Merge pull request #293 from CVEProject/master

XFA Rebase
This commit is contained in:
Scott Moore 2020-07-08 13:16:55 -04:00 committed by GitHub
commit 18b688b4b8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
639 changed files with 25605 additions and 3599 deletions

View File

@ -58,6 +58,11 @@
"name": "https://github.com/lajarajorge/CVE-2017-1000475/blob/master/README.md",
"refsource": "MISC",
"url": "https://github.com/lajarajorge/CVE-2017-1000475/blob/master/README.md"
},
{
"refsource": "EXPLOIT-DB",
"name": "Explooit Database",
"url": "https://www.exploit-db.com/exploits/48044"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-530188bf36",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e59bcaf702",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-530188bf36",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e59bcaf702",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-530188bf36",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e59bcaf702",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-530188bf36",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e59bcaf702",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-530188bf36",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e59bcaf702",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-530188bf36",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e59bcaf702",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-530188bf36",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e59bcaf702",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGFZ4SPV6KFQK6ZNUZFB5Y32OYFOM5YJ/"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. Python 3.8, 3.7, 3.6, 3.5, 3.4, 2.7 are believed to be vulnerable."
"value": "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15."
}
]
},

View File

@ -56,6 +56,16 @@
"name": "https://github.com/flask-admin/flask-admin/pull/1699",
"refsource": "MISC",
"url": "https://github.com/flask-admin/flask-admin/pull/1699"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-e8f384af5f",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-4aaf6e6d7c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200518-0006/",
"url": "https://security.netapp.com/advisory/ntap-20200518-0006/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0934",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html"
}
]
}

View File

@ -53,6 +53,31 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/157514/Apache-OFBiz-17.12.03-Cross-Site-Request-Forgery.html",
"url": "http://packetstormsecurity.com/files/157514/Apache-OFBiz-17.12.03-Cross-Site-Request-Forgery.html"
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200705 [jira] [Commented] (OFBIZ-11306) POC for CSRF Token (CVE-2019-0235)",
"url": "https://lists.apache.org/thread.html/rbd572bb27991835a3455c1bf694e7140d79ab03cdb9e6e50fd1219d7@%3Cnotifications.ofbiz.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200706 [jira] [Commented] (OFBIZ-11306) POC for CSRF Token (CVE-2019-0235)",
"url": "https://lists.apache.org/thread.html/r392206f7cd131f0fc3f7c60a767ced93ced00411d55c1777c219c956@%3Cnotifications.ofbiz.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200707 [jira] [Commented] (OFBIZ-11306) POC for CSRF Token (CVE-2019-0235)",
"url": "https://lists.apache.org/thread.html/rfe36dc9135810954ef667d29129d02207fb999a286b60d33bd9c2349@%3Cnotifications.ofbiz.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[ofbiz-notifications] 20200708 [jira] [Commented] (OFBIZ-11306) POC for CSRF Token (CVE-2019-0235)",
"url": "https://lists.apache.org/thread.html/r9eeb6c41d2c562b451f1e48ec56881f59107cc4dea7c883db2c5373d@%3Cnotifications.ofbiz.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[ofbiz-commits] 20200708 [ofbiz-framework] 01/02: Documented: POC for CSRF Token (CVE-2019-0235) (OFBIZ-11306)",
"url": "https://lists.apache.org/thread.html/rb53870d24088956a555683aa1aea7e532e3be65b863b9c75eac31b90@%3Ccommits.ofbiz.apache.org%3E"
}
]
},

View File

@ -138,6 +138,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00033.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-4717",
"url": "https://www.debian.org/security/2020/dsa-4717"
},
{
"refsource": "DEBIAN",
"name": "DSA-4719",
"url": "https://www.debian.org/security/2020/dsa-4719"
}
]
},

View File

@ -361,6 +361,11 @@
"refsource": "MLIST",
"name": "[flink-issues] 20200520 [jira] [Closed] (FLINK-17675) Resolve CVE-2019-11358 from jquery",
"url": "https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[storm-dev] 20200708 [GitHub] [storm] Crim opened a new pull request #3305: [STORM-3553] Upgrade jQuery from 1.11.1 to 3.5.1",
"url": "https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E"
}
]
}

View File

@ -88,6 +88,11 @@
"name": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263",
"refsource": "MISC",
"url": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html",
"url": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html"
}
]
}

