From 1aa3929c0ee0144fa01a252cf9a69f86fdf73215 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 12 Mar 2019 17:40:02 -0400 Subject: [PATCH] - Synchronized data. --- 2019/5xxx/CVE-2019-5917.json | 123 +++++++++++++++++----------------- 2019/5xxx/CVE-2019-5918.json | 123 +++++++++++++++++----------------- 2019/5xxx/CVE-2019-5919.json | 123 +++++++++++++++++----------------- 2019/5xxx/CVE-2019-5920.json | 125 ++++++++++++++++++----------------- 2019/5xxx/CVE-2019-5921.json | 118 ++++++++++++++++----------------- 2019/5xxx/CVE-2019-5922.json | 118 ++++++++++++++++----------------- 2019/5xxx/CVE-2019-5923.json | 125 ++++++++++++++++++----------------- 2019/5xxx/CVE-2019-5924.json | 125 ++++++++++++++++++----------------- 2019/5xxx/CVE-2019-5925.json | 123 +++++++++++++++++----------------- 2019/9xxx/CVE-2019-9726.json | 18 +++++ 2019/9xxx/CVE-2019-9727.json | 18 +++++ 2019/9xxx/CVE-2019-9728.json | 18 +++++ 2019/9xxx/CVE-2019-9729.json | 18 +++++ 13 files changed, 641 insertions(+), 534 deletions(-) create mode 100644 2019/9xxx/CVE-2019-9726.json create mode 100644 2019/9xxx/CVE-2019-9727.json create mode 100644 2019/9xxx/CVE-2019-9728.json create mode 100644 2019/9xxx/CVE-2019-9729.json diff --git a/2019/5xxx/CVE-2019-5917.json b/2019/5xxx/CVE-2019-5917.json index 70e609173cb..d2442372872 100644 --- a/2019/5xxx/CVE-2019-5917.json +++ b/2019/5xxx/CVE-2019-5917.json @@ -1,62 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5917", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Microsoft", - "product": { - "product_data": [ - { - "product_name": "azure-umqtt-c", - "version": { - "version_data": [ - { - "version_value": "azure-umqtt-c that was available through GitHub prior to 2017 October 6." - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5917", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "azure-umqtt-c", + "version" : { + "version_data" : [ + { + "version_value" : "azure-umqtt-c that was available through GitHub prior to 2017 October 6." + } + ] + } + } + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "azure-umqtt-c (available through GitHub prior to 2017 October 6) allows remote attackers to cause a denial of service via unspecified vectors." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Denial-of-service (DoS)" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Denial-of-service (DoS)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://github.com/Azure/azure-umqtt-c" - }, - { - "url": "http://jvn.jp/en/jp/JVN05875753/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "azure-umqtt-c (available through GitHub prior to 2017 October 6) allows remote attackers to cause a denial of service via unspecified vectors." - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/Azure/azure-umqtt-c", + "refsource" : "MISC", + "url" : "https://github.com/Azure/azure-umqtt-c" + }, + { + "name" : "JVN#05875753", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN05875753/index.html" + } + ] + } } diff --git a/2019/5xxx/CVE-2019-5918.json b/2019/5xxx/CVE-2019-5918.json index 8d39cb20592..a8afa6676f9 100644 --- a/2019/5xxx/CVE-2019-5918.json +++ b/2019/5xxx/CVE-2019-5918.json @@ -1,62 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5918", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "TIS Inc.", - "product": { - "product_data": [ - { - "product_name": "Nablarch 5", - "version": { - "version_data": [ - { - "version_value": "Nablarch 5, and 5u1 to 5u13" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5918", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Nablarch 5", + "version" : { + "version_data" : [ + { + "version_value" : "Nablarch 5, and 5u1 to 5u13" + } + ] + } + } + ] + }, + "vendor_name" : "TIS Inc." + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Nablarch 5 (5, and 5u1 to 5u13) allows remote attackers to conduct XML External Entity (XXE) attacks via unspecified vectors." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "XML external entities (XXE)" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "XML external entities (XXE)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://nablarch.atlassian.net/projects/NAB/issues/NAB-295" - }, - { - "url": "http://jvn.jp/en/jp/JVN56542712/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Nablarch 5 (5, and 5u1 to 5u13) allows remote attackers to conduct XML External Entity (XXE) attacks via unspecified vectors." - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://nablarch.atlassian.net/projects/NAB/issues/NAB-295", + "refsource" : "MISC", + "url" : "https://nablarch.atlassian.net/projects/NAB/issues/NAB-295" + }, + { + "name" : "JVN#56542712", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN56542712/index.html" + } + ] + } } diff --git a/2019/5xxx/CVE-2019-5919.json b/2019/5xxx/CVE-2019-5919.json index ef3a2874387..47394aa9491 100644 --- a/2019/5xxx/CVE-2019-5919.json +++ b/2019/5xxx/CVE-2019-5919.json @@ -1,62 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5919", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "TIS Inc.", - "product": { - "product_data": [ - { - "product_name": "Nablarch 5", - "version": { - "version_data": [ - { - "version_value": "Nablarch 5, and 5u1 to 5u13" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5919", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Nablarch 5", + "version" : { + "version_data" : [ + { + "version_value" : "Nablarch 5, and 5u1 to 5u13" + } + ] + } + } + ] + }, + "vendor_name" : "TIS Inc." + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An incomplete cryptography of the data store function by using hidden tag in Nablarch 5 (5, and 5u1 to 5u13) allows remote attackers to obtain information of the stored data, to register invalid value, or alter the value via unspecified vectors." