file mode 100644 index 00000000000..71061daa9b1 --- /dev/null +++ b/2019/9xxx/CVE-2019-9407.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9407", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9408.json b/2019/9xxx/CVE-2019-9408.json new file mode 100644 index 00000000000..0723900adec --- /dev/null +++ b/2019/9xxx/CVE-2019-9408.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9408", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9409.json b/2019/9xxx/CVE-2019-9409.json new file mode 100644 index 00000000000..dc3263beb46 --- /dev/null +++ b/2019/9xxx/CVE-2019-9409.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9409", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9410.json b/2019/9xxx/CVE-2019-9410.json new file mode 100644 index 00000000000..a342225e10e --- /dev/null +++ b/2019/9xxx/CVE-2019-9410.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9410", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9411.json b/2019/9xxx/CVE-2019-9411.json new file mode 100644 index 00000000000..5a2027bf354 --- /dev/null +++ b/2019/9xxx/CVE-2019-9411.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9411", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9412.json b/2019/9xxx/CVE-2019-9412.json new file mode 100644 index 00000000000..87ec67421d9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9412.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9412", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9413.json b/2019/9xxx/CVE-2019-9413.json new file mode 100644 index 00000000000..b936d715017 --- /dev/null +++ b/2019/9xxx/CVE-2019-9413.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9413", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9414.json b/2019/9xxx/CVE-2019-9414.json new file mode 100644 index 00000000000..996cbf87732 --- /dev/null +++ b/2019/9xxx/CVE-2019-9414.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9414", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9415.json b/2019/9xxx/CVE-2019-9415.json new file mode 100644 index 00000000000..e8d74efb0d7 --- /dev/null +++ b/2019/9xxx/CVE-2019-9415.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9415", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9416.json b/2019/9xxx/CVE-2019-9416.json new file mode 100644 index 00000000000..72c976ff59e --- /dev/null +++ b/2019/9xxx/CVE-2019-9416.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9416", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9417.json b/2019/9xxx/CVE-2019-9417.json new file mode 100644 index 00000000000..810c41fff19 --- /dev/null +++ b/2019/9xxx/CVE-2019-9417.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9417", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9418.json b/2019/9xxx/CVE-2019-9418.json new file mode 100644 index 00000000000..d8d2effe377 --- /dev/null +++ b/2019/9xxx/CVE-2019-9418.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9418", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9419.json b/2019/9xxx/CVE-2019-9419.json new file mode 100644 index 00000000000..cbbc0b01be9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9419.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9419", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9420.json b/2019/9xxx/CVE-2019-9420.json new file mode 100644 index 00000000000..5d66dd96d9f --- /dev/null +++ b/2019/9xxx/CVE-2019-9420.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9420", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9421.json b/2019/9xxx/CVE-2019-9421.json new file mode 100644 index 00000000000..c1367b7d097 --- /dev/null +++ b/2019/9xxx/CVE-2019-9421.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9421", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9422.json b/2019/9xxx/CVE-2019-9422.json new file mode 100644 index 00000000000..0a629485d9a --- /dev/null +++ b/2019/9xxx/CVE-2019-9422.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9422", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9423.json b/2019/9xxx/CVE-2019-9423.json new file mode 100644 index 00000000000..b8645d49799 --- /dev/null +++ b/2019/9xxx/CVE-2019-9423.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9423", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9424.json b/2019/9xxx/CVE-2019-9424.json new file mode 100644 index 00000000000..63feb6c0673 --- /dev/null +++ b/2019/9xxx/CVE-2019-9424.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9424", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9425.json b/2019/9xxx/CVE-2019-9425.json new file mode 100644 index 00000000000..0452becc59e --- /dev/null +++ b/2019/9xxx/CVE-2019-9425.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9425", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9426.json b/2019/9xxx/CVE-2019-9426.json new file mode 100644 index 00000000000..035a4c8be40 --- /dev/null +++ b/2019/9xxx/CVE-2019-9426.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9426", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9427.json b/2019/9xxx/CVE-2019-9427.json new file mode 100644 index 00000000000..b04e4b4b7b0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9427.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9427", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9428.json b/2019/9xxx/CVE-2019-9428.json new file mode 100644 index 00000000000..537f510dd88 --- /dev/null +++ b/2019/9xxx/CVE-2019-9428.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9428", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9429.json b/2019/9xxx/CVE-2019-9429.json new file mode 100644 index 00000000000..6e8aafd6999 --- /dev/null +++ b/2019/9xxx/CVE-2019-9429.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9429", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9430.json b/2019/9xxx/CVE-2019-9430.json new file mode 100644 index 00000000000..f6694f7cd1d --- /dev/null +++ b/2019/9xxx/CVE-2019-9430.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9430", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9431.json b/2019/9xxx/CVE-2019-9431.json new file mode 100644 index 00000000000..e7430d89966 --- /dev/null +++ b/2019/9xxx/CVE-2019-9431.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9431", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9432.json b/2019/9xxx/CVE-2019-9432.json new file mode 100644 index 00000000000..863e5e3d47c --- /dev/null +++ b/2019/9xxx/CVE-2019-9432.