View File

@ -61,6 +61,16 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190606 [SECURITY] [DLA 1815-1] poppler security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00002.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-f34d97b1fd",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQBAHQQF2P7E6PL5STST3TGH7VPVXKKQ/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-de27bb80af",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJ3GYFINXANXTQEDN5SON47IJA5277RU/"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-f251753b0f",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDCHEKNR3HPJRNHE5PYKFH5GNBADTPA7/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-059e1591d6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFHIX6RTHCK37FXMAAXP4KGAMLUFDUD/"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4712",
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"refsource": "DEBIAN",
"name": "DSA-4715",
"url": "https://www.debian.org/security/2020/dsa-4715"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "DEBIAN",
"name": "DSA-4712",
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"refsource": "DEBIAN",
"name": "DSA-4715",
"url": "https://www.debian.org/security/2020/dsa-4715"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "UBUNTU",
"name": "USN-4192-1",
"url": "https://usn.ubuntu.com/4192-1/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4715",
"url": "https://www.debian.org/security/2020/dsa-4715"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4712",
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"refsource": "DEBIAN",
"name": "DSA-4715",
"url": "https://www.debian.org/security/2020/dsa-4715"
}
]
}

View File

@ -48,6 +48,31 @@
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-213-05",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-05"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-814/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-814/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-810/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-810/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-811/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-811/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-813/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-813/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-812/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-812/"
}
]
},

View File

@ -0,0 +1,68 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-14900",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Hibernate",
"version": {
"version_data": [
{
"version_value": "Versions before Hibernate ORM 5.3.18"
},
{
"version_value": "Versions before Hibernate ORM 5.4.18"
},
{
"version_value": "Versions before Hibernate ORM 5.5.0.Beta1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1666499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666499"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks."
}
]
}
}

View File

@ -86,6 +86,11 @@
"refsource": "DEBIAN",
"name": "DSA-4712",
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"refsource": "DEBIAN",
"name": "DSA-4715",
"url": "https://www.debian.org/security/2020/dsa-4715"
}
]
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15310",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://labs.mwrinfosecurity.com/advisories/",
"refsource": "MISC",
"name": "https://labs.mwrinfosecurity.com/advisories/"
},
{
"url": "https://linkplay.com/featured-products/",
"refsource": "MISC",
"name": "https://linkplay.com/featured-products/"
},
{
"refsource": "MISC",
"name": "https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/",
"url": "https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15311",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://labs.mwrinfosecurity.com/advisories/",
"refsource": "MISC",
"name": "https://labs.mwrinfosecurity.com/advisories/"
},
{
"url": "https://linkplay.com/featured-products/",
"refsource": "MISC",
"name": "https://linkplay.com/featured-products/"
},
{
"refsource": "MISC",
"name": "https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/",
"url": "https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15312",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is a Zolo Halo DNS rebinding attack. The device was found to be vulnerable to DNS rebinding. Combined with one of the many /httpapi.asp endpoint command-execution security issues, the DNS rebinding attack could allow an attacker to compromise the victim device from the Internet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://labs.mwrinfosecurity.com/advisories/",
"refsource": "MISC",
"name": "https://labs.mwrinfosecurity.com/advisories/"
},
{
"url": "https://linkplay.com/featured-products/",
"refsource": "MISC",
"name": "https://linkplay.com/featured-products/"
},
{
"refsource": "MISC",
"name": "https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/",
"url": "https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/"
}
]
}
}

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0696",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-8bdd3fd7a4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/"
}
]
}