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "An incomplete cryptography" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "An incomplete cryptography" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://nablarch.atlassian.net/browse/NAB-313" - }, - { - "url": "http://jvn.jp/en/jp/JVN56542712/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An incomplete cryptography of the data store function by using hidden tag in Nablarch 5 (5, and 5u1 to 5u13) allows remote attackers to obtain information of the stored data, to register invalid value, or alter the value via unspecified vectors." - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://nablarch.atlassian.net/browse/NAB-313", + "refsource" : "MISC", + "url" : "https://nablarch.atlassian.net/browse/NAB-313" + }, + { + "name" : "JVN#56542712", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN56542712/index.html" + } + ] + } } diff --git a/2019/5xxx/CVE-2019-5920.json b/2019/5xxx/CVE-2019-5920.json index 70a36078dea..51bce50e8d1 100644 --- a/2019/5xxx/CVE-2019-5920.json +++ b/2019/5xxx/CVE-2019-5920.json @@ -1,62 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5920", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "nCrafts", - "product": { - "product_data": [ - { - "product_name": "FormCraft", - "version": { - "version_data": [ - { - "version_value": "1.2.1 and earlier" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5920", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "FormCraft", + "version" : { + "version_data" : [ + { + "version_value" : "1.2.1 and earlier" + } + ] + } + } + ] + }, + "vendor_name" : "nCrafts" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Cross-site request forgery (CSRF) vulnerability in FormCraft 1.2.1 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-site request forgery" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Cross-site request forgery" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://wordpress.org/plugins/formcraft-form-builder/#developers" - }, - { - "url": "http://jvn.jp/en/jp/JVN83501605/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Cross-site request forgery (CSRF) vulnerability in FormCraft 1.2.1 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page." - } - ] - } -} \ No newline at end of file + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://wordpress.org/plugins/formcraft-form-builder/#developers", + "refsource" : "MISC", + "url" : "https://wordpress.org/plugins/formcraft-form-builder/#developers" + }, + { + "name" : "JVN#83501605", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN83501605/index.html" + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5921.json b/2019/5xxx/CVE-2019-5921.json index 579cac72b30..941d5e03809 100644 --- a/2019/5xxx/CVE-2019-5921.json +++ b/2019/5xxx/CVE-2019-5921.json @@ -1,62 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5921", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Microsoft", - "product": { - "product_data": [ - { - "product_name": "Windows 7", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5921", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Windows 7", + "version" : { + "version_data" : [ + { + "version_value" : "" + } + ] + } + } + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Untrusted search path vulnerability in Windows 7 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Untrusted search path vulnerability" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Untrusted search path vulnerability" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/" - }, - { - "url": "http://jvn.jp/en/jp/JVN69181574/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Untrusted search path vulnerability in Windows 7 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "JVN#69181574", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN69181574/index.html" + } + ] + } } diff --git a/2019/5xxx/CVE-2019-5922.json b/2019/5xxx/CVE-2019-5922.json index f0f2b6f04aa..fc71d289fde 100644 --- a/2019/5xxx/CVE-2019-5922.json +++ b/2019/5xxx/CVE-2019-5922.json @@ -1,62 +1,62 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5922", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Microsoft", - "product": { - "product_data": [ - { - "product_name": "The installer of Microsoft Teams", - "version": { - "version_data": [ - { - "version_value": "" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5922", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "The installer of Microsoft Teams", + "version" : { + "version_data" : [ + { + "version_value" : "" + } + ] + } + } + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Untrusted search path vulnerability in The installer of Microsoft Teams allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Untrusted search path vulnerability" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Untrusted search path vulnerability" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/" - }, - { - "url": "http://jvn.jp/en/jp/JVN79543573/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Untrusted search path vulnerability in The installer of Microsoft Teams allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "JVN#79543573", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN79543573/index.html" + } + ] + } } diff --git a/2019/5xxx/CVE-2019-5923.json b/2019/5xxx/CVE-2019-5923.json index 5c5327e06f6..755298c212c 100644 --- a/2019/5xxx/CVE-2019-5923.json +++ b/2019/5xxx/CVE-2019-5923.json @@ -1,62 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5923", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "iChain, Inc.", - "product": { - "product_data": [ - { - "product_name": "iChain Insurance Wallet App for iOS", - "version": { - "version_data": [ - { - "version_value": "Version 1.3.0 and earlier" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5923", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "iChain Insurance Wallet App for iOS", + "version" : { + "version_data" : [ + { + "version_value" : "Version 1.3.0 and earlier" + } + ] + } + } + ] + }, + "vendor_name" : "iChain, Inc." + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Directory traversal vulnerability in iChain Insurance Wallet App for iOS Version 1.3.0 and earlier allows remote attackers to read arbitrary files via unspecified vectors." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Directory traversal" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Directory traversal" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://www.ichain.co.jp/security20190311.html" - }, - { - "url": "http://jvn.jp/en/jp/JVN11622218/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Directory traversal vulnerability in iChain Insurance Wallet App for iOS Version 1.3.0 and earlier allows remote attackers to read arbitrary files via unspecified vectors." - } - ] - } -} \ No newline at end of file + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.ichain.co.jp/security20190311.html", + "refsource" : "MISC", + "url" : "https://www.ichain.co.jp/security20190311.html" + }, + { + "name" : "JVN#11622218", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN11622218/index.html" + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5924.json b/2019/5xxx/CVE-2019-5924.json index cc8da104be9..d418c5dbf81 100644 --- a/2019/5xxx/CVE-2019-5924.json +++ b/2019/5xxx/CVE-2019-5924.json @@ -1,62 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5924", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "RedNao", - "product": { - "product_data": [ - { - "product_name": "Smart Forms", - "version": { - "version_data": [ - { - "version_value": "2.6.15 and earlier" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5924", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Smart Forms", + "version" : { + "version_data" : [ + { + "version_value" : "2.6.15 and earlier" + } + ] + } + } + ] + }, + "vendor_name" : "RedNao" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Cross-site request forgery (CSRF) vulnerability in Smart Forms 2.6.15 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-site request forgery" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Cross-site request forgery" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://wordpress.org/plugins/smart-forms/#developers" - }, - { - "url": "http://jvn.jp/jp/JVN97656108/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Cross-site request forgery (CSRF) vulnerability in Smart Forms 2.6.15 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page." - } - ] - } -} \ No newline at end of file + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://wordpress.org/plugins/smart-forms/#developers", + "refsource" : "MISC", + "url" : "https://wordpress.org/plugins/smart-forms/#developers" + }, + { + "name" : "JVN#97656108", + "refsource" : "JVN", + "url" : "http://jvn.jp/jp/JVN97656108/index.html" + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5925.json b/2019/5xxx/CVE-2019-5925.json index 5c1ba3463e7..75c12b592a0 100644 --- a/2019/5xxx/CVE-2019-5925.json +++ b/2019/5xxx/CVE-2019-5925.json @@ -1,62 +1,67 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2019-5925", - "ASSIGNER": "vultures@jpcert.or.jp" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Security Roots Ltd", - "product": { - "product_data": [ - { - "product_name": "Dradis Community Edition and Dradis Professional Edition", - "version": { - "version_data": [ - { - "version_value": "Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "vultures@jpcert.or.jp", + "ID" : "CVE-2019-5925", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Dradis Community Edition and Dradis Professional Edition", + "version" : { + "version_data" : [ + { + "version_value" : "Dradis Community Edition v3.11 and earlier, Dradis Professional Edition v3.1.1 and earlier" + } + ] + } + } + ] + }, + "vendor_name" : "Security Roots Ltd" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Cross-site scripting" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Cross-site scripting" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" - }, - { - "url": "http://jvn.jp/en/jp/JVN40288903/index.html" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors." - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1", + "refsource" : "MISC", + "url" : "https://dradisframework.com/ce/security_reports.html#fixed-3.11.1" + }, + { + "name" : "JVN#40288903", + "refsource" : "JVN", + "url" : "http://jvn.jp/en/jp/JVN40288903/index.html" + } + ] + } } diff --git a/2019/9xxx/CVE-2019-9726.json b/2019/9xxx/CVE-2019-9726.json new file mode 100644 index 00000000000..7f8663a2d72 --- /dev/null +++ b/2019/9xxx/CVE-2019-9726.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9726", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9727.json b/2019/9xxx/CVE-2019-9727.json new file mode 100644 index 00000000000..f3f3c4a37b9 --- /dev/null +++ b/2019/9xxx/CVE-2019-9727.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9727", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9728.json b/2019/9xxx/CVE-2019-9728.json new file mode 100644 index 00000000000..78437e45ded --- /dev/null +++ b/2019/9xxx/CVE-2019-9728.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9728", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9729.json b/2019/9xxx/CVE-2019-9729.json new file mode 100644 index 00000000000..dfa17607eb4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9729.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9729", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}