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9432", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9433.json b/2019/9xxx/CVE-2019-9433.json new file mode 100644 index 00000000000..587559d1c22 --- /dev/null +++ b/2019/9xxx/CVE-2019-9433.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9433", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9434.json b/2019/9xxx/CVE-2019-9434.json new file mode 100644 index 00000000000..f5f8f6f82ba --- /dev/null +++ b/2019/9xxx/CVE-2019-9434.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9434", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9435.json b/2019/9xxx/CVE-2019-9435.json new file mode 100644 index 00000000000..4fe4e421f40 --- /dev/null +++ b/2019/9xxx/CVE-2019-9435.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9435", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9436.json b/2019/9xxx/CVE-2019-9436.json new file mode 100644 index 00000000000..034b2853c01 --- /dev/null +++ b/2019/9xxx/CVE-2019-9436.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9436", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9437.json b/2019/9xxx/CVE-2019-9437.json new file mode 100644 index 00000000000..aeb8d3cf289 --- /dev/null +++ b/2019/9xxx/CVE-2019-9437.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9437", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9438.json b/2019/9xxx/CVE-2019-9438.json new file mode 100644 index 00000000000..99e0b90b89a --- /dev/null +++ b/2019/9xxx/CVE-2019-9438.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9438", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9439.json b/2019/9xxx/CVE-2019-9439.json new file mode 100644 index 00000000000..af82c8b4a9d --- /dev/null +++ b/2019/9xxx/CVE-2019-9439.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9439", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9440.json b/2019/9xxx/CVE-2019-9440.json new file mode 100644 index 00000000000..0d675ed87c4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9440.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9440", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9441.json b/2019/9xxx/CVE-2019-9441.json new file mode 100644 index 00000000000..dba65367ea1 --- /dev/null +++ b/2019/9xxx/CVE-2019-9441.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9441", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9442.json b/2019/9xxx/CVE-2019-9442.json new file mode 100644 index 00000000000..57a46e6f7da --- /dev/null +++ b/2019/9xxx/CVE-2019-9442.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9442", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9443.json b/2019/9xxx/CVE-2019-9443.json new file mode 100644 index 00000000000..2e027d9207e --- /dev/null +++ b/2019/9xxx/CVE-2019-9443.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9443", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9444.json b/2019/9xxx/CVE-2019-9444.json new file mode 100644 index 00000000000..2f95214588e --- /dev/null +++ b/2019/9xxx/CVE-2019-9444.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9444", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9445.json b/2019/9xxx/CVE-2019-9445.json new file mode 100644 index 00000000000..cf0e8fd8bd2 --- /dev/null +++ b/2019/9xxx/CVE-2019-9445.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9445", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9446.json b/2019/9xxx/CVE-2019-9446.json new file mode 100644 index 00000000000..67988a88dd9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9446.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9446", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9447.json b/2019/9xxx/CVE-2019-9447.json new file mode 100644 index 00000000000..807e97798df --- /dev/null +++ b/2019/9xxx/CVE-2019-9447.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9447", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9448.json b/2019/9xxx/CVE-2019-9448.json new file mode 100644 index 00000000000..31d7693ff54 --- /dev/null +++ b/2019/9xxx/CVE-2019-9448.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9448", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9449.json b/2019/9xxx/CVE-2019-9449.json new file mode 100644 index 00000000000..ded118c03fc --- /dev/null +++ b/2019/9xxx/CVE-2019-9449.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9449", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9450.json b/2019/9xxx/CVE-2019-9450.json new file mode 100644 index 00000000000..f6a2e072948 --- /dev/null +++ b/2019/9xxx/CVE-2019-9450.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9450", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9451.json b/2019/9xxx/CVE-2019-9451.json new file mode 100644 index 00000000000..236baa39620 --- /dev/null +++ b/2019/9xxx/CVE-2019-9451.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9451", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9452.json b/2019/9xxx/CVE-2019-9452.json new file mode 100644 index 00000000000..c20fe6f6763 --- /dev/null +++ b/2019/9xxx/CVE-2019-9452.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9452", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9453.json b/2019/9xxx/CVE-2019-9453.json new file mode 100644 index 00000000000..0ca15d2b01d --- /dev/null +++ b/2019/9xxx/CVE-2019-9453.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9453", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9454.json b/2019/9xxx/CVE-2019-9454.json new file mode 100644 index 00000000000..f2bccbfea42 --- /dev/null +++ b/2019/9xxx/CVE-2019-9454.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9454", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9455.json b/2019/9xxx/CVE-2019-9455.json new file mode 100644 index 00000000000..545fcc7f45b --- /dev/null +++ b/2019/9xxx/CVE-2019-9455.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9455", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9456.json b/2019/9xxx/CVE-2019-9456.json new file mode 100644 index 00000000000..627941bca2a --- /dev/null +++ b/2019/9xxx/CVE-2019-9456.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9456", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9457.json b/2019/9xxx/CVE-2019-9457.json new file mode 100644 index 00000000000..0f00c3a34e0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9457.