View File

@ -19,7 +19,7 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.181(C00E87R2P20T8)"
"version_value": "earlier than 9.0.0.181(C00E87R2P20T8)"
}
]
}
@ -29,7 +29,7 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.201(C432E4R1P9)"
"version_value": "earlier than 9.0.0.201(C432E4R1P9)"
}
]
}
@ -39,10 +39,10 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.177(C185E2R1P12T8)"
"version_value": "earlier than 9.0.0.177(C185E2R1P12T8)"
},
{
"version_value": "< 9.0.0.195(C636E2R1P12)"
"version_value": "earlier than 9.0.0.195(C636E2R1P12)"
}
]
}
@ -52,7 +52,7 @@
"version": {
"version_data": [
{
"version_value": "< 8.0.0.168(C00)"
"version_value": "earlier than 8.0.0.168(C00)"
}
]
}
@ -62,7 +62,7 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.181(C00E88R2P15T8)"
"version_value": "earlier than 9.0.0.181(C00E88R2P15T8)"
}
]
}
@ -72,10 +72,10 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.177(C185E2R1P13T8)"
"version_value": "earlier than 9.0.0.177(C185E2R1P13T8)"
},
{
"version_value": "< 9.0.0.206(C432E4R1P11)"
"version_value": "earlier than 9.0.0.206(C432E4R1P11)"
}
]
}
@ -85,16 +85,16 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.179(C576E2R1P7T8)"
"version_value": "earlier than 9.0.0.179(C576E2R1P7T8)"
},
{
"version_value": "< 9.0.0.194(C185E2R1P13)"
"version_value": "earlier than 9.0.0.194(C185E2R1P13)"
},
{
"version_value": "< 9.0.0.206(C432E4R1P11)"
"version_value": "earlier than 9.0.0.206(C432E4R1P11)"
},
{
"version_value": "< 9.0.0.210(C635E4R1P13)"
"version_value": "earlier than 9.0.0.210(C635E4R1P13)"
}
]
}
@ -104,7 +104,7 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.156(C00E156R2P14T8)"
"version_value": "earlier than 9.0.0.156(C00E156R2P14T8)"
}
]
}
@ -114,10 +114,10 @@
"version": {
"version_data": [
{
"version_value": "< 8.0.0.172(C432)"
"version_value": "earlier than 8.0.0.172(C432)"
},
{
"version_value": "< 8.0.0.173(C636)"
"version_value": "earlier than 8.0.0.173(C636)"
}
]
}
@ -127,25 +127,25 @@
"version": {
"version_data": [
{
"version_value": "< 9.0.0.159(C185E2R1P12T8)"
"version_value": "earlier than 9.0.0.159(C185E2R1P12T8)"
},
{
"version_value": "< 9.0.0.159(C461E2R1P11T8)"
"version_value": "earlier than 9.0.0.159(C461E2R1P11T8)"
},
{
"version_value": "< 9.0.0.160(C432E7R1P11T8)"
"version_value": "earlier than 9.0.0.160(C432E7R1P11T8)"
},
{
"version_value": "< 9.0.0.165(C605E2R1P12)"
"version_value": "earlier than 9.0.0.165(C605E2R1P12)"
},
{
"version_value": "< 9.0.0.168(C636E7R1P13T8)"
"version_value": "earlier than 9.0.0.168(C636E7R1P13T8)"
},
{
"version_value": "< 9.0.0.168(C782E3R1P11T8)"
"version_value": "earlier than 9.0.0.168(C782E3R1P11T8)"
},
{
"version_value": "< 9.0.0.196(C635E2R1P11T8)"
"version_value": "earlier than 9.0.0.196(C635E2R1P11T8)"
}
]
}
@ -155,66 +155,7 @@
"version": {
"version_data": [
{
"version_value": "< 9.1.0.130(C605E6R1P5T8)"
}
]
}
},
{
"product_name": "Figo-L21",
"version": {
"version_data": [
{
"version_value": "< 9.1.0.130(C185E6R1P5T8)"
},
{
"version_value": "< 9.1.0.130(C635E6R1P5T8)"
}
]
}
},
{
"product_name": "Figo-L23",
"version": {
"version_data": [
{
"version_value": "< 9.1.0.130(C605E6R1P5T8)"
}
]
}
},
{
"product_name": "Figo-L31",
"version": {
"version_data": [
{
"version_value": "< 9.1.0.130(C432E8R1P5T8)"
}
]
}
},
{
"product_name": "Florida-L03",
"version": {
"version_data": [
{
"version_value": "< 9.1.0.121(C605E5R1P1T8)"
}
]
}
},
{
"product_name": "Florida-L21",
"version": {
"version_data": [
{
"version_value": "< 8.0.0.129(C605)"
},
{
"version_value": "< 8.0.0.131(C432)"
},
{
"version_value": "< 8.0.0.132(C185)"
"version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
}
]
}
@ -226,12 +167,71 @@
"vendor_name": "Huawei",
"product": {
"product_data": [
{
"product_name": "Figo-L21",
"version": {
"version_data": [
{
"version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
},
{
"version_value": "earlier than 9.1.0.130(C635E6R1P5T8)"
}
]
}
},
{
"product_name": "Figo-L23",
"version": {
"version_data": [
{
"version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
}
]
}
},
{
"product_name": "Figo-L31",
"version": {
"version_data": [
{
"version_value": "earlier than 9.1.0.130(C432E8R1P5T8)"
}
]
}
},
{
"product_name": "Florida-L03",
"version": {
"version_data": [
{
"version_value": "earlier than 9.1.0.121(C605E5R1P1T8)"
}
]
}
},
{
"product_name": "Florida-L21",
"version": {
"version_data": [
{
"version_value": "earlier than 8.0.0.129(C605)"
},
{
"version_value": "earlier than 8.0.0.131(C432)"
},
{
"version_value": "earlier than 8.0.0.132(C185)"
}
]
}
},
{
"product_name": "Florida-L22",
"version": {
"version_data": [
{
"version_value": "< 8.0.0.132(C636)"
"version_value": "earlier than 8.0.0.132(C636)"
}
]
}
@ -241,7 +241,7 @@
"version": {
"version_data": [
{
"version_value": "< 8.0.0.144(C605)"
"version_value": "earlier than 8.0.0.144(C605)"
}
]
}
@ -251,20 +251,20 @@
"version": {
"version_data": [
{
"version_value": "< 9.1.0.130(C185E6R1P5T8)"
"version_value": "earlier than 9.1.0.130(C185E6R1P5T8)"
},
{
"version_value": "< 9.1.0.130(C605E6R1P5T8)"
"version_value": "earlier than 9.1.0.130(C605E6R1P5T8)"
}
]
}
},
{
"product_name": "HUAWEI P smart, HUAWEI Y7s",
"product_name": "HUAWEI P smart,HUAWEI Y7s",
"version": {
"version_data": [
{
"version_value": "< 9.1.0.124(C636E6R1P5T8)"
"version_value": "earlier than 9.1.0.124(C636E6R1P5T8)"
}
]
}
@ -274,54 +274,61 @@
"version": {
"version_data": [
{
"version_value": "< 8.0.0.148(C635)"
"version_value": "earlier than 8.0.0.148(C635)"
},
{
"version_value": "< 8.0.0.155(C185)"
"version_value": "earlier than 8.0.0.155(C185)"
},
{
"version_value": "< 8.0.0.155(C605)"
"version_value": "earlier than 8.0.0.155(C605)"
},
{
"version_value": "< 8.0.0.156(C605)"
"version_value": "earlier than 8.0.0.156(C605)"
},
{
"version_value": "< 8.0.0.157(C432)"
"version_value": "earlier than 8.0.0.157(C432)"
}
]
}
},
{
"product_name": "HUAWEI nova 3e, HUAWEI P20 lite",
"product_name": "HUAWEI nova 3e,HUAWEI P20 lite",
"version": {
"version_data": [
{
"version_value": "< 8.0.0.147(C461)"
"version_value": "earlier than 8.0.0.147(C461)"
},
{
"version_value": "< 8.0.0.148(ZAFC185)"
"version_value": "earlier than 8.0.0.148(ZAFC185)"
},
{
"version_value": "< 8.0.0.160(C185)"
"version_value": "earlier than 8.0.0.160(C185)"
},
{
"version_value": "< 8.0.0.160(C605)"
"version_value": "earlier than 8.0.0.160(C605)"
},
{
"version_value": "< 8.0.0.168(C432)"
"version_value": "earlier than 8.0.0.168(C432)"
},
{
"version_value": "< 8.0.0.172(C636)"
"version_value": "earlier than 8.0.0.172(C636)"
}
]
}
},
}
]
}
},
{
"vendor_name": "Huawei",
"product": {
"product_data": [
{
"product_name": "Honor View 10",
"version": {
"version_data": [
{
"version_value": "< 9.0.0.202(C567E6R1P12T8)"
"version_value": "earlier than 9.0.0.202(C567E6R1P12T8)"
}
]
}
@ -331,7 +338,7 @@
"version": {
"version_data": [
{
"version_value": "< 8.0.0.182(C00)"
"version_value": "earlier than 8.0.0.182(C00)"
}
]
}
@ -341,10 +348,10 @@
"version": {
"version_data": [
{
"version_value": "< 8.0.0.135(C185)"
"version_value": "earlier than 8.0.0.135(C185)"
},
{
"version_value": "< 9.1.0.118(C636E4R1P1T8)"
"version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
}
]
}
@ -354,7 +361,7 @@
"version": {
"version_data": [
{
"version_value": "< 9.1.0.118(C636E4R1P1T8)"
"version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
}
]
}
@ -364,7 +371,7 @@
"version": {
"version_data": [
{
"version_value": "< 9.1.0.118(C636E4R1P1T8)"
"version_value": "earlier than 9.1.0.118(C636E4R1P1T8)"
}
]
}
@ -374,7 +381,7 @@
"version": {
"version_data": [
{
"version_value": "< 8.0.0.139(C432)"
"version_value": "earlier than 8.0.0.139(C432)"
}
]
}
@ -410,7 +417,7 @@
"description_data": [
{
"lang": "eng",
"value": "Some Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. The affected products and versions are: ALP-AL00B Versions earlier than 9.0.0.181(C00E87R2P20T8) ALP-L09 Versions earlier than 9.0.0.201(C432E4R1P9) ALP-L29 Versions earlier than 9.0.0.177(C185E2R1P12T8), Versions earlier than 9.0.0.195(C636E2R1P12) Anne-AL00 Versions earlier than 8.0.0.168(C00) BLA-AL00B Versions earlier than 9.0.0.181(C00E88R2P15T8) BLA-L09C Versions earlier than 9.0.0.177(C185E2R1P13T8), Versions earlier than 9.0.0.206(C432E4R1P11) BLA-L29C Versions earlier than 9.0.0.179(C576E2R1P7T8), Versions earlier than 9.0.0.194(C185E2R1P13), Versions earlier than 9.0.0.206(C432E4R1P11), Versions earlier than 9.0.0.210(C635E4R1P13) Berkeley-AL20 Versions earlier than 9.0.0.156(C00E156R2P14T8) Berkeley-L09 Versions earlier than 8.0.0.172(C432), Versions earlier than 8.0.0.173(C636) Emily-L29C Versions earlier than 9.0.0.159(C185E2R1P12T8), Versions earlier than 9.0.0.159(C461E2R1P11T8), Versions earlier than 9.0.0.160(C432E7R1P11T8), Versions earlier than 9.0.0.165(C605E2R1P12), Versions earlier than 9.0.0.168(C636E7R1P13T8), Versions earlier than 9.0.0.168(C782E3R1P11T8), Versions earlier than 9.0.0.196(C635E2R1P11T8) Figo-L03 Versions earlier than 9.1.0.130(C605E6R1P5T8) Figo-L21 Versions earlier than 9.1.0.130(C185E6R1P5T8), Versions earlier than 9.1.0.130(C635E6R1P5T8) Figo-L23 Versions earlier than 9.1.0.130(C605E6R1P5T8) Figo-L31 Versions earlier than 9.1.0.130(C432E8R1P5T8) Florida-L03 Versions earlier than 9.1.0.121(C605E5R1P1T8) Florida-L21 Versions earlier than 8.0.0.129(C605), Versions earlier than 8.0.0.131(C432), Versions earlier than 8.0.0.132(C185) Florida-L22 Versions earlier than 8.0.0.132(C636) Florida-L23 Versions earlier than 8.0.0.144(C605) HUAWEI P smart Versions earlier than 9.1.0.130(C185E6R1P5T8), Versions earlier than 9.1.0.130(C605E6R1P5T8) HUAWEI P smart, HUAWEI Y7s Versions earlier than 9.1.0.124(C636E6R1P5T8) HUAWEI P20 lite Versions earlier than 8.0.0.148(C635), Versions earlier than 8.0.0.155(C185), Versions earlier than 8.0.0.155(C605), Versions earlier than 8.0.0.156(C605), Versions earlier than 8.0.0.157(C432) HUAWEI nova 3e, HUAWEI P20 lite Versions earlier than 8.0.0.147(C461), Versions earlier than 8.0.0.148(ZAFC185), Versions earlier than 8.0.0.160(C185), Versions earlier than 8.0.0.160(C605), Versions earlier than 8.0.0.168(C432), Versions earlier than 8.0.0.172(C636) Honor View 10 Versions earlier than 9.0.0.202(C567E6R1P12T8) Leland-AL00A Versions earlier than 8.0.0.182(C00) Leland-L21A Versions earlier than 8.0.0.135(C185), Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L22A Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L22C Versions earlier than 9.1.0.118(C636E4R1P1T8) Leland-L31A Versions earlier than 8.0.0.139(C432)"
"value": "Huawei smart phones have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker login the Talkback mode and can perform some operations to install a third-Party application. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-frp-en."
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0801",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0935",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"
}
]
}

