diff --git a/2018/11xxx/CVE-2018-11847.json b/2018/11xxx/CVE-2018-11847.json index c2bd3e23b5f..8cde29066c0 100644 --- a/2018/11xxx/CVE-2018-11847.json +++ b/2018/11xxx/CVE-2018-11847.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/11xxx/CVE-2018-11888.json b/2018/11xxx/CVE-2018-11888.json index 037e4b4de2d..e8a468e4b9f 100644 --- a/2018/11xxx/CVE-2018-11888.json +++ b/2018/11xxx/CVE-2018-11888.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Unauthorized access may be allowed by the SCP11 Crypto Services TA will processing commands from other TA in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile and Snapdragon Voice & Music in versions MDM9607, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 650/52, SD 820, SD 820A, SD 835, SD 8CX, SDM439, Snapdragon_High_Med_2016." + "value" : "Unauthorized access may be allowed by the SCP11 Crypto Services TA will processing commands from other TA in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile and Snapdragon Voice & Music in versions MDM9607, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 650/52, SD 820, SD 820A, SD 835, SD 8CX, SDM439, Snapdragon_High_Med_2016." } ] }, @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/11xxx/CVE-2018-11899.json b/2018/11xxx/CVE-2018-11899.json index 7249610dfb2..b2b357f5e50 100644 --- a/2018/11xxx/CVE-2018-11899.json +++ b/2018/11xxx/CVE-2018-11899.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/12xxx/CVE-2018-12006.json b/2018/12xxx/CVE-2018-12006.json index 608bb1a9df0..5045f9956ca 100644 --- a/2018/12xxx/CVE-2018-12006.json +++ b/2018/12xxx/CVE-2018-12006.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/12xxx/CVE-2018-12010.json b/2018/12xxx/CVE-2018-12010.json index 1b4a12ad712..2503de85d1d 100644 --- a/2018/12xxx/CVE-2018-12010.json +++ b/2018/12xxx/CVE-2018-12010.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/12xxx/CVE-2018-12014.json b/2018/12xxx/CVE-2018-12014.json index a34ce6d3174..c51403a7c8b 100644 --- a/2018/12xxx/CVE-2018-12014.json +++ b/2018/12xxx/CVE-2018-12014.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/12xxx/CVE-2018-12547.json b/2018/12xxx/CVE-2018-12547.json index fc639f87291..2160d1d679e 100644 --- a/2018/12xxx/CVE-2018-12547.json +++ b/2018/12xxx/CVE-2018-12547.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code." + "value" : "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code." } ] }, diff --git a/2018/13xxx/CVE-2018-13888.json b/2018/13xxx/CVE-2018-13888.json index 682200bd5fe..d438124ddf4 100644 --- a/2018/13xxx/CVE-2018-13888.json +++ b/2018/13xxx/CVE-2018-13888.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/13xxx/CVE-2018-13889.json b/2018/13xxx/CVE-2018-13889.json index 5201228f5cf..edd5599c89a 100644 --- a/2018/13xxx/CVE-2018-13889.json +++ b/2018/13xxx/CVE-2018-13889.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2018/13xxx/CVE-2018-13893.json b/2018/13xxx/CVE-2018-13893.json index f1ee95a3ee1..497296bb2a1 100644 --- a/2018/13xxx/CVE-2018-13893.json +++ b/2018/13xxx/CVE-2018-13893.json @@ -60,4 +60,3 @@ ] } } - diff --git a/2019/7xxx/CVE-2019-7727.json b/2019/7xxx/CVE-2019-7727.json new file mode 100644 index 00000000000..e56650b7bd5 --- /dev/null +++ b/2019/7xxx/CVE-2019-7727.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7727", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7728.json b/2019/7xxx/CVE-2019-7728.json new file mode 100644 index 00000000000..74c0849129f --- /dev/null +++ b/2019/7xxx/CVE-2019-7728.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7728", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7729.json b/2019/7xxx/CVE-2019-7729.json new file mode 100644 index 00000000000..f296fcf7d81 --- /dev/null +++ b/2019/7xxx/CVE-2019-7729.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7729", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}