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9457", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9458.json b/2019/9xxx/CVE-2019-9458.json new file mode 100644 index 00000000000..dc78667f4cd --- /dev/null +++ b/2019/9xxx/CVE-2019-9458.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9458", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9459.json b/2019/9xxx/CVE-2019-9459.json new file mode 100644 index 00000000000..77e108f7bc9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9459.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9459", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9460.json b/2019/9xxx/CVE-2019-9460.json new file mode 100644 index 00000000000..5796d303de3 --- /dev/null +++ b/2019/9xxx/CVE-2019-9460.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9460", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9461.json b/2019/9xxx/CVE-2019-9461.json new file mode 100644 index 00000000000..c09767c38c9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9461.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9461", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9462.json b/2019/9xxx/CVE-2019-9462.json new file mode 100644 index 00000000000..5a0d020fe18 --- /dev/null +++ b/2019/9xxx/CVE-2019-9462.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9462", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9463.json b/2019/9xxx/CVE-2019-9463.json new file mode 100644 index 00000000000..f552067723f --- /dev/null +++ b/2019/9xxx/CVE-2019-9463.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9463", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9464.json b/2019/9xxx/CVE-2019-9464.json new file mode 100644 index 00000000000..f624d1513b8 --- /dev/null +++ b/2019/9xxx/CVE-2019-9464.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9464", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9465.json b/2019/9xxx/CVE-2019-9465.json new file mode 100644 index 00000000000..6ae0b722ac0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9465.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9465", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9466.json b/2019/9xxx/CVE-2019-9466.json new file mode 100644 index 00000000000..46bd79dc3e9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9466.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9466", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9467.json b/2019/9xxx/CVE-2019-9467.json new file mode 100644 index 00000000000..85298239c14 --- /dev/null +++ b/2019/9xxx/CVE-2019-9467.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9467", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9468.json b/2019/9xxx/CVE-2019-9468.json new file mode 100644 index 00000000000..4eb33e3660f --- /dev/null +++ b/2019/9xxx/CVE-2019-9468.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9468", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9469.json b/2019/9xxx/CVE-2019-9469.json new file mode 100644 index 00000000000..bb639477946 --- /dev/null +++ b/2019/9xxx/CVE-2019-9469.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9469", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9470.json b/2019/9xxx/CVE-2019-9470.json new file mode 100644 index 00000000000..60495e81d03 --- /dev/null +++ b/2019/9xxx/CVE-2019-9470.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9470", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9471.json b/2019/9xxx/CVE-2019-9471.json new file mode 100644 index 00000000000..3120b0078e8 --- /dev/null +++ b/2019/9xxx/CVE-2019-9471.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9471", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9472.json b/2019/9xxx/CVE-2019-9472.json new file mode 100644 index 00000000000..0ebafd95e07 --- /dev/null +++ b/2019/9xxx/CVE-2019-9472.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9472", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9473.json b/2019/9xxx/CVE-2019-9473.json new file mode 100644 index 00000000000..d5e7c915d52 --- /dev/null +++ b/2019/9xxx/CVE-2019-9473.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9473", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9474.json b/2019/9xxx/CVE-2019-9474.json new file mode 100644 index 00000000000..6af9a08e6ed --- /dev/null +++ b/2019/9xxx/CVE-2019-9474.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9474", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9475.json b/2019/9xxx/CVE-2019-9475.json new file mode 100644 index 00000000000..3a1669a9933 --- /dev/null +++ b/2019/9xxx/CVE-2019-9475.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9475", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9476.json b/2019/9xxx/CVE-2019-9476.json new file mode 100644 index 00000000000..997a2e31009 --- /dev/null +++ b/2019/9xxx/CVE-2019-9476.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9476", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9477.json b/2019/9xxx/CVE-2019-9477.json new file mode 100644 index 00000000000..04e6a8bd803 --- /dev/null +++ b/2019/9xxx/CVE-2019-9477.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9477", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9478.json b/2019/9xxx/CVE-2019-9478.json new file mode 100644 index 00000000000..ef71732017a --- /dev/null +++ b/2019/9xxx/CVE-2019-9478.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9478", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9479.json b/2019/9xxx/CVE-2019-9479.json new file mode 100644 index 00000000000..82006c2a12e --- /dev/null +++ b/2019/9xxx/CVE-2019-9479.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9479", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9480.json b/2019/9xxx/CVE-2019-9480.json new file mode 100644 index 00000000000..b89536747ad --- /dev/null +++ b/2019/9xxx/CVE-2019-9480.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9480", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9481.json b/2019/9xxx/CVE-2019-9481.json new file mode 100644 index 00000000000..1e57d587244 --- /dev/null +++ b/2019/9xxx/CVE-2019-9481.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9481", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}