View File

@ -1,17 +1,66 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19935",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-19935",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Froala Editor before 3.0.6 allows XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/froala/wysiwyg-editor/compare/v3.0.5...v3.0.6",
"refsource": "MISC",
"name": "https://github.com/froala/wysiwyg-editor/compare/v3.0.5...v3.0.6"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/158300/Froala-WYSIWYG-HTML-Editor-3.1.1-Cross-Site-Scripting.html"
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "DEBIAN",
"name": "DSA-4712",
"url": "https://www.debian.org/security/2020/dsa-4712"
},
{
"refsource": "DEBIAN",
"name": "DSA-4715",
"url": "https://www.debian.org/security/2020/dsa-4715"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0681",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200702-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200702-0005/"
}
]
}

View File

@ -1,17 +1,63 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2020-04-08T00:00:00",
"ID": "CVE-2019-20417",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jira Server",
"version": {
"version_data": [
{
"version_value": "8.4.2",
"version_affected": "<"
}
]
}
}
]
},
"vendor_name": "Atlassian"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate internal services via an Information Disclosure vulnerability. The vulnerability is only exploitable if WebSudo is disabled in Jira. The affected versions are before version 8.4.2."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "User Enumeration"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/JRASERVER-70886",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/JRASERVER-70886"
}
]
}

View File

@ -1,17 +1,63 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2020-04-22T00:00:00",
"ID": "CVE-2019-20418",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jira Server",
"version": {
"version_data": [
{
"version_value": "8.8.0",
"version_affected": "<"
}
]
}
}
]
},
"vendor_name": "Atlassian"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Affected versions of Atlassian Jira Server and Data Center allow remote attackers to prevent users from accessing the instance via an Application Denial of Service vulnerability in the /rendering/wiki endpoint. The affected versions are before version 8.8.0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Application Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/JRASERVER-70943",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/JRASERVER-70943"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2020-04-22T00:00:00",
"ID": "CVE-2019-20419",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jira Server",
"version": {
"version_data": [
{
"version_value": "8.5.5",
"version_affected": "<"
},
{
"version_value": "8.6.0",
"version_affected": ">="
},
{
"version_value": "8.7.2",
"version_affected": "<"
}
]
}
}
]
},
"vendor_name": "Atlassian"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Affected versions of Atlassian Jira Server and Data Center allow remote attackers to execute arbitrary code via a DLL hijacking vulnerability in Tomcat. The affected versions are before version 8.5.5, and from version 8.6.0 before 8.7.2."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "DLL Hijacking"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://jira.atlassian.com/browse/JRASERVER-70945",
"refsource": "MISC",
"name": "https://jira.atlassian.com/browse/JRASERVER-70945"
}
]
}

View File

@ -61,6 +61,11 @@
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983",
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0935",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0801",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0935",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[oss-security] 20200625 [cve-request@...re.org: Re: [scr916814] net-snmp - Perhaps only unreleased development versions; fix appears to be in v5.8.1.pre1]",
"url": "http://www.openwall.com/lists/oss-security/2020/06/25/4"
},
{
"refsource": "UBUNTU",
"name": "USN-4410-1",
"url": "https://usn.ubuntu.com/4410-1/"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-20894",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/containous/traefik/issues/5312",
"refsource": "MISC",
"name": "https://github.com/containous/traefik/issues/5312"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20895",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-20896",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "WebChess 1.0 allows SQL injection via the messageFrom, gameID, opponent, messageID, or to parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://sourceforge.net/p/webchess/bugs/81/",
"url": "https://sourceforge.net/p/webchess/bugs/81/"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20897",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20898",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20899",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20900",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20901",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20902",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20903",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20904",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20905",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-20906",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -113,6 +113,11 @@
"refsource": "MISC",
"name": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e",
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"refsource": "UBUNTU",
"name": "USN-4400-1",
"url": "https://usn.ubuntu.com/4400-1/"
}
]
},

View File

@ -100,6 +100,11 @@
"refsource": "CONFIRM",
"name": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi",
"url": "https://www.dell.com/support/security/en-us/details/DOC-106943/DSA-2019-134-RSA-Identity-Governance-and-Lifecycle-Product-Security-Update-for-Multiple-Vulnerabi"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/158324/RSA-IG-L-Aveksa-7.1.1-Remote-Code-Execution.html"
}
]
},

View File

@ -1,17 +1,66 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-4323",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-4323",
"ASSIGNER": "psirt@hcl.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "\"HCL AppScan Enterprise\"",
"version": {
"version_data": [
{
"version_value": "\"Version 10.0.0 and below\""
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "\"Clickjacking\""
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080572",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080572"
},
{
"refsource": "CONFIRM",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080572&sys_kb_id=3668a078dbb9101855f38d6d13961955",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080572&sys_kb_id=3668a078dbb9101855f38d6d13961955"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "\"HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame.\""
}
]
}

View File

@ -1,17 +1,66 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-4324",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-4324",
"ASSIGNER": "psirt@hcl.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "\"HCL AppScan Enterprise\"",
"version": {
"version_data": [
{
"version_value": "\"Version 10.0.0 and below\""
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "\"Cross-site scripting\""
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080574",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080574"
},
{
"refsource": "CONFIRM",
"name": "https://support.hcltechsw.com/csm?id=kb_article&sys_id=cd5030b4dbbd101855f38d6d13961958",
"url": "https://support.hcltechsw.com/csm?id=kb_article&sys_id=cd5030b4dbbd101855f38d6d13961958"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "\"HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy.\""
}
]
}

View File

@ -1,18 +1,90 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-4676",
"STATE": "RESERVED"
"data_version": "4.0",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "7.0.2"
}
]
},
"product_name": "Security Identity Manager Virtual Appliance"
}
]
}
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"CVE_data_meta": {
"STATE": "PUBLIC",
"DATE_PUBLIC": "2020-06-30T00:00:00",
"ASSIGNER": "psirt@us.ibm.com",
"ID": "CVE-2019-4676"
},
"impact": {
"cvssv3": {
"TM": {
"RL": "O",
"RC": "C",
"E": "U"
},
"BM": {
"I": "N",
"AV": "N",
"S": "C",
"C": "H",
"SCORE": "6.300",
"PR": "L",
"UI": "N",
"A": "N",
"AC": "H"
}
}
},
"references": {
"reference_data": [
{
"title": "IBM Security Bulletin 6242348 (Security Identity Manager Virtual Appliance)",
"url": "https://www.ibm.com/support/pages/node/6242348",
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6242348"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/171512",
"title": "X-Force Vulnerability Report",
"name": "ibm-sim-cve20194676-info-disc (171512)",
"refsource": "XF"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IBM Security Identity Manager Virtual Appliance 7.0.2 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 171512."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Obtain Information",
"lang": "eng"
}
]
}
]
},
"data_type": "CVE"
}

View File

@ -1,18 +1,90 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-4704",
"STATE": "RESERVED"
"DATE_PUBLIC": "2020-06-30T00:00:00",
"ASSIGNER": "psirt@us.ibm.com",
"STATE": "PUBLIC"
},
"references": {
"reference_data": [
{
"title": "IBM Security Bulletin 6242348 (Security Identity Manager Virtual Appliance)",
"url": "https://www.ibm.com/support/pages/node/6242348",
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6242348"
},
{
"title": "X-Force Vulnerability Report",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172014",
"name": "ibm-sim-cve20194704-info-disc (172014)",
"refsource": "XF"
}
]
},
"impact": {
"cvssv3": {
"BM": {
"SCORE": "3.700",
"C": "L",
"PR": "N",
"UI": "N",
"A": "N",
"AC": "H",
"I": "N",
"AV": "N",
"S": "U"
},
"TM": {
"E": "U",
"RL": "O",
"RC": "C"
}
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IBM Security Identity Manager Virtual Appliance 7.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 172014.",
"lang": "eng"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
},
"data_type": "CVE",
"data_version": "4.0",
"data_format": "MITRE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"product_name": "Security Identity Manager Virtual Appliance",
"version": {
"version_data": [
{
"version_value": "7.0.2"
}
]
}
}
]
}
}
]
}
}
}

View File

@ -1,17 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-4705",
"STATE": "RESERVED"
"data_version": "4.0",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "7.0.2"
}
]
},
"product_name": "Security Identity Manager Virtual Appliance"
}
]
},
"vendor_name": "IBM"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2020-06-30T00:00:00",
"ID": "CVE-2019-4705",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IBM Security Identity Manager Virtual Appliance 7.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 172015.",
"lang": "eng"
}
]
},
"impact": {
"cvssv3": {
"TM": {
"E": "U",
"RL": "O",
"RC": "C"
},
"BM": {
"C": "L",
"SCORE": "2.700",
"PR": "H",
"UI": "N",
"A": "N",
"AC": "L",
"I": "N",
"AV": "N",
"S": "U"
}
}
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://www.ibm.com/support/pages/node/6242348",
"url": "https://www.ibm.com/support/pages/node/6242348",
"title": "IBM Security Bulletin 6242348 (Security Identity Manager Virtual Appliance)"
},
{
"title": "X-Force Vulnerability Report",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172015",
"name": "ibm-sim-cve20194705-info-disc (172015)",
"refsource": "XF"
}
]
},
"data_type": "CVE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "Obtain Information",
"lang": "eng"
}
]
}
]
}

View File

@ -1,18 +1,90 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-4706",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "IBM",
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": "7.0.2"
}
]
},
"product_name": "Security Identity Manager Virtual Appliance"
}
]
}
}
]
}
},
"data_version": "4.0",
"data_type": "CVE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Obtain Information"
}
]
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "IBM Security Identity Manager Virtual Appliance 7.0.2 writes information to log files which can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. IBM X-Force ID: 172016."
}
]
},
"impact": {
"cvssv3": {
"TM": {
"RC": "C",
"RL": "O",
"E": "U"
},
"BM": {
"AC": "L",
"A": "N",
"UI": "N",
"PR": "H",
"SCORE": "2.700",
"C": "L",
"S": "U",
"AV": "N",
"I": "N"
}
}
},
"references": {
"reference_data": [
{
"name": "https://www.ibm.com/support/pages/node/6242348",
"refsource": "CONFIRM",
"title": "IBM Security Bulletin 6242348 (Security Identity Manager Virtual Appliance)",
"url": "https://www.ibm.com/support/pages/node/6242348"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172016",
"title": "X-Force Vulnerability Report",
"refsource": "XF",
"name": "ibm-sim-cve20194706-info-disc (172016)"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ASSIGNER": "psirt@us.ibm.com",
"DATE_PUBLIC": "2020-06-30T00:00:00",
"ID": "CVE-2019-4706"
}
}

View File

@ -55,7 +55,7 @@
"description_data": [
{
"lang": "eng",
"value": "Clustered Data ONTAP versions 9.2 through 9.6 are susceptible to a vulnerability which allows an attacker to use l2ping to cause a Denial of Service (DoS)."
"value": "Clustered Data ONTAP versions 9.2 through 9.4 are susceptible to a vulnerability which allows an attacker to use l2ping to cause a Denial of Service (DoS)."
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/155250/Linear-eMerge50P-5000P-4.6.07-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://www.applied-risk.com/resources/ar-2019-006",
"url": "https://www.applied-risk.com/resources/ar-2019-006"
},
{
"refsource": "MISC",
"name": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01",
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-184-01"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "GENTOO",
"name": "GLSA-202005-06",
"url": "https://security.gentoo.org/glsa/202005-06"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0944",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00009.html"
}
]
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-7965",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-7965",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8002",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8002",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8003",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8003",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8004",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8004",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8005",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8005",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,37 +1,12 @@
{
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8006",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
@ -44,19 +19,44 @@
}
]
},
"data_version": "4.0",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
}
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8006",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8007",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8007",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8008",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8008",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8009",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8009",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8010",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8010",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8011",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8011",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8012",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8012",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8013",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8013",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8014",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution ."
"description": [
{
"lang": "eng",
"value": "Heap Overflow "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap Overflow\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8014",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8015",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution ."
"description": [
{
"lang": "eng",
"value": "Heap Overflow "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap Overflow\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8015",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8016",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8016",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,37 +1,12 @@
{
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8017",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
@ -44,19 +19,44 @@
}
]
},
"data_version": "4.0",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
}
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8017",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8018",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8018",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,37 +1,12 @@
{
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions , 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8019",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
@ -44,19 +19,44 @@
}
]
},
"data_version": "4.0",
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
}
}
]
},
"vendor_name": "Adobe"
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8019",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8020",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8020",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8021",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Read\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8021",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8022",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8022",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8023",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8023",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8024",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8024",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8025",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8025",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8026",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8026",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8027",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-Bounds Write\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8027",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8028",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8028",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8029",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8029",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

View File

@ -1,13 +1,24 @@
{
"description": {
"description_data": [
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2019-8030",
"STATE": "PUBLIC"
},
"problemtype": {
"problemtype_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution."
"description": [
{
"lang": "eng",
"value": "Use After Free "
}
]
}
]
},
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
@ -15,14 +26,14 @@
"product": {
"product_data": [
{
"product_name": "Adobe Acrobat and Reader",
"version": {
"version_data": [
{
"version_value": ", 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142\u202fand earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
"version_value": "2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier versions"
}
]
},
"product_name": "Adobe Acrobat and Reader"
}
}
]
},
@ -31,32 +42,21 @@
]
}
},
"data_format": "MITRE",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use After Free\u202f\u202f\u202f"
}
]
}
]
},
"data_version": "4.0",
"references": {
"reference_data": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html",
"refsource": "CONFIRM",
"name": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-41.html"
}
]
},
"CVE_data_meta": {
"STATE": "PUBLIC",
"ID": "CVE-2019-8030",
"ASSIGNER": "psirt@adobe.com"
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution ."
}
]
}
}

Some files were not shown because too many files have changed in this